Category: GBHackers

Data Center Cooling Systems
10
May
2024

Researchers Hacked into Apple Infrastructure Using SQL Injection

Researchers found several points of entry for potential attackers, one of which was Apple’s Book Travel portal, where they took…

Cyber Attack On Data Center Cooling Systems Leads To Disruption
09
May
2024

Cyber Attack On Data Center Cooling Systems Leads To Disruption

Critical operational elements such as data storage, processing, backups, and recovery heavily rely on Australian industrial organizations’ data centers. These…

Data Center Cooling Systems
09
May
2024

Threat Actors Accessed Cancer patients’ Data left Open

Guardant Health, a leading cancer screening and precision medicine company, has disclosed a data breach that left sensitive patient information…

SocGholish Attacks Enterprises Via Fake Browser Updates
09
May
2024

SocGholish Attacks Enterprises Via Fake Browser Updates

Enterprises are being targeted by the malware known as SocGholish through deceptive browser update prompts. This malware, notorious for its…

Alert! Hackers Running Thousands of Fake Webshops
09
May
2024

Alert! Hackers Running Thousands of Fake Webshops

A sprawling cybercrime network, “BogusBazaar,” has stolen credit card details from over 850,000 online shoppers, mainly in Western Europe and…

F5's Next Central Manager Vulnerabilities Let Hackers Take Full Device Control Remotely
09
May
2024

F5’s Next Central Manager Vulnerabilities Let Hackers Take Full Device Control Remotely

In a significant cybersecurity development, researchers have uncovered critical vulnerabilities in F5’s Next Central Manager, which could potentially allow attackers…

Bangladesh IT Database Compromise: 95k Email Address Leaked
09
May
2024

Bangladesh IT Database Compromise: 95k Email Address Leaked

Tappware, a prominent IT service provider, faced a breach when approximately 50GB of its database was leaked on a hacker…

Polish Government Under Cyber Attack From APT28 Hacker Group
09
May
2024

Polish Government Under Cyber Attack From APT28 Hacker Group

The Polish computer emergency response team CERT.pl has issued a warning about an ongoing cyberattack campaign by the notorious APT28…

How Does ANY RUN Sandbox Protect Enterprise Users
08
May
2024

How Does ANY RUN Sandbox Protect Enterprise Users

Ensuring adherence to GDPR, the ANY RUN sandbox service employs TLS 1.3 for data in transit and AES-256 for data…

Xiid SealedTunnel: Unfazed by Yet Another Critical Firewall Vulnerability (CVE-2024-3400)
08
May
2024

Free Workshop from Security Risk Advisors Empowers Organizations to Select Optimal OT Security Tools – GBHackers on Security

Security Risk Advisors (SRA) announces the launch of their OT/XIoT Detection Selection Workshop, a complimentary offering designed to assist organizations…

Hackers Employing Steganography Method to Deliver RemcosRAT
08
May
2024

Hackers Employing Steganography Method to Deliver RemcosRAT

Hackers are now using steganography techniques to distribute the notorious Remote Access Trojan (RAT) known as RemcosRAT. This method, which…

CrushFTP Vulnerability Exploited in Wild to Execute Remote Code
08
May
2024

CrushFTP Vulnerability Exploited in Wild to Execute Remote Code

A critical vulnerability in CrushFTP, identified as CVE-2024-4040, has been actively exploited in the wild. It allows attackers to perform…