Aggregator
CVE-2024-13776 | ZoomSounds Plugin up to 6.91 on WordPress Setting dzsap_delete_notice seen authorization
Beware! Weaponized Job Recruitment Emails Spreading BeaverTail and Tropidoor Malware
A concerning malware campaign was disclosed by the AhnLab Security Intelligence Center (ASEC), revealing how threat actors are leveraging fake recruitment emails to distribute malicious payloads. The attackers impersonated Dev.to, a prominent developer community, and lured victims with promises of lucrative job offers. Instead of attaching malware directly to emails, they provided a BitBucket link […]
The post Beware! Weaponized Job Recruitment Emails Spreading BeaverTail and Tropidoor Malware appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
ИИ научился учиться — и теперь ему не нужен человек. Он начал с Minecraft
Minnesota Tribe Struggles After Ransomware Attack
EncryptHub Ransomware Uncovered Through ChatGPT Use and OPSEC Failures
EncryptHub, a rapidly evolving cybercriminal entity, has come under intense scrutiny following revelations of operational security (OPSEC) failures and extensive reliance on ChatGPT for its operations. This emerging threat actor has been linked to ransomware campaigns, data theft, and the development of advanced malware tools, including EncryptRAT. However, critical mistakes in their operational infrastructure have […]
The post EncryptHub Ransomware Uncovered Through ChatGPT Use and OPSEC Failures appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CMMC Level 2 Documentation: What Auditors Want to See
If you’re part of the defense industrial base and you’re seeking CMMC certification, there’s a very good chance you’re aiming for Level 2. Level 1 is mostly meant for businesses with a focus on federal contract information but not CUI, while Level 3 is meant for businesses handling the most sensitive kinds of CUI; since […]
The post CMMC Level 2 Documentation: What Auditors Want to See appeared first on Security Boulevard.
How Digital Signatures Work
PoisonSeed Targets CRM and Bulk Email Providers in New Supply Chain Phishing Attack
A sophisticated phishing campaign, dubbed “PoisonSeed,” has been identified targeting customer relationship management (CRM) and bulk email providers to facilitate cryptocurrency-related scams. The threat actors behind this campaign are leveraging compromised credentials to export email lists and send bulk phishing emails, aiming to compromise cryptocurrency wallets through a novel seed phrase poisoning technique. Phishing Tactics […]
The post PoisonSeed Targets CRM and Bulk Email Providers in New Supply Chain Phishing Attack appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Beware! Fake Unpaid Tolls Messages Used in Phishing Attack to Steal Login Credentials
A surge in phishing text messages claiming unpaid tolls has been linked to a massive phishing-as-a-service (PhaaS) operation. These scams, which have been hitting users’ phones in waves, are part of a sophisticated campaign leveraging a platform called Lucid. Cybercriminals behind this scheme are exploiting legitimate communication technologies like Apple iMessage and Android RCS to […]
The post Beware! Fake Unpaid Tolls Messages Used in Phishing Attack to Steal Login Credentials appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Interlock
Interlock
State Bar of Texas Confirms Data Breach, Begins Notifying Affected Consumers
The State Bar of Texas has confirmed a data breach following the detection of unauthorized activity on its network earlier this year. According to an official notice, the breach occurred between January 28, 2025, and February 9, 2025, during which an unauthorized actor gained access to sensitive information stored on the organization’s systems. The intrusion […]
The post State Bar of Texas Confirms Data Breach, Begins Notifying Affected Consumers appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Apache security advisory (AV25-185)
Hackers Use URL Shorteners and QR Codes in Tax-Themed Phishing Attacks
As the United States approaches Tax Day on April 15, cybersecurity experts have uncovered a series of sophisticated phishing campaigns leveraging tax-related themes to exploit unsuspecting users. Microsoft has identified these campaigns as employing advanced redirection techniques such as URL shorteners and QR codes embedded in malicious attachments to evade detection. By abusing legitimate services […]
The post Hackers Use URL Shorteners and QR Codes in Tax-Themed Phishing Attacks appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Port of Seattle says ransomware breach impacts 90,000 people
Beware of Clickfix: ‘Fix Now’ and ‘Bot Verification’ Lures Deliver and Execute Malware
A sophisticated browser-based malware delivery method, dubbed ClickFix, has emerged as a significant threat to cybersecurity. Leveraging deceptive prompts like “Fix Now” and “Bot Verification,” ClickFix tricks users into executing malicious commands by exploiting familiar system actions. This technique bypasses conventional download workflows, relying on clipboard hijacking and user interaction to stage and execute malware. […]
The post Beware of Clickfix: ‘Fix Now’ and ‘Bot Verification’ Lures Deliver and Execute Malware appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
DeepSeek-R1 Prompts Abused to Generate Advanced Malware and Phishing Sites
The release of DeepSeek-R1, a 671-billion-parameter large language model (LLM), has sparked significant interest due to its innovative use of Chain-of-Thought (CoT) reasoning. CoT reasoning enables the model to break down complex problems into intermediate steps, enhancing performance on tasks such as mathematical problem-solving. However, this transparency comes with unintended vulnerabilities. By explicitly sharing its […]
The post DeepSeek-R1 Prompts Abused to Generate Advanced Malware and Phishing Sites appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Malicious PyPI Package Targets E-commerce Sites with Automated Carding Script
Cybersecurity researchers from Socket have exposed a malicious Python package on PyPI, named disgrasya, designed to automate credit card fraud on WooCommerce-based e-commerce sites. Unlike conventional supply chain attacks that rely on deception or typosquatting, disgrasya was overtly malicious, leveraging PyPI as a distribution platform to reach a broad audience of fraudsters. The package specifically […]
The post Malicious PyPI Package Targets E-commerce Sites with Automated Carding Script appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
New Credit Card Skimming Campaign Uses Browser Extensions to Steal Financial Data
A newly discovered credit card skimming campaign, dubbed “RolandSkimmer,” is exploiting browser extensions to exfiltrate sensitive financial data. This advanced malware has been observed targeting users primarily in Bulgaria and operates across popular web browsers, including Chrome, Edge, and Firefox. The campaign leverages deceptive techniques to establish persistence, evade detection, and steal payment information. Attack […]
The post New Credit Card Skimming Campaign Uses Browser Extensions to Steal Financial Data appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.