Category: GBHackers

3 New Malicious PyPI Packages Deploy CoinMiner Linux
05
Jan
2024

3 New Malicious PyPI Packages Deploy CoinMiner Linux

Researchers identified three malicious PyPI (Python Package Index) packages that deploy a CoinMiner executable on Linux devices, affecting latency in device…

Google Chrome Use After Free Flaw Let Attacker Hijack Browser
04
Jan
2024

Google Chrome Use After Free Flaw Let Attacker Hijack Browser

The latest stable channel update for Google Chrome, version 120.0.6099.199 for Mac and Linux and 120.0.6099.199/200 for Windows, is now available…

Free Decryptor Released for Black Basta Ransomware
04
Jan
2024

Free Decryptor Released for Black Basta Ransomware

A vulnerability in the encryption algorithm used by the Black Basta ransomware has led researchers to develop a free decryptor…

Four Cyber Criminals Convicted of Spreading ChatGPT Ransom
04
Jan
2024

Four Cyber Criminals Convicted of Spreading ChatGPT Ransom

Four Chinese cybercriminals were taken into custody after using ChatGPT to create ransomware. The lawsuit is the first of its…

Active Directory Infiltration Methods Employed by Cybercriminals
04
Jan
2024

Active Directory Infiltration Methods Employed by Cybercriminals

Active Directory infiltration methods exploit vulnerabilities or weaknesses in Microsoft’s Active Directory to gain unauthorized access. Active Directory is a…

Wireshark 4.2.1 Released - What's New!
04
Jan
2024

Wireshark 4.2.1 Released – What’s New!

Wireshark is a popular open-source network protocol analyzer that allows users to inspect and capture data on a network in…

Cookies Exploit Allows Persistent Access After Password Reset
03
Jan
2024

Cookies Exploit Allows Persistent Access After Password Reset

A Critical Google Cookies exploit involves manipulating or stealing user cookies, which store authentication information, to gain unauthorized access to…

New DLL Hijacking Technique-Attackers Bypass Windows Security
02
Jan
2024

New DLL Hijacking Technique-Attackers Bypass Windows Security

DLL hijacking is a technique where a malicious DLL (Dynamic Link Library) is placed in a directory that a vulnerable…

Multiple Flaws in Google Kubernetes Engine
02
Jan
2024

Multiple Flaws in Google Kubernetes Engine

Google Kubernetes Engine (GEK) has been detected with two flaws that a threat actor can utilize to create significant damage…

10 Most Common Types of Cyber Attacks in 2023
02
Jan
2024

10 Most Common Types of Cyber Attacks in 2023

Cyber attacks are evolving rapidly with advancements in technology, as threat actors exploit new vulnerabilities in:- The rise of the…

650,000+ Malicious Domains Registered Resembling ChatGPT
02
Jan
2024

650,000+ Malicious Domains Registered Resembling ChatGPT

Hackers abuse the ChatGPT name for malicious domains to exploit the credibility associated with the ChatGPT model, deceiving users into…

New Medusa Stealer Attacking Users to Steal Login Credentials
29
Dec
2023

New Medusa Stealer Attacking Users to Steal Login Credentials

While the world celebrated Christmas, the cybercrime underworld feasted on a different kind of treat: the release of Meduza 2.2,…