Category: GBHackers

Mastercard to Acquire Recorded Future for $2.65 Billion
12
Sep
2024

Mastercard to Acquire Recorded Future for $2.65 Billion

In a strategic move to bolster its cybersecurity capabilities, Mastercard has announced an agreement to acquire Recorded Future, a leading…

Critical Vulnerabilities in JPEG 2000 Library Let Attackers Execute Remote Code
12
Sep
2024

Critical Vulnerabilities in JPEG 2000 Library Let Attackers Execute Remote Code

Exploiting memory corruption vulnerabilities in server-side software often requires knowledge of the binary and environment, which limits the attack surface,…

Hackers Exploiting Progress WhatsUp RCE Vulnerability In The Wild
12
Sep
2024

Hackers Exploiting Progress WhatsUp RCE Vulnerability In The Wild

RCE attacks on WhatsUp Gold exploited the Active Monitor PowerShell Script to execute malicious code, as the vulnerabilities CVE-2024-6670 and…

CosmicBeetle Exploiting Old Vulnerabilities To Attacks SMBs All Over The World
12
Sep
2024

CosmicBeetle Exploiting Old Vulnerabilities To Attacks SMBs All Over The World

CosmicBeetle, a threat actor specializing in ransomware, has recently replaced its old ransomware, Scarab, with ScRansom, a custom-built ransomware that…

New Loki Backdoor Attacking macOS Systems
12
Sep
2024

New Loki Backdoor Attacking macOS Systems

Cody Thomas developed Apfell, an open-source macOS post-exploitation framework, in 2018 and evolved into Mythic, a cross-platform framework that addresses…

Hackers Mimic Google, Microsoft & Amazon Domains for Phishing Attacks
12
Sep
2024

Hackers Mimic Google, Microsoft & Amazon Domains for Phishing Attacks

Phishing remains a significant concern for both individuals and organizations. Recent findings from ThreatLabz have highlighted the alarming prevalence of…

New Developer-As-A-Service In Hacking Forums Empowering Phishing And Cyberattacks
12
Sep
2024

New Developer-As-A-Service In Hacking Forums Empowering Phishing And Cyberattacks

SCATTERED SPIDER, a ransomware group, leverages cloud infrastructure and social engineering to target insurance and financial institutions by using stolen…

Criminal IP Teams Up with IPLocation.io to Deliver Unmatched IP Solutions to Global Audiences - GBHackers Security
12
Sep
2024

Criminal IP Teams Up with IPLocation.io to Deliver Unmatched IP Solutions to Global Audiences – GBHackers Security

Criminal IP, a distinguished leader in Cyber Threat Intelligence (CTI) search engine developed by AI SPERA, announced that it has…

Researchers Hacked Car EV Chargers To Execute Arbitrary Code
11
Sep
2024

Researchers Hacked Car EV Chargers To Execute Arbitrary Code

Researchers discovered flaws in the Autel MaxiCharger EV charger that make it potential to execute arbitrary code on the device…

Threat Actors Exploiting Legitimate Software For Stealthy Cyber Attacks
11
Sep
2024

Threat Actors Exploiting Legitimate Software For Stealthy Cyber Attacks

CAMO, or Commercial Applications, Malicious Operations, highlights attackers’ increasing reliance on legitimate IT tools to bypass security defenses, which can…

Opus Security Elevates Vulnerability Management With its AI-Powered Multi-Layered Prioritization Engine
11
Sep
2024

Opus Security Elevates Vulnerability Management With its AI-Powered Multi-Layered Prioritization Engine

Opus’ innovative engine integrates AI-driven intelligence, contextual data and automated decision-making to drive precise, efficient vulnerability remediation.  Opus Security, the…

Siemens Industrial Edge Management Vulnerable to Authorization Bypass Attacks
11
Sep
2024

Siemens Industrial Edge Management Vulnerable to Authorization Bypass Attacks

Siemens ProductCERT has disclosed a critical vulnerability in its Industrial Edge Management systems. The vulnerability, identified as CVE-2024-45032, poses a…