Category: GBHackers

CISA Issues Secure Practices for Cloud Services To Strengthen U.S Federal Agencies
19
Dec
2024

CISA Issues Secure Practices for Cloud Services To Strengthen U.S Federal Agencies

In a decisive move to bolster cloud security, the Cybersecurity and Infrastructure Security Agency (CISA) has issued Binding Operational Directive…

Europol Details on How Cyber Criminals Exploit legal businesses for their Economy
19
Dec
2024

Europol Details on How Cyber Criminals Exploit legal businesses for their Economy

Europol has published a groundbreaking report titled “Leveraging Legitimacy: How the EU’s Most Threatening Criminal Networks Abuse Legal Business Structures.”  The…

BADBOX Botnet Hacked 74,000 Android Devices With Customizable Remote Codes
19
Dec
2024

BADBOX Botnet Hacked 74,000 Android Devices With Customizable Remote Codes

BADBOX is a cybercriminal operation infecting Android devices like TV boxes and smartphones with malware before sale, which are often…

Hackers Weaponizing LNK Files To Create Scheduled Task And Deliver Malware Payload
19
Dec
2024

Hackers Weaponizing LNK Files To Create Scheduled Task And Deliver Malware Payload

TA397, also known as Bitter, targeted a Turkish defense organization with a spearphishing email containing a RAR archive, which included…

Malicious Supply Chain Attacking Moving From npm Community To VSCode Marketplace
19
Dec
2024

Malicious Supply Chain Attacking Moving From npm Community To VSCode Marketplace

Researchers have identified a rise in malicious activity on the VSCode Marketplace, highlighting the vulnerability of the platform to supply…

Beware Of Malicious SharePoint Notifications That Delivers Xloader Malware
19
Dec
2024

Beware Of Malicious SharePoint Notifications That Delivers Xloader Malware

Through the use of XLoader and impersonating SharePoint notifications, researchers were able to identify a sophisticated malware delivery campaign.  A…

Next.js Vulnerability Let Attackers Bypass Authentication
19
Dec
2024

Next.js Vulnerability Let Attackers Bypass Authentication

A high-severity vulnerability has been discovered in the popular web framework, Next.js, which allows attackers to bypass authentication under specific…

CISA Proposes National Cyber Incident Response Plan
19
Dec
2024

CISA Proposes National Cyber Incident Response Plan

The Cybersecurity and Infrastructure Security Agency (CISA) has unveiled a proposed update to the National Cyber Incident Response Plan (NCIRP),…

Iranian Hackers Launched A Massive Attack to Exploit Global ICS Infrastructure
19
Dec
2024

Iranian Hackers Launched A Massive Attack to Exploit Global ICS Infrastructure

In a joint cybersecurity advisory, the FBI, CISA, NSA, and partner agencies from Canada, the United Kingdom, and Israel have…

Chrome Security Update, Patch for Multiple Security Flaws
19
Dec
2024

Chrome Security Update, Patch for Multiple Security Flaws

72 Hours to Audit-Ready API Security APIs present a unique challenge in this landscape, as risk assessment and mitigation are…

CISA Released Secure Mobile Communication Best Practices
19
Dec
2024

CISA Released Secure Mobile Communication Best Practices

The Cybersecurity and Infrastructure Security Agency (CISA) has released new best practice guidance to safeguard mobile communications amid rising concerns…

Cybercriminals Exploit Google Calendar and Drawings in Phishing Campaigns
18
Dec
2024

Cybercriminals Exploit Google Calendar and Drawings in Phishing Campaigns

Attackers are ingeniously exploiting Google Calendar and Google Drawings in phishing campaigns, targeting unsuspecting individuals and organizations. Leveraging the inherent…