Category: GBHackers

Hackers Deliver Malware via YouTube Video Game Cracks
08
Apr
2024

Hackers Deliver Malware via YouTube Video Game Cracks

Threat actors target home users with information-stealing malware like Vidar, StealC, and Lumma Stealer, which disguises the malware as pirated…

Chinese Hackers Using AI Tools To Influence Upcoming Elections
08
Apr
2024

Chinese Hackers Using AI Tools To Influence Upcoming Elections

By exploiting the AI tools deepfake hackers could make videos or audios of political candidates to spread misinformation or disinformation,…

Cisco IOS Vulnerability Allows DOS Attacks via Malicious Traffic
08
Apr
2024

Cisco IOS Vulnerability Allows DOS Attacks via Malicious Traffic

Cisco recently fixed a high-severity vulnerability in Cisco IOS Software for Catalyst 6000 Series Switches, which could lead to a denial…

Veterinary Giant IT System Attacked by Hackers
08
Apr
2024

Veterinary Giant IT System Attacked by Hackers

CVS Group, a leading veterinary service provider, has confirmed that it fell victim to a cyber-attack involving unauthorized access to…

Vedalia APT Group Exploits Oversized LNK Files to Malware
08
Apr
2024

Vedalia APT Group Exploits Oversized LNK Files to Malware

The Vedalia Advanced Persistent Threat (APT) group, also known by its alias Konni, has been distributing malware using an innovative…

Multiple CData Flaws Let Attackers Bypass Security Restrictions
08
Apr
2024

Multiple CData Flaws Let Attackers Bypass Security Restrictions

A path traversal vulnerability was discovered in the Java versions of multiple CData products when using the embedded Jetty server,…

Multiple Cisco Small Business Routers Vulnerable to XSS Attacks
08
Apr
2024

Multiple Cisco Small Business Routers Vulnerable to XSS Attacks

Cisco has alerted its customers about a critical vulnerability affecting several Small Business RV Series Routers models. This vulnerability, CVE-2024-20362,…

AI-As-A-Service Providers Vulnerability : Cross-Tenant Attacks
08
Apr
2024

AI-As-A-Service Providers Vulnerability : Cross-Tenant Attacks

The fast acceptance of AI has serious security issues, as this necessitates strict security measures to be put in place…

Microsoft Two-Step Phishing Attack LinkedIn Users
08
Apr
2024

Microsoft Two-Step Phishing Attack LinkedIn Users

The professional and personal online spheres are merging as social media platforms like Facebook, LinkedIn, and WhatsApp are now commonly…

Cloudflare Acquires Baselime to Enhance Serverless Performance
08
Apr
2024

Cloudflare Acquires Baselime to Enhance Serverless Performance

Cloudflare has announced its acquisition of Baselime, a pioneering observability platform designed to simplify the complexities of serverless application development….

CoralRaider Hackers Steals Login Credentials & Financial Data
08
Apr
2024

CoralRaider Hackers Steals Login Credentials & Financial Data

A new threat actor dubbed “CoralRaider” targets victims’ financial information, login credentials, and social media profiles—including accounts for businesses and…

Ransomware Attack Via Unpatched Vulnerabilities Are Brutal
06
Apr
2024

Ransomware Attack Via Unpatched Vulnerabilities Are Brutal

Adversaries use stolen credentials or exploit software vulnerabilities to gain access for ransomware attacks, which impacts the initial infection method….