Category: GBHackers

WordPress Plugin Godzilla
06
Mar
2024

Hackers Install macOS Malware Via Weaponised Calendar Invites

Hackers use weaponized calendar invites to exploit vulnerabilities in email systems, tricking users into clicking on malicious links or downloading…

WordPress Plugin Godzilla
06
Mar
2024

Hackers use Zoom & Google Meet Lures to Attack Android & Windows

A threat actor has been identified as creating fraudulent Skype, Google Meet, and Zoom websites to distribute malware, explicitly targeting…

WordPress Plugin Godzilla
06
Mar
2024

Project DDoSia – Russian Hackers Planning Massive DDoS Attack

Hackers launch large-scale DDoS attacks to disrupt and make online services inaccessible, driven by motives like revenge or protest, flooding…

Hackers Exploit WordPress Plugin Flaw to Deploy Godzilla
06
Mar
2024

Hackers Exploit WordPress Plugin Flaw to Deploy Godzilla

Hackers have been found exploiting a vulnerability in a WordPress Plugin 3DPrint Lite(CVE-2021-4436) to deploy the notorious Godzilla Web Shell….

How to Create a Sandbox Environment For Malware Analysis - A Complete Guide - GBHackers on Security
05
Mar
2024

How to Create a Sandbox Environment For Malware Analysis – A Complete Guide – GBHackers on Security

In cybersecurity, the battle against malware is critical, akin to handling dangerous pathogens. The importance of secure environments for analyzing…

ALPHV BlackCat New Leak Site Seized by Authorities
05
Mar
2024

ALPHV BlackCat New Leak Site Seized by Authorities

The Federal Bureau of Investigation (FBI) has successfully seized a website associated with the ALPHV BlackCat ransomware group. The seizure…

RA World Ransomware Attack Windows Using Hacked Domains
05
Mar
2024

RA World Ransomware Attack Windows Using Hacked Domains

Threat actors use hacked domain control to host malicious content by leveraging legitimate domains to evade detection by security measures. …

CACTUS Hackers Exploiting Bug to Attack Corporate Networks
05
Mar
2024

CACTUS Hackers Exploiting Bug to Attack Corporate Networks

Threat actors known as CACTUS orchestrated a sophisticated attack on two companies simultaneously, exploiting a software vulnerability within 24 hours…

Ransomware-as-a-Service Attacks targeting Middle East & Africa
04
Mar
2024

Ransomware-as-a-Service Attacks targeting Middle East & Africa

The Middle East and Africa (MEA) region has witnessed a surge in ransomware-as-a-service (RaaS) attacks, posing a grave threat to…

US Court Orders NSO Group to Disclose WhatsApp Pegasus Spyware Code
04
Mar
2024

US Court Orders NSO Group to Disclose WhatsApp Pegasus Spyware Code

Meta, the company that owns WhatsApp, filed a lawsuit against NSO Group in 2019. The lawsuit claims that NSO took…

U.S. Charged Iranian Hacker, Rewards up to $10 Million
04
Mar
2024

U.S. Charged Iranian Hacker, Rewards up to $10 Million

The United States Department of Justice (DoJ) has charged an Iranian national, Alireza Shafie Nasab, for his alleged involvement in…

SSO-Based Phishing Attack Trick Users into Sharing Login Credentials  
04
Mar
2024

SSO-Based Phishing Attack Trick Users into Sharing Login Credentials  

Threat actors employ phishing scams to trick individuals into giving away important details like login credentials or financial data.  It…