Category: GBHackers

Hackers Registered 500k+ Domains Using Algorithms For Extensive Cyber Attack
22
Jul
2024

Hackers Registered 500k+ Domains Using Algorithms For Extensive Cyber Attack

Hackers often register new domains for phishing attacks, spreading malware, and other deceitful activities.  Such domains are capable of pretending…

Sonicos Ipsec VPN Vulnerability Let Attackers Cause Dos Condition
22
Jul
2024

Sonicos Ipsec VPN Vulnerability Let Attackers Cause Dos Condition

SonicWall has disclosed a critical heap-based buffer overflow vulnerability in its SonicOS IPSec VPN. This flaw, identified as CVE-2024-40764, can…

Beware Of Fake Browser Updates That Installs Malicious BOINC Infrastructre
22
Jul
2024

Beware Of Fake Browser Updates That Installs Malicious BOINC Infrastructre

SocGholish malware, also known as FakeUpdates, has exhibited new behavior since July 4th, 2024, as the infection chain still begins…

Octo Tempest Know for Attacking VMWare ESXi Servers Added RansomHub & Qilin to Its Arsenal
22
Jul
2024

UK Police Arrested a Boy Responsible for MGM Resorts Hack

UK police have arrested a 17-year-old boy from Walsall in connection with a notorious cyber hacking group. This group has…

Octo Tempest Know for Attacking VMWare ESXi Servers Added RansomHub & Qilin to Its Arsenal
19
Jul
2024

CrowdStrike Update Triggers Widespread Windows Crashes

A recent update from cybersecurity firm CrowdStrike has caused significant disruptions for Windows users, leading to widespread reports of Blue…

Octo Tempest Know for Attacking VMWare ESXi Servers Added RansomHub & Qilin to Its Arsenal
19
Jul
2024

Operation Spincaster Disrupts Approval Phishing Technique

Chainalysis has launched Operation Spincaster, an initiative to disrupt approval phishing scams that have drained billions from victims’ wallets. This…

Octo Tempest Know for Attacking VMWare ESXi Servers Added RansomHub & Qilin to Its Arsenal
18
Jul
2024

MacOS Users Beware Of Weaponized Meeting App From North Korean Hackers

Meeting apps are often targeted and turned into weapons by hackers as they are largely employed for communication and collaboration,…

Octo Tempest Know for Attacking VMWare ESXi Servers Added RansomHub & Qilin to Its Arsenal
18
Jul
2024

TAG-100 Actors Using Open-Source Tools To Attack Gov & Private Organizations

Hackers exploit open-source tools to execute attacks because they are readily available, well-documented, and often have extensive community support, making…

Octo Tempest Attacking VMWare ESXi Servers Added new Ransom Tools
18
Jul
2024

Octo Tempest Attacking VMWare ESXi Servers Added new Ransom Tools

Threat actors often attack VMware ESXi servers since they accommodate many virtual machines, which link to a variety of systems…

Volcano Demon Group Attacking Organizations With LukaLocker Ransomware
18
Jul
2024

MuddyWater Hackers Deploy Legitimate RMM With BugSleep Malware

Since October 2023, MuddyWater, which is an Iranian threat group linked to MOIS, has escalated its phishing campaigns in Middle…

Volcano Demon Group Attacking Organizations With LukaLocker Ransomware
18
Jul
2024

New TE.0 HTTP Request Smuggling Flaw Impacts Google Cloud Websites

HTTP Request Smuggling is a flaw in web security that is derived from variations in the way different web servers…

Volcano Demon Group Attacking Organizations With LukaLocker Ransomware
18
Jul
2024

Cybercriminals Exploit Attack on Donald Trump for Crypto Scams

Researchers at Bitdefender Labs remain ever-vigilant, informing users about the latest scams and internet perils that threaten their security and…