Tag: GBHackers on Security | #1 Globally Trusted Cyber Security News Platform

SEC X Account was Hacked Using SIM Swapping Method

In a brazen act of digital deception, the U.S. Securities and Exchange Commission’s (SEC) official Twitter account, @SECGov, was compromised on January 9th, 2024.  This wasn’t just a prank; it sent shockwaves through the financial world, momentarily igniting a frenzy…

SSH3 – Faster & Rich Secure Shell Using HTTP/3

SSH or Secure Shell is a cryptographic network protocol that enables secure communication and remote access over an unsecured network.  This network protocol is widely used for secure command-line login, file transfers, and tunneling of other protocols. It provides a…

Beware of Pirated MacOS Apps That Install Chinese Malware

Similar to ZuRu malware, a new malware has been found embedded in pirated macOS applications, which downloads and executes several payloads to compromise devices in the background. Specifically, these apps are hosted on Chinese pirate websites to entice more victims.…

DarkGate Malware Abuses AutoIT Scripting For Payload Obfustication

DarkGate is a type of malware that employs Auto-It compiled loaders that cause a considerable threat because of its advanced evasion strategies and persistence within compromised systems. By using obfuscated AutoIt scripting and multi-stage payloads, the malware makes it more difficult to identify using conventional…

New Outlook Flaw Let Attackers Access Hashed Passwords

A new Outlook vulnerability that can be used to extract NTLMv2 hashes by exploiting Outlook, Windows Performance Analyzer (WPA), and Windows File Explorer has been identified. This vulnerability has been assigned with CVE-2023-35636, and the severity has been given as…

PixieFAIL – 9 UEFI Flaws Expose Computers to Remote Attacks

Hackers exploit UEFI flaws to gain unauthorized access to a system’s firmware, enabling them to implant persistent malware or manipulate the boot process. This provides a stealthy entry point that allows attackers to bypass traditional security measures and maintain control…

CISA & FBI released Incident Response Guide for WWS Sector

Malicious cyber incidents, such as ransomware and unauthorized access, have affected the Water and Wastewater Sector (WWS) in the past few years. Particularly, ransomware is a common tactic cybercriminals use to target WWS utilities. Cyber threat actors target the WWS…