Category: GBHackers

AvosLocker Ransomware
17
Oct
2023

Hackers Abuse Discord to Blend Within Organizations’ Network

Discord has become a household name in online gaming and digital communication.  Gamers, friends, and families flock to this platform…

AvosLocker Ransomware
16
Oct
2023

AgentTesla Stealer Delivered Via Weaponized PDF and CHM Files

AgentTesla, a notorious information stealer, is observed spreading via CHM and PDF Files, which covertly harvest critical information from the…

AvosLocker Ransomware
16
Oct
2023

Microsoft to Kill NTLM and Expand Kerberos Authentication

In an ever-changing digital landscape, robust security measures are paramount. As Windows adapts to meet the evolving demands of our world,…

Container Security
16
Oct
2023

Hackers Using Remote Admin Tools AvosLocker Ransomware

Cybercriminals behind the AvosLocker ransomware attack employed a tactic of infecting organizations through Open-Source Remote Administration Tools. This method allowed…

Container Security
13
Oct
2023

Container Security in a GitOps Environment

GitOps is a methodology that uses Git (or other version control systems) to store all aspects of a project’s infrastructure,…

Pro-Russia Hackers Exploiting Winrar Flaw to Steal Credentials
13
Oct
2023

Pro-Russia Hackers Exploiting Winrar Flaw to Steal Credentials

A new phishing attack has been discovered, which uses malicious archive files to exploit the recently found WinRAR vulnerability CVE-2023-38831…

Phishing-as-a-Service from Strox hackers phish any brand
13
Oct
2023

Phishing-as-a-Service from Strox hackers phish any brand

The ever-evolving world of cybercrime has given birth to a disturbing phenomenon – Phishing-as-a-Service (PhaaS), and one name that sends…

CISA Known Exploited Vulnerabilities
13
Oct
2023

ToddyCat APT Hackers Exploiting Vulnerable Exchange Servers

ToddyCat, a highly skilled advanced persistent threat (APT) actor notorious for launching targeted attacks in Europe and Asia, has recently…

CISA Known Exploited Vulnerabilities
12
Oct
2023

Adobe, Cisco IOS, Skype, WordPad, & Rapid Reset Flaws

The US cybersecurity organization CISA has updated its Known Exploited Vulnerabilities catalog to include five new security flaws that are…

Stayin’ Alive Hacking Teleco & Government Organizations
12
Oct
2023

Stayin’ Alive Hacking Teleco & Government Organizations

Threat actors target telecoms and government ministries because they house valuable data and infrastructure.  Telecoms hold sensitive communication records and…

Juniper Networks Junos OS Flaw Let Attackers Flood the system
12
Oct
2023

Juniper Networks Junos OS Flaw Let Attackers Flood the system

Three new vulnerabilities have been discovered in Junos OS: password disclosure, MAC address validation bypass, and Time-of-check Time-of-use (TOCTOU) Race…

Google Chrome Use free in Site Isolation exploit heap corruption
12
Oct
2023

Google Chrome Use free in Site Isolation exploit heap corruption

The latest stable version of Google Chrome (version 118.0.5993.70) has been released for Mac and Linux. In contrast, the Windows…