Category: GBHackers

Beware of Fake Chrome Browser Updates that Install Malware
14
Aug
2023

Beware of Fake Chrome Browser Updates that Install Malware

Reports indicate that there seems to be an ongoing campaign that lures victims into installing a Remote Administration Tool called…

Black Hat USA 2023: Complete AI Briefings Roundup
12
Aug
2023

Black Hat USA 2023: Complete AI Briefings Roundup

The 26th annual BLACK HAT USA is taken place at the Mandalay Bay Convention Centre in Las Vegas from August…

Hackers Compromised ChatGPT Model
12
Aug
2023

Hackers Compromised ChatGPT Model with Indirect Prompt Injection

ChatGPT quickly gathered more than 100 million users just after its release, and the ongoing trend includes newer models like…

Authorities Taken Down Bulletproof Hosting
11
Aug
2023

MoustachedBouncer Attacking Foreign Embassies Using NightClub

MoustachedBouncer, a cyberespionage group active since 2014, likely has performed ISP-level adversary-in-the-middle (AitM) attacks since 2020 to compromise its targets….

Dramatic Surge in Social Engineering and Web Attacks
11
Aug
2023

Dramatic Surge in Social Engineering and Web Attacks

The Second quarter of 2023 has shown a significant increase in the overall cyber-threat risks. The blocking of unique web…

Authorities Taken Down Bulletproof Hosting
11
Aug
2023

Researchers Uncover Series of Ransomware Attacks

Ransomware groups often recycle tools, techniques, and procedures. Even some of them also provide playbooks for affiliates as well. Numerous…

Authorities Taken Down Bulletproof Hosting
10
Aug
2023

Authorities Taken Down Bulletproof Hosting Provider Lolek

The well-known bulletproof hosting platform, Lolek Hosted, has been shut down by law enforcement officials from the United States and…

New Infostealer Malware Steal Logs & Corporate Access Data
10
Aug
2023

New Infostealer Malware Steal Logs & Corporate Access Data

Infostealer malware is becoming extremely popular among cybercriminals, especially in the malware-as-a-service (MaaS) based sector. These kinds of malware remain…

Researchers Tricked Hackers into Reveal Their Secrets Using Honeypot
10
Aug
2023

Researchers Tricked Hackers into Reveal Their Secrets Using Honeypot

In the last three years, hackers unknowingly seeking data or malware deployment have found a seemingly vulnerable virtual machine that…

TargetCompany Ransomware Deploy Fully Undetectable Malware
10
Aug
2023

TargetCompany Ransomware Deploy Fully Undetectable Malware

The TargetCompany ransomware (aka Mallox, Fargo, and Tohnichi) is actively targeting the organizations that are using or running vulnerable SQL…

Rhysida Ransomware Has Added New Techniques, & Tools
09
Aug
2023

Rhysida Ransomware Has Added New Techniques, & Tools

A new ransomware group known as ‘Rhysida’ has been operating since May 2023, posing a huge danger to the healthcare industry….

16 Zero-Day Flaws Discovered in CODESYS Industrial Devices
09
Aug
2023

16 Zero-Day Flaws Discovered in CODESYS Industrial Devices

CODESYS, a widely-used integrated environment for controller programming, holds a strong presence in Operational Technology across diverse industries, such as:-…