Category: GBHackers

Mirai-based DDoS Attackers Adopted New Router Exploits
10
Oct
2023

Mirai-based DDoS Attackers Adopted New Router Exploits

In September 2023, FortiGuard Labs’ vigilant team uncovered a significant development in the IZ1H9 Mirai-based DDoS campaign.  This campaign, known…

MacOS DirtyNIB Vulnerability Let Attackers Execute Malicious Code
10
Oct
2023

MacOS DirtyNIB Vulnerability Let Attackers Execute Malicious Code

A new zero-day vulnerability has been discovered in Apple’s macOS systems, which allows threat actors to execute code on behalf…

Video Surveillance Camera Vulnerability to Disable Alarms
09
Oct
2023

Video Surveillance Camera Vulnerability to Disable Alarms

Pablo Martínez, a member of the Red Team at cybersecurity firm Entelgy Innotec Security, has uncovered significant vulnerabilities in low-cost…

Maintainers of a open tool Warns of Critical Curl Vulnerability
09
Oct
2023

Maintainers of a open tool Warns of Critical Curl Vulnerability

Two new vulnerabilities have been discovered in the widely used Curl tool. These two vulnerabilities are identified as CVE-2023-38545 and…

Lazarus APT Group Laundered $900 Million of Cryptocurrency
09
Oct
2023

Lazarus APT Group Laundered $900 Million of Cryptocurrency

Threat actors have been laundering currencies with multiple methods. One of the most predominant ways they have been using lately…

Chinese Android-based Devices come pre-installed With Firmware
09
Oct
2023

Chinese Android-based Devices come pre-installed With Firmware

The Trojan War’s famous horse trick inspired the term for cyberattacks, where a user unwittingly downloads a file that causes…

10 Cybersecurity Misconfigurations
09
Oct
2023

Qakbot Deliver Knight Ransomware & Weaponized LNK Files

Qakbot’s infrastructure and cryptocurrency assets were seized by government authorities in an operation in August 2023 with the assistance of…

Chinese Hackers Attacking Industries using Cobalt Strike beacon
09
Oct
2023

Chinese Hackers Attacking Industries using Cobalt Strike beacon

A cyber espionage campaign has been discovered in which threat actors use a variant of the HyperBro loader along with…

Storm-0324 Abusing Microsoft Teams To Gain Access & Deploy Ransomware
06
Oct
2023

Storm-0324 Abusing Microsoft Teams To Gain Access & Deploy Ransomware

Storm-0324, a financially driven threat actor group, was detected delivering phishing messages using Microsoft Teams. In the past, it has…

10 Cybersecurity Misconfigurations
06
Oct
2023

Top 10 Cybersecurity Misconfigurations for Assessments

In a recent joint effort to bolster national cybersecurity, the National Security Agency (NSA) and the Cybersecurity and Infrastructure Security…

LightSpy APT Attacking WeChat Users
05
Oct
2023

Top 7 REST API Security Strategies to Secure Your Endpoints

In today’s REST API-driven landscape, most APIs are REST-based and widely utilized by web applications. These APIs are like versatile…

Hackers Exploit Atlassian Confluence Zero-day Flaw
05
Oct
2023

Hackers Exploit Atlassian Confluence Zero-day Flaw

The widely adopted Atlassian Confluence has been discovered with a zero-day vulnerability, which could allow threat actors to create an…