Aggregator
CVE-2024-10715 | MapPress Maps Plugin up to 2.94.1 on WordPress Map Block cross site scripting
CVE-2024-52043 | HumHub up to 1.16.2 on Linux observable response discrepancy
Личное не личное: в сети данные 90% россиян
Researchers Detailed Credential Abuse Cycle
The United States Department of Justice has unsealed an indictment against Anonymous Sudan, a hacking group responsible for distributed denial-of-service attacks. LameDuck, a new threat actor, has carried out several massive distributed denial of service (DDoS) attacks to affect critical infrastructure, cloud providers, and various industries. The group leverages social media to amplify its impact […]
The post Researchers Detailed Credential Abuse Cycle appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Rise Of Ransomware-As-A-Service Leads To Decline Of Custom Tools
Ransomware-as-a-Service (RaaS) platforms have revolutionized the ransomware market. Unlike traditional standalone ransomware sales, RaaS offers a subscription-based model where attackers can access pre-built ransomware tools and infrastructure without significant upfront costs. These platforms provide user-friendly dashboards, customization options, and ongoing support, lowering the barrier of entry for cybercriminals, which has made ransomware attacks more accessible […]
The post Rise Of Ransomware-As-A-Service Leads To Decline Of Custom Tools appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
North Korean Hackers Employing New Tactic To Acruire Remote Jobs
North Korean threat actors behind the Contagious Interview and WageMole campaigns have refined their tactics, enhancing the obfuscation of their scripts to evade detection. InvisibleFerret now boasts a dynamic RMM configuration and OS-specific persistence mechanisms, while Contagious Interview has expanded its arsenal with macOS applications, targeting a wider victim pool. These attacks have compromised over […]
The post North Korean Hackers Employing New Tactic To Acruire Remote Jobs appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CRON#TRAP Campaign Attacks Windows Machine With Weaponized Linux Virtual Machine
Weaponized Linux virtual machines are used for offensive cybersecurity purposes, such as “penetration testing” or “exploiting vulnerabilities.” These setups often use the tools and frameworks that are designed for ethical hacking. Securonix researchers recently detected CRON#TRAP campaign that has been attacking Windows machines with weaponized Linux virtual machines. Technical analysis CRON#TRAP is a sophisticated cyber […]
The post CRON#TRAP Campaign Attacks Windows Machine With Weaponized Linux Virtual Machine appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
HookBot Malware Use Overlay Attacks Impersonate As Popular Brands To Steal Data
The HookBot malware family employs overlay attacks to trick users into revealing sensitive information by impersonating various brands and apps to gain trust. It also utilizes C2 servers to receive updates and evolve continuously. A builder tool empowers threat actors to create custom HookBot apps as the malware is often distributed through Telegram, where it’s […]
The post HookBot Malware Use Overlay Attacks Impersonate As Popular Brands To Steal Data appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Trauma in beeld: inzicht in de hersenen
Helldown
Helldown
ToxicPanda Banking Malware Attacking Banking Users To Steal Logins
Recent research has uncovered a new strain of malware developed for Android devices, initially misidentified as TgToxic. Despite sharing some bot command similarities, this malware, now dubbed ToxicPanda, exhibits significant code divergence from its original source. It lacks key TgToxic capabilities and possesses placeholder commands without functional implementation. The malware leverages Remote Access capabilities to […]
The post ToxicPanda Banking Malware Attacking Banking Users To Steal Logins appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.