Category: GBHackers

Outlook 0-day RCE Flaw
16
Feb
2024

Ukrainian Pleads Guilty for Leading Zeus & IcedID Malware Attacks

Vyacheslav Igorevich Penchukov, a 37-year-old resident of Donetsk, Ukraine, has pleaded guilty to his key role in developing and deploying…

Wireshark 4.2.3 Released
16
Feb
2024

New Outlook 0-day RCE Flaw Exploited in the Wild

Outlook has been discovered to have an interesting vulnerability while handling specific hyperlinks, which was found to be exploited by…

Wireshark 4.2.3 Released
16
Feb
2024

Prescriptive Mitigation Guidance, Power to ICS Security

Imagine a cascading blackout, disrupted pipelines, or manipulated manufacturing processes – all orchestrated through a cyberattack. This chilling reality paints…

OpenAI shuts down Hacker Accounts
16
Feb
2024

Wireshark 4.2.3 Released – What’s New!

Wireshark is backed by the nonprofit Wireshark Foundation, which relies on your support to advance protocol analysis education. However, Wireshark…

OpenAI shuts down Hacker Accounts
15
Feb
2024

Analyse Phishing Attack with ANY.RUN Threat Intelligence Lookup

An advanced phishing attack typically involves sophisticated tactics such as compelling email and website replicas that are often tailored to…

MITRE Engenuity ATT&CK
15
Feb
2024

OpenAI shuts down Accounts Used phishing emails & malware

While Artificial Intelligence holds immense potential for good, its power can also attract those with malicious intent.  State-affiliated actors, with…

MITRE Engenuity ATT&CK
15
Feb
2024

Critical DNSSEC Flaw Attacker Bring DNS With Single DNS Packet

A new flaw has been discovered in DNSSEC, which, when exploited by threat actors, could result in the unavailability of…

MITRE Engenuity ATT&CK
15
Feb
2024

Microsoft Patch Tuesday 2024 : 73 Security Flaws

As part of its February 2024 Patch Tuesday updates, Microsoft has published patches to address 73 security flaws, including two…

MITRE Engenuity ATT&CK
15
Feb
2024

HijackLoader Malware Sophisticated Techniques to Avoid Detection

Threat actors exploit HijackLoader because it is a powerful tool for injecting malicious code into legitimate processes, enabling stealthy execution…

How to interpret the MITRE Engenuity ATT&CK® Evaluations: Enterprise
14
Feb
2024

How to interpret the MITRE Engenuity ATT&CK® Evaluations: Enterprise

Thorough, independent tests are vital as cybersecurity leaders and their teams evaluate vendors’ abilities to guard against increasingly sophisticated threats…

13 Flaws Discovered in Acrobat & Reader Allows Remote Code
14
Feb
2024

13 Flaws Discovered in Acrobat & Reader Allows Remote Code

A critical security update for both Windows and macOS is available for Adobe Acrobat and Reader.  Per Adobe, this update…

ZLoader Now Attack 64-bit Windows Systems: Live Analysis
14
Feb
2024

ZLoader Now Attack 64-bit Windows Systems: Live Analysis

ZLoader is a banking Trojan malware that steals sensitive financial information from infected systems. Threat actors exploit this malware to…