Category: GBHackers
Hackers have been found utilizing weaponized LNK files to deploy a strain of AutoIt malware, raising alarms across the cybersecurity…
Organizations have many tools when investigating cyber threats, but two stand out: Threat Intelligence Platforms (TIPs) and sandboxes. Each solution…
Threat actors have been observed hosting phishing documents on legitimate digital document publishing (DDP) sites as part of continuous session…
Microsoft Copilot for security was a generative AI solution that can help security and IT professionals handle their security operations…
A federal jury in Washington, D.C., has convicted Roman Sterlingov, a dual Russian-Swedish national, for operating the notorious darknet cryptocurrency…
The “State of the UAE—Cybersecurity Report 2024,” a collaborative effort by the UAE Cyber Security Council and CPX Holding, has…
Hackers target these platforms due to their hosting of valuable resources and data. For financial gain or some other bad…
Fortinet has disclosed a critical vulnerability in its FortiOS and FortiProxy captive portal systems, potentially allowing attackers to execute arbitrary…
Organizations using SAP products are urged to prioritize patching vulnerabilities outlined in the latest SAP Security Notes, which was released…
Threat actors use malicious PyPI packages to infiltrate systems and execute various attacks like data exfiltration, ransomware deployment, or system…
The Stanford University data breach involved a ransomware attack by the Akira ransomware gang. The breach occurred between May 12,…
In the wake of the LockBit ransomware group’s takedown, a shift has occurred within the cybercriminal underworld, leading to a…