Category: GBHackers

Compromised SaaS Supply Chain Apps
29
Mar
2024

Utilizing LNK & HTA File

The notorious WarzoneRAT malware has made a comeback, despite the FBI’s recent efforts to dismantle its operations. Initially detected in…

Compromised SaaS Supply Chain Apps
29
Mar
2024

Beware Of Weaponized Air Force invitation PDF Targeting Indian Defense And Energy Sectors

EclecticIQ cybersecurity researchers have uncovered a cyberespionage operation dubbed “Operation FlightNight” targeting Indian government entities and energy companies.  The attackers,…

Global Threat Intelligence
29
Mar
2024

How to Analyse .NET Malware

Utilizing sandbox analysis for behavioral, network, and process examination provides a foundation for reverse engineering .NET malware.  The write-up outlines…

IT and security Leaders Feel Ill-Equipped to Handle Threats
29
Mar
2024

IT and security Leaders Feel Ill-Equipped to Handle Threats

A comprehensive survey conducted by Keeper Security, in partnership with TrendCandy Research, has shed light on the growing concerns within…

GoPlus's Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats - GBHackers on Security
28
Mar
2024

GoPlus’s Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats – GBHackers on Security

GoPlus Labs, the leading Web3 security infrastructure provider, has unveiled a groundbreaking report highlighting the growing, widespread use and potential…

Zoom Unveils AI-Powered All-In-One AI Work Workplace
28
Mar
2024

Zoom Unveils AI-Powered All-In-One AI Work Workplace

Zoom has taken a monumental leap forward by introducing Zoom Workplace, an all-encompassing AI-powered platform designed to redefine how we…

Wireshark 4.2.4 Released : What’s new!
28
Mar
2024

Wireshark 4.2.4 Released: What’s New!

Wireshark stands as the undisputed leader, offering unparalleled tools for troubleshooting, analysis, development, and education. The latest update, Wireshark 4.2.4,…

iPhone Users Beware! Darcula Phishing Service Attacking Via iMessage
28
Mar
2024

iPhone Users Beware! Darcula Phishing Service Attacking Via iMessage

Phishing allows hackers to exploit human vulnerabilities and trick users into revealing sensitive information and grant unauthorized access. It’s an…

The Moon Malware Hacked 6k ASUS Routers to Use for Proxy
28
Mar
2024

The Moon Malware Hacked 6k ASUS Routers to Use for Proxy

Black Lotus Labs discovered a multi-year campaign by TheMoon malware targeting vulnerable routers and turning them into bots for the…

2 Chrome Zero-Days Exploited At Pwn2Own 2024 : Patch Now
28
Mar
2024

2 Chrome Zero-Days Exploited at Pwn2Own 2024: Patch Now

Google has announced a crucial update to its Chrome browser, addressing several vulnerabilities, including two zero-day exploits showcased at the…

Microsoft Expands Edge Bounty Program to Include WebView2!
27
Mar
2024

Microsoft Expands Edge Bounty Program to Include WebView2!

Microsoft announced that Microsoft Edge WebView2 eligibility and specific out-of-scope information are now included in the Edge Bounty Program. The…

Hackers Exploiting Ray AI Framework Flaw to Hack Servers
27
Mar
2024

Hackers Exploiting Ray AI Framework Flaw to Hack Servers

A critical vulnerability in Ray, an open-source AI framework that is widely utilized across various sectors, including education, cryptocurrency, and…