Category: GBHackers

Webinar
24
Jan
2024

Beware of Weaponized Office Documents that Deliver VenomRAT

Since office documents are often used in business communications, hackers take advantage of this fact to disseminate malicious malware easily….

Webinar
24
Jan
2024

Hackers Deploy Malicious npm Packages to Steal SSH Key

Two malicious npm packages were discovered on the npm open source package manager, which leverages GitHub to store stolen Base64-encrypted…

Webinar
24
Jan
2024

Hackers Use SYSTEMBC Tool to Maintain Access

To maintain access to compromised networks, hackers use specialized hacking tools. Such tools help the threat actors evade the detection…

Webinar
24
Jan
2024

VexTrio a hub of Cyber attacks Massive Criminal Affiliate Chain

VexTrio, a cybercrime syndicate with a history dating back to at least 2017, has been implicated in nefarious activities utilizing…

Webinar
24
Jan
2024

MavenGate Attack Let Attackers Hijack Java & Android Apps

Hackers use supply chain attacks to breach a target by gaining access to and taking advantage of weaknesses in the…

Webinar
24
Jan
2024

Parrot TDS Injecting Malicious Redirect Scripts

In the murky depths of the digital world lurks a cunning predator – Parrot TDS, a cyber campaign that has…

Webinar
23
Jan
2024

North Korean Hackers Attacking Cybersecurity Professionals

Hackers target cybersecurity professionals as successfully compromising their systems or gaining access to their credentials provides a gateway to valuable…

Webinar
23
Jan
2024

Malware Hidden In PyPI Packages Attacking Windows Machines

A PyPI malware author identified as “WS” was discovered by researchers to be covertly uploading malicious packages to PyPI that were impacting…

Webinar
23
Jan
2024

SEC X Account was Hacked Using SIM Swapping Method

In a brazen act of digital deception, the U.S. Securities and Exchange Commission’s (SEC) official Twitter account, @SECGov, was compromised…

Webinar
23
Jan
2024

Hackers Abusing LSASS Process to Exfiltrate Login Credentials

Threat actors have been using several methods for credential stealing, which varies based on the environment and infrastructure of the…

Webinar
23
Jan
2024

SSH3 – Faster & Rich Secure Shell Using HTTP/3

SSH or Secure Shell is a cryptographic network protocol that enables secure communication and remote access over an unsecured network. …

PixieFAIL
22
Jan
2024

Deloitte Partners with Memcyco to Combat ATO and Other Online Attacks

Memcyco will showcase its solutions at Deloitte’s annual Cyber iCON event, demonstrating how organizations can build effective defenses to protect…