Category: GBHackers

BlackByte Hackers Exploiting VMware ESXi Auth Bypass Vulnerability
03
Sep
2024

BlackByte Hackers Exploiting VMware ESXi Auth Bypass Vulnerability

BlackByte, a Ransomware-as-a-Service (RaaS) group that surfaced about mid-2021 appears to have traces of Conti’s evolution. It uses productive sophistication…

SafeTech Labs Takes Aim at $52B Digital Legacy Industry with World’s First Fully Comprehensive Digital Legacy Solution
02
Sep
2024

SafeTech Labs Takes Aim at $52B Digital Legacy Industry with World’s First Fully Comprehensive Digital Legacy Solution

The company’s new product covers every base for digital legacies, resulting in the industry’s first truly comprehensive product. SafeTech Labs,…

Snake Keylogger Attack Windows Using Weaponized Excel Doc
30
Aug
2024

Snake Keylogger Attack Windows Using Weaponized Excel Doc

Researchers uncovered a sophisticated phishing campaign that exploits a .NET-based Snake Keylogger variant. This attack leverages weaponized Excel documents to…

INE Security Named 2024 SC Awards Finalist
30
Aug
2024

INE Security Named 2024 SC Awards Finalist

Cary, North Carolina, August 30th, 2024, CyberNewsWire: INE Security is pleased to announce that it has been recognized as a…

Voldemort Threat Actors Abusing Google Sheets to Attack Windows Users 
30
Aug
2024

Voldemort Threat Actors Abusing Google Sheets to Attack Windows Users 

Researchers from Proofpoint have uncovered a sophisticated cyberattack campaign leveraging Google Sheets as a command and control (C2) platform. Dubbed…

Iranian Threat Group Attack US Organization Via Ransomware
30
Aug
2024

Iranian Threat Group Attack US Organization Via Ransomware

Iranian cyber actors have been identified as the perpetrators behind ransomware attacks targeting U.S. organizations across multiple sectors. This revelation…

Attackers Spread Lumma Stealer Malware GitHub Comments
30
Aug
2024

Attackers Spread Lumma Stealer Malware GitHub Comments

Cybercriminals are leveraging platforms like GitHub to spread the Lumma information stealer malware. This sophisticated threat is part of a…

Hackers Exploited Digital Advertising Tools to Launch Malicious Campaigns
30
Aug
2024

Hackers Exploited Digital Advertising Tools to Launch Malicious Campaigns

Cybersecurity researchers from Mandiant and Google Cloud have uncovered a sophisticated scheme where hackers exploit digital advertising tools to conduct…

Hackers Repeatedly Using Same iOS & Chrome Exploits to Attack Gov Websites
30
Aug
2024

Hackers Repeatedly Using Same iOS & Chrome Exploits to Attack Gov Websites

Hackers have been exploiting vulnerabilities in iOS and Google Chrome to target government websites, particularly in Mongolia. Google’s Threat Analysis…

Check Point to Acquire Cyberint Technologies to Enhance Operations
29
Aug
2024

Check Point to Acquire Cyberint Technologies to Enhance Operations

Check Point® Software Technologies Ltd. (NASDAQ: CHKP), a leading cybersecurity solutions provider, has announced a definitive agreement to acquire Cyberint…

Critical Vulnerability in Perl Module Installer Let Attackers Intercept Traffic
29
Aug
2024

Critical Vulnerability in Perl Module Installer Let Attackers Intercept Traffic

A critical vulnerability has been identified in App::cpanminus (cpanm), a widely used tool for downloading and installing Perl modules. This…

Wireshark 4.4.0 Released – What’s New!
29
Aug
2024

Wireshark 4.4.0 Released – What’s New!

The Wireshark Foundation has announced the release of Wireshark 4.4.0, marking a significant update to the popular open-source network protocol…