Category: GBHackers

Cisco Desk Phone Series Vulnerability Let Remote Attacker Access sensitive information
07
Nov
2024

Cisco Desk Phone Series Vulnerability Let Remote Attacker Access sensitive information

A significant vulnerability (CVE-2024-20445) has been discovered in Cisco Desk Phone 9800 Series, IP Phone 7800 and 8800 Series, and…

Cisco Flaw Let Attackers Run Command as Root User
07
Nov
2024

Cisco Flaw Let Attackers Run Command as Root User

A critical vulnerability has been discovered in Cisco Unified Industrial Wireless Software, which affects Cisco Ultra-Reliable Wireless Backhaul (URWB) Access…

HookBot Malware Use Overlay Attacks Impersonate As Popular Brands To Steal Data
06
Nov
2024

HookBot Malware Use Overlay Attacks Impersonate As Popular Brands To Steal Data

The HookBot malware family employs overlay attacks to trick users into revealing sensitive information by impersonating various brands and apps…

CRON#TRAP Campaign Attacks Windows Machine With Weaponized Linux Virtual Machine
06
Nov
2024

CRON#TRAP Campaign Attacks Windows Machine With Weaponized Linux Virtual Machine

Weaponized Linux virtual machines are used for offensive cybersecurity purposes, such as “penetration testing” or “exploiting vulnerabilities.” These setups often…

North Korean Hackers Employing New Tactic To Acruire Remote Jobs
06
Nov
2024

North Korean Hackers Employing New Tactic To Acruire Remote Jobs

North Korean threat actors behind the Contagious Interview and WageMole campaigns have refined their tactics, enhancing the obfuscation of their…

Rise Of Ransomware-As-A-Service Leads To Decline Of Custom Tools
06
Nov
2024

Rise Of Ransomware-As-A-Service Leads To Decline Of Custom Tools

Ransomware-as-a-Service (RaaS) platforms have revolutionized the ransomware market. Unlike traditional standalone ransomware sales, RaaS offers a subscription-based model where attackers…

Researchers Detailed Credential Abuse Cycle
06
Nov
2024

Researchers Detailed Credential Abuse Cycle

The United States Department of Justice has unsealed an indictment against Anonymous Sudan, a hacking group responsible for distributed denial-of-service…

ToxicPanda Banking Malware Attacking Banking Users To Steal Logins
06
Nov
2024

ToxicPanda Banking Malware Attacking Banking Users To Steal Logins

Recent research has uncovered a new strain of malware developed for Android devices, initially misidentified as TgToxic.  Despite sharing some…

Azure API Management vulnerabilities Let Attackers Escalate Privileges
06
Nov
2024

Azure API Management vulnerabilities Let Attackers Escalate Privileges

Recent discoveries by Binary Security have revealed critical vulnerabilities in Azure API Management (APIM) that could allow attackers with minimal privileges to…

Google Patches High-Severity Vulnerabilities in Chrome
06
Nov
2024

Google Patches High-Severity Vulnerabilities in Chrome

Google has released a new update for its Chrome browser, addressing two high-severity vulnerabilities. The Stable channel has now been…

Hackers Created 100+ Fake Web Stores To Steal Millions Of Dollars
05
Nov
2024

Hackers Created 100+ Fake Web Stores To Steal Millions Of Dollars From Customers

The Phish, ‘n’ Ships fraud operation leverages, compromised websites to redirect users to fake online stores, which, optimized for search…

ClickFix Exploits GMeet & Zoom Pages to Deliver Sophisticated Malware
05
Nov
2024

ClickFix Exploits GMeet & Zoom Pages to Deliver Sophisticated Malware

A new tactic, “ClickFix,” has emerged. It exploits fake Google Meet and Zoom pages to deliver sophisticated malware. The Sekoia…