Category: GBHackers

Octo Tempest Know for Attacking VMWare ESXi Servers Added RansomHub & Qilin to Its Arsenal
18
Jul
2024

MacOS Users Beware Of Weaponized Meeting App From North Korean Hackers

Meeting apps are often targeted and turned into weapons by hackers as they are largely employed for communication and collaboration,…

Octo Tempest Know for Attacking VMWare ESXi Servers Added RansomHub & Qilin to Its Arsenal
18
Jul
2024

TAG-100 Actors Using Open-Source Tools To Attack Gov & Private Organizations

Hackers exploit open-source tools to execute attacks because they are readily available, well-documented, and often have extensive community support, making…

Octo Tempest Attacking VMWare ESXi Servers Added new Ransom Tools
18
Jul
2024

Octo Tempest Attacking VMWare ESXi Servers Added new Ransom Tools

Threat actors often attack VMware ESXi servers since they accommodate many virtual machines, which link to a variety of systems…

Volcano Demon Group Attacking Organizations With LukaLocker Ransomware
18
Jul
2024

MuddyWater Hackers Deploy Legitimate RMM With BugSleep Malware

Since October 2023, MuddyWater, which is an Iranian threat group linked to MOIS, has escalated its phishing campaigns in Middle…

Volcano Demon Group Attacking Organizations With LukaLocker Ransomware
18
Jul
2024

New TE.0 HTTP Request Smuggling Flaw Impacts Google Cloud Websites

HTTP Request Smuggling is a flaw in web security that is derived from variations in the way different web servers…

Volcano Demon Group Attacking Organizations With LukaLocker Ransomware
18
Jul
2024

Cybercriminals Exploit Attack on Donald Trump for Crypto Scams

Researchers at Bitdefender Labs remain ever-vigilant, informing users about the latest scams and internet perils that threaten their security and…

Resonance Launches Harmony to Monitor and Detect Threats to Web2 and Web3 Apps
17
Jul
2024

Volcano Demon Group Attacking Organizations With LukaLocker Ransomware

The Volcano Demon group has been discovered spreading a new ransomware called LukaLocker, which targets Idealease Inc., a truck leasing…

MirrorFace Attacking Organizations
17
Jul
2024

Resonance Launches Harmony to Monitor and Detect Threats to Web2 and Web3 Apps

Quick take: Harmony is the fourth cybersecurity application Resonance developed to address the disconnect in cybersecurity practices. Harmony captures continuous…

MirrorFace Attacking Organizations
17
Jul
2024

Beware of New Phishing tactics impersonating HR & Attacking Employees

Phishing attacks are becoming increasingly sophisticated, and the latest strategy targeting employees highlights this evolution. This new phishing attempt impersonates…

MirrorFace Attacking Organizations Exploiting Vulnerabilities
16
Jul
2024

MirrorFace Attacking Organizations Exploiting Vulnerabilities

MirrorFace threat actors have been targeting media, political organizations, and academic institutions since 2022, shifting focus to manufacturers and research…

HardBit Ransomware Using Passphrase Protection To Evade Detection
16
Jul
2024

HardBit Ransomware Using Passphrase Protection To Evade Detection

In 2022, HardBit Ransomware emerged as version 4.0. Unlike typical ransomware groups, this ransomware doesn’t use leak sites or double…

New Poco RAT Weaponizing 7zip Files Using Google Drive
16
Jul
2024

New Poco RAT Weaponizing 7zip Files Using Google Drive

The hackers weaponize 7zip files to pass through security measures and deliver malware effectively. These archived files can hide malicious…