Category: GBHackers

Brute-Force SSH Attacks
10
Apr
2024

Match Systems publishes report on the consequences of CBDC implementation

Match Systems, a leading authority in crypto crimes investigations and crypto AML solutions provider, has published a comprehensive analytical report…

Brute-Force SSH Attacks
10
Apr
2024

Real-World Law Enforcement Hack of End-to-Encrypted Chat Messenger

Law enforcement authorities successfully penetrated EncroChat, an encrypted chat program that is frequently used by criminals, in a ground-breaking operation…

Microsoft Patch Tuesday : 149 Vulnerabilities Fixed
10
Apr
2024

Brute-Force SSH Attacks Rampant in the Wild

A comprehensive four-year study of brute-force attacks against SSH servers has revealed an alarming increase in the frequency and sophistication…

Cypago Announces New Automation Support for AI Security and Governance
10
Apr
2024

Beware of Encrypted Phishing Attack With Weaponized SVG Files

Attackers are now leveraging encrypted phishing emails that utilize Scalable Vector Graphics (SVG) files to execute malicious JavaScript code. The…

Microsoft Patch Tuesday : 149 Vulnerabilities Fixed
10
Apr
2024

Cypago Announces New Automation Support for AI Security and Governance

Cyber GRC software company Cypago has announced a new automation solution for artificial intelligence (AI) governance, risk management and compliance….

Microsoft Patch Tuesday : 149 Vulnerabilities Fixed
10
Apr
2024

Flaws in 90k+ LG WebOS TVs

Bitdefender, the cybersecurity firm, has unveiled a series of critical vulnerabilities in LG’s WebOS TVs, affecting over 91,000 devices worldwide….

149 Security Vulnerabilities & Zero-days
10
Apr
2024

149 Security Vulnerabilities & Zero-days

On April Patch Tuesday, Microsoft fixed 149 bugs—one of the biggest security update releases in the company’s history.  Many of…

RUBYCARP the SSH Brute Botnet Resurfaces With New Tools
10
Apr
2024

RUBYCARP the SSH Brute Botnet Resurfaces With New Tools

The cybersecurity community is again on high alert as the notorious botnet group RUBYCARP, known for its SSH brute force…

Critical Rust Flaw Let Attackers Inject Commands on Windows
10
Apr
2024

Critical Rust Flaw Let Attackers Inject Commands on Windows

A new critical vulnerability has been discovered in two of the Rust standard libraries, which could allow a threat actor…

Google Adds V8 Sandbox
10
Apr
2024

New SharePoint Technique Lets Hackers Bypass Security

Two new techniques uncovered in SharePoint enable malicious actors to bypass traditional security measures and exfiltrate sensitive data without triggering…

How to Use Cyber Threat Intelligence ? 4 TI Categories
10
Apr
2024

How to Use Cyber Threat Intelligence ? 4 TI Categories

Cyber Threat Intelligence (CTI) is a process that actively gathers and analyzes information on potential cyber threats, including Indicators of…

Google Adds V8 Sandbox
10
Apr
2024

D-Link RCE Vulnerability (CVE-2024-3273) Exploited in Wild

Cybercriminals have actively exploited a critical vulnerability in D-Link Network Attached Storage (NAS) devices globally. Identified as CVE-2024-3273, this remote…