Category: GBHackers

Hackers Weaponized Documents Aerospace
06
Dec
2023

Kali Linux 2023.4 Released – What’s New!

Kali Linux 2023.4, the latest version of Offensive Security’s renowned operating system, has been released, and it includes the advanced…

Hackers Weaponized Documents Aerospace
06
Dec
2023

Trickbot Malware Developer Pleads Guilty

A 40-year-old Russian national, Vladimir Dunaev, pleaded guilty for developing and deploying Trickbot malware. Trickbot, a suite of malware tools,…

Hackers Weaponized Documents Aerospace
06
Dec
2023

ICANN Launches RDRS to Assist Law Enforcement Agencies

ICANN is a non-profit organization that is responsible for coordinating the global internet’s- This organization manages the distribution and maintenance…

Cactus Ransomware Qlik
04
Dec
2023

Hackers Use Weaponized Documents to Attack U.S. Aerospace Industry

An American aerospace company has been the target of a commercial cyberespionage campaign dubbed AeroBlade, which appears to be aimed…

Cactus Ransomware Qlik
02
Dec
2023

Active Attacks Targeting Google Chrome & ownCloud Flaws: CISA Warns

The CISA announced two known exploited vulnerabilities active attacks targeting Google Chrome & own cloud vulnerabilities in their catalog. CVE-2023-6345…

Hackers Antivirus RedLine Malware
01
Dec
2023

Cactus Ransomware Exploiting Qlik code execution Vulnerability

A new Cactus Ransomware was exploited in the code execution vulnerability to Qlik Sense for initial access. Qlik Sense is…

Hackers Using Weaponized Invoice
01
Dec
2023

Hackers Install Antivirus to Install RedLine Malware

The ScrubCrypt obfuscation tool has been discovered to be utilized in attacks to disseminate the RedLine Stealer malware, and its new variant was being marketed in…

Hackers Using Weaponized Invoice
01
Dec
2023

Hotel’s Hacked Logins Let Attacker Steal Guest Credit Cards

According to a recent report by Secureworks, a well-planned and advanced phishing attack was carried out, specifically targeting hotels and…

Hackers Using Weaponized Invoice
01
Dec
2023

Critical Zoom Vulnerability Let Attackers Take Over Meetings

Zoom, the most widely used video conferencing platform has been discovered with a critical vulnerability that threat actors could potentially…

Zyxel Command Injection Flaws
30
Nov
2023

Hackers Using Weaponized Invoice to Deliver LUMMA Malware

Hackers use weaponized invoices to exploit trust in financial transactions, embedding malware or malicious links within seemingly legitimate payment requests. …

Zyxel Command Injection Flaws
30
Nov
2023

US Seized Crypto Currency Mixer used by North Korean Hackers

The U.S. Treasury Department sanctioned the famous cryptocurrency mixer Sinbad after it was claimed that the North Korean hacker group…

Zyxel Command Injection Flaws
30
Nov
2023

CISA Warns Exploitation Wastewater System Logic Controllers

In a disconcerting turn of events, cyber threat actors have set their sights on Unitronics programmable logic controllers (PLCs) embedded…