A new RAT malware has been discovered to be targeting Android devices. This malware is capable of executing additional commands compared to other RAT malware. This malware can also perform phishing attacks by disguising itself as legitimate applications like Snapchat,…
Category: GBHackers on Security | #1 Globally Trusted Cyber Security News Platform
LightSpy Malware Actively Targeting MacOS Devices
BlackBerry reported a new iOS LightSpy malware, but Huntress researchers found it to be a macOS variant targeting Intel or Apple Silicon with Rosetta 2-enabled devices. This caused media confusion, as Apple’s recent spyware alert likely referred to Pegasus spyware,…
Kaiser Permanente Cyber Attack Exposes 13.4 Million Users Data
Kaiser Permanente, one of the largest healthcare providers in the United States, was the victim of a cyber attack that compromised the personal information of approximately 13.4 million users. This incident, which involved unauthorized access to the systems of City…
Safari Vulnerability Exposes EU iOS Users to Malicious Marketplaces
A serious concern has arisen for iPhone users in the European Union as a newly discovered flaw in Apple’s Safari browser has the potential to expose them to tracking and malicious activities. The vulnerability lies in the fact that third-party…
Darkgate Malware Leveraging Autohotkey Following Teams
Researchers have uncovered a novel infection chain associated with the DarkGate malware. This Remote Access Trojan (RAT), developed using Borland Delphi, has been marketed as a Malware-as-a-Service (MaaS) offering on a Russian-language cybercrime forum since at least 2018. The DarkGate…
Meet the New Exclusive AI Malware Analyst: Gemini 1.5 Pro
Gemini 1.5 Pro is the latest version of the Gemini AI malware analysis platform, which is set to transform the cybersecurity industry. With its innovative features, it enables security teams to detect, investigate, and respond to malware threats with unprecedented…
An Empty S3 Bucket Can Make Your AWS Bills Explode
In the world of cloud computing, Amazon Web Services (AWS) is a giant that offers a wide range of services that cater to various needs, from storage to computation. Among these services, AWS S3 (Simple Storage Service) is a trendy…
Grafana Tool Vulnerability Let Attackers Inject SQL Queries
The popular open-source platform Grafana, widely used for monitoring and observability, has been found to contain a severe SQL injection vulnerability. This flaw allows attackers with valid user credentials to execute arbitrary SQL commands, potentially leading to data leakage and…
Hackers Tool 29 Days from Initial Hack to Sabotage Ransomware Attack
Cybersecurity experts have meticulously traced the timeline of a sophisticated ransomware attack that spanned 29 days from the initial breach to the deployment of Dagon Locker ransomware. This case study not only illuminates cybercriminals’ efficiency and persistence but also underscores…
Chinese Botnet As-A-Service Bypasses Cloudflare & Other DDoS Protection Services
A large botnet-as-a-service network originating from China was discovered, which comprises numerous domains, over 20 active Telegram groups, and utilizes other domestic communication channels. The infrastructure that supports this botnet, located in China, raises concerns about the potential for large-scale,…