Category: GBHackers

Google Patches Chrome Zero-Day: Confusion in V8 JavaScript
27
May
2024

Google Patches Chrome Zero-Day: Confusion in V8 JavaScript

Google has released a patch for a zero-day exploit in its Chrome browser. The vulnerability, identified as CVE-2024-5274, involves a…

Hackers Created Rogue VMs in Recent MITRE’s Cyber Attack
27
May
2024

Hackers Created Rogue VMs in Recent MITRE’s Cyber Attack

State-sponsored hackers recently exploited vulnerabilities in MITRE’s Networked Experimentation, Research, and Virtualization Environment (NERVE). They used rogue virtual machines (VMs)…

Malicious PyPI & NPM Packages Attacking MacOS Users
24
May
2024

Malicious PyPI & NPM Packages Attacking MacOS Users

Cybersecurity researchers have identified a series of malicious software packages targeting MacOS users. These packages, found on the Python Package…

Chinese Hackers Stay Hidden On Military & Government Networks
24
May
2024

Chinese Hackers Stay Hidden On Military & Government Networks

Hackers target military and government networks for varied reasons, primarily related to spying, which involves interference in the functioning of…

NSA Releases Guidance On Zero Trust Maturity Secure Application
24
May
2024

NSA Releases Guidance On Zero Trust Maturity Secure Application

Zero Trust Maturity measures the extent to which an organization has adopted and implemented the Zero Trust security model.  It…

Kinsing Malware Attacking Apache Tomcat Server With Vulnerabilities
24
May
2024

Kinsing Malware Attacking Apache Tomcat Server With Vulnerabilities

The scalability and flexibility of cloud platforms recently boosted the emerging trend of cryptomining attacks in the cloud. Unlike on-premises…

Hackers Weaponizing Microsoft Access Documents To Execute Malicious Program
24
May
2024

Hackers Weaponizing Microsoft Access Documents To Execute Malicious Program

In multiple aggressive phishing attempts, the financially motivated organization UAC-0006 heavily targeted Ukraine, utilizing ZIP and RAR attachments to distribute…

Microsoft Warns Of Storm-0539's Aggressive Gift Card Theft
24
May
2024

Microsoft Warns Of Storm-0539’s Aggressive Gift Card Theft

Gift cards are attractive to hackers since they provide quick monetization for stolen data or compromised systems. Reselling gift cards…

A New DoS Attack That Exploits DNS Queries
24
May
2024

A New DoS Attack That Exploits DNS Queries

A new practical and powerful Denial of service attack has been discovered that exploits DNS queries and responses. This new…

Beware Of HTML That Masquerade As PDF Viewer Login Pages
24
May
2024

Beware Of HTML That Masquerade As PDF Viewer Login Pages

Phishing attacks have evolved into increasingly sophisticated schemes to trick users into revealing their personal information. One such method that has gained prominence involves phishing emails masquerading as PDF viewer login pages….

Authorities Seized Dark Offering Illicit Goods
24
May
2024

Authorities Seized Dark Offering Illicit Goods

Law enforcement agencies have successfully dismantled several dark web marketplaces offering illicit goods. Dubbed “Operation SpecTor,” this coordinated crackdown marks…

Spyware App Found Running on Multiple US Hotel Computers
23
May
2024

Spyware App Found Running on Multiple US Hotel Computers

A consumer-grade spyware app named pcTattletale has been discovered running on the check-in systems of at least three Wyndham hotels…