Category: GBHackers

5 Major Phishing Campaigns in March 2024
02
Apr
2024

5 Major Phishing Campaigns in March 2024

March saw many notable phishing attacks, with criminals using new tactics and approaches to target unsuspecting victims. It is time…

4 Incident Triage Best Practices for Your Organization in 2024
02
Apr
2024

4 Incident Triage Best Practices for Your Organization in 2024

Maintaining uninterrupted services is vital for any organization. The backbone of ensuring this continuous uptime lies in the Incident Management…

Swalwell for Congress Campaign Partners with Wolfsbane.ai to Protect Against AI-Generated Cloning
02
Apr
2024

Swalwell for Congress Campaign Partners with Wolfsbane.ai to Protect Against AI-Generated Cloning

Today, Congressman Eric Swalwell, CA-14, announced that he has partnered with Wolfsbane.ai to help prevent his 2024 election campaign content…

Indian Govt Rescues 250 Citizens Trapped In Cambodia
02
Apr
2024

Indian Govt Rescues 250 Citizens Trapped In Cambodia

A massive cyber fraud operation targeting Indians in Cambodia has emerged, with an estimated Rs 500 crore stolen in six…

1.3 Million Customers Data Leaked
02
Apr
2024

1.3 Million Customers Data Leaked

PandaBuy, a popular online shopping platform, has been the victim of a significant data breach. This breach has resulted in…

Google to Delete Billions of User's Personal Data
02
Apr
2024

Google to Delete Billions of User’s Personal Data

Google has agreed to delete billions of data records that reflect the private browsing activities of users. This decision comes…

Live Forensic Techniques To Detect Ransomware Infection On Linux Machines
02
Apr
2024

Live Forensic Techniques To Detect Ransomware Infection On Linux Machines

Ransomware, initially a Windows threat, now targets Linux systems, endangering IoT ecosystems. Linux ransomware employs diverse encryption methods, evading traditional…

Pentagon Releases Cybersecurity Strategy To Strengthen DIB
02
Apr
2024

Pentagon Releases Cybersecurity Strategy To Strengthen DIB

The DoD DIB Cybersecurity Strategy is a three-year plan (FY24-27) to improve cybersecurity for defense contractors that aims to create…

xz-utils Backdoor Affects Kali Linux Installations
02
Apr
2024

xz-utils Backdoor Affects Kali Linux Installations

A critical vulnerability has been identified in the xz-utils package, versions 5.6.0 to 5.6.1, which harbors a backdoor capable of…

upstream xz/liblzma
02
Apr
2024

Veracode Announces Acquisition of Longbow Security

Veracode, a leading provider in the cybersecurity space, has officially announced its acquisition of Longbow Security. This strategic move is…

Backdoor in upstream xz/liblzma Let Attackers Hack SSH Servers
01
Apr
2024

Backdoor in upstream xz/liblzma Let Attackers Hack SSH Servers

A startling revelation has identified a dangerous security vulnerability in the xz compression utility, specifically within its liblzma library. This…

upstream xz/liblzma
01
Apr
2024

Werewolf Hackers Exploiting WinRAR Vulnerability

Active since 2023, the Mysterious Werewolf cluster has shifted targets to the military-industrial complex (MIC) by using phishing emails with…