Threat actors have claimed responsibility for a data breach involving Heineken employees. The news broke through a post on the social media platform tweeted by the account DarkWebInformer, which specializes in monitoring and reporting on dark web activities. Details of…
Category: GBHackers on Security | #1 Globally Trusted Cyber Security News Platform
ELLIO and ntop partnership to boost high-speed network traffic monitoring with real-time data on opportunistic scans, botnets, and mass attacks
ELLIO, a provider of real-time, highly accurate intelligence for filtering of unwanted network traffic and cybernoise, and ntop, a provider of open-source and commercial high-speed traffic monitoring applications, have announced a partnership to enhance visibility into malicious traffic originating from…
DDoS-as-a-Service Botnet Backed by Mirai Attacking Gaming Community
DDoS-as-a-Service botnets are used by hackers to facilitate the most easily and cheaply launch of devastating distributed denial-of-service (DDoS) attacks. Purposely, these botnets are made up of hacked devices that can be rented or leased to cause service disruptions or…
Hackers Weaponizing MS Office-Cracked Versions to Deliver Malware
Attackers in South Korea are distributing malware disguised as cracked software, including RATs and crypto miners, and registering themselves with the Task Scheduler to ensure persistence. Even after removing the initial malware, the Task Scheduler triggers PowerShell commands to download…
FlyingYeti Exploits WinRAR Vulnerability For Targeted Malware Attacks
Ever since Russia’s invasion of Ukraine on February 24, 2022, there have been heavy tensions between the nations and worldwide. After this incident, Ukraine imposed an eviction and termination moratorium on utility services for unpaid debt, ending in January 2024.…
LilacSquid Hackers Attacking IT Industries To Harvest Confidential Data
Hackers target IT industries as they hold valuable data, possess critical infrastructure, and often have access to sensitive information from various sectors. Compromising IT companies can provide hackers with high-impact opportunities for espionage, financial gain, and disruption of essential services.…
Hackers Exploiting Stored XSS Vulnerabilities in WordPress Plugins
In recent cyberattacks, hackers are actively exploiting stored cross-site scripting (XSS) vulnerabilities in various WordPress plugins. According to Fastly reports, these vulnerabilities, identified as CVE-2024-2194, CVE-2023-6961, and CVE-2023-40000, are targeted due to inadequate input sanitization and output escaping, allowing attackers…
VirusTotal Celebrates 20th Anniversary, What’s Next?
VirusTotal, a leading online service for analyzing files and URLs for viruses, worms, trojans, and other malicious content, is celebrating its 20th anniversary. Since its inception in 2004, VirusTotal has become an indispensable tool for cybersecurity professionals and enthusiasts worldwide.…
Beware of Fake Browser Updates That Deliver Bitrat & Lumma Stealer
eSentire’s Threat Response Unit (TRU) uncovered a sophisticated malware campaign involving fake browser updates. This campaign has been responsible for delivering two dangerous malware variants:BitRAT and Lumma Stealer. The attackers use fake update mechanisms to trick users into downloading malicious…
Progress Telerik Report Server Flaw Let Attackers Bypass Authentication
A new vulnerability related to authentication bypass was discovered in the Progress Telerik Report server. The CVE for this vulnerability has been assigned CVE-2024-4358, and its severity has been given as 9.8 (Critical). This vulnerability exists in Telerik Report Server…