Category: GBHackers

Hackers Use Weaponized Lnk File to Deploy AutoIt Malware
14
Mar
2024

Hackers Use Weaponized Lnk File to Deploy AutoIt Malware

Hackers have been found utilizing weaponized LNK files to deploy a strain of AutoIt malware, raising alarms across the cybersecurity…

Combining Threat Intelligence Platforms & Sandboxes
14
Mar
2024

Combining Threat Intelligence Platforms & Sandboxes

Organizations have many tools when investigating cyber threats, but two stand out: Threat Intelligence Platforms (TIPs) and sandboxes. Each solution…

Hackers Abuse DDP Websites to Launch Cyber Attacks
14
Mar
2024

Hackers Abuse DDP Websites to Launch Cyber Attacks

Threat actors have been observed hosting phishing documents on legitimate digital document publishing (DDP) sites as part of continuous session…

AI tool to help security and IT
14
Mar
2024

AI tool to help security and IT

Microsoft Copilot for security was a generative AI solution that can help security and IT professionals handle their security operations…

Bitcoin Fog Operator Convicted for Stealing Over $400M
14
Mar
2024

Bitcoin Fog Operator Convicted for Stealing Over $400M

A federal jury in Washington, D.C., has convicted Roman Sterlingov, a dual Russian-Swedish national, for operating the notorious darknet cryptocurrency…

150K+ Networking Devices & Apps Exposed With Vulnerabilities
14
Mar
2024

150K+ Networking Devices & Apps Exposed With Vulnerabilities

The “State of the UAE—Cybersecurity Report 2024,” a collaborative effort by the UAE Cyber Security Council and CPX Holding, has…

Hackers Abuse Amazon & GitHub to Deploy Java-based Malware
14
Mar
2024

Hackers Abuse Amazon & GitHub to Deploy Java-based Malware

Hackers target these platforms due to their hosting of valuable resources and data. For financial gain or some other bad…

New Fortinet FortiOS Flaw Lets Attacker Execute Arbitrary Code
13
Mar
2024

New Fortinet FortiOS Flaw Lets Attacker Execute Arbitrary Code

Fortinet has disclosed a critical vulnerability in its FortiOS and FortiProxy captive portal systems, potentially allowing attackers to execute arbitrary…

Code Injection & Other Vulnerabilities Patched
13
Mar
2024

Code Injection & Other Vulnerabilities Patched

Organizations using SAP products are urged to prioritize patching vulnerabilities outlined in the latest SAP Security Notes, which was released…

Beware Of New Malicious PyPI Packages Attack Crypto Wallets
13
Mar
2024

Beware Of New Malicious PyPI Packages Attack Crypto Wallets

Threat actors use malicious PyPI packages to infiltrate systems and execute various attacks like data exfiltration, ransomware deployment, or system…

Magnet-Goblin
13
Mar
2024

Stanford University Hack Exposes Over 27K People’s Data

The Stanford University data breach involved a ransomware attack by the Akira ransomware gang. The breach occurred between May 12,…

Magnet-Goblin
13
Mar
2024

Sharp Increase in Akira Ransomware Attack Following LockBit

In the wake of the LockBit ransomware group’s takedown, a shift has occurred within the cybercriminal underworld, leading to a…