Category: GBHackers

Threat Actors Attacking MS-SQL Servers to Deploy Ransomware
02
May
2024

Threat Actors Attacking MS-SQL Servers to Deploy Ransomware

Cybersecurity experts have uncovered a series of sophisticated cyberattacks targeting poorly managed Microsoft SQL (MS-SQL) servers. The attackers, identified as…

USB Malware Attacks Targeting Industrial Systems Adapts via
02
May
2024

USB Malware Attacks Targeting Industrial Systems Adapts via

Honeywell’s 2024 GARD USB Threat Report analyzes malware discovered on USB devices used in industrial settings, highlighting a significant increase…

REvil Ransomware Affiliate Sentenced for 13 Years in Prison
02
May
2024

REvil Ransomware Affiliate Sentenced for 13 Years in Prison

A Ukrainian national, Yaroslav Vasinskyi, has been sentenced to 13 years and seven months in prison. Vasinskyi, known in the…

Windows April Security Update Break Your VPN Connections: Microsoft
02
May
2024

Windows April Security Update Break Your VPN Connections: Microsoft

In a recent development that has caught the attention of IT administrators and users alike, Microsoft has acknowledged a significant…

Panda Restaurant Corporate Systems Hacked: Data Exposed
02
May
2024

Panda Restaurant Corporate Systems Hacked: Data Exposed

Panda Restaurant Group, Inc., a leading name in the fast-food industry, has confirmed a significant breach in its corporate data…

How to Detect Browser Data Theft Using Windows Event Logs
01
May
2024

How to Detect Browser Data Theft Using Windows Event Logs

In the ever-evolving cybersecurity landscape, Google is continually striving to protect user data from malicious actors. In a recent blog…

Millions of Malicious Docker Hub Repositories Drop Malware
01
May
2024

Millions of Malicious Docker Hub Repositories Drop Malware

In a startling revelation, nearly 20% of Docker Hub repositories have been identified as conduits for malware and phishing scams,…

LightSpy MacOS Malware
01
May
2024

Attackers Can Leverage Sidecar Container Injection For Stealthly

Kubernetes (K8s) is an open-source container orchestration platform designed to automate application container deployment, scaling, and running.  Containers are isolated…

LightSpy MacOS Malware
01
May
2024

How to Utilize Azure Logs to Identify Threats

Microsoft’s Azure platform is a highly acclaimed and widely recognized solution that organizations worldwide are leveraging. It is regarded as…

LightSpy MacOS Malware
30
Apr
2024

New Redline Malware Challenge the SOC/TI Team to Detect

The first instance of Redline using such a method is in a new variant of Redline Stealer malware that McAfee…

LightSpy MacOS Malware
30
Apr
2024

Darkgate Malware Leveraging Autohotkey Following Teams

Researchers have uncovered a novel infection chain associated with the DarkGate malware. This Remote Access Trojan (RAT), developed using Borland…

LightSpy MacOS Malware
30
Apr
2024

Safari Flaw Exposes EU iOS Users to Malicious Marketplaces

A serious concern has arisen for iPhone users in the European Union as a newly discovered flaw in Apple’s Safari…