A recent update from cybersecurity firm CrowdStrike has caused significant disruptions for Windows users, leading to widespread reports of Blue Screen of Death (BSOD) errors. The issue, affecting multiple versions of the company’s sensor software, has prompted urgent investigations and…
Tag: GBHackers on Security | #1 Globally Trusted Cyber Security News Platform
CrowdStrike Update Triggers Widespread Windows Crashes
A recent update from cybersecurity firm CrowdStrike has caused significant disruptions for Windows users, leading to widespread reports of Blue Screen of Death (BSOD) errors. The issue, affecting multiple versions of the company’s sensor software, has prompted urgent investigations and…
Operation Spincaster Disrupts Approval Phishing Technique that Drains Victim’s Wallets
Chainalysis has launched Operation Spincaster, an initiative to disrupt approval phishing scams that have drained billions from victims’ wallets. This operation, which brings together public and private sectors, has yielded promising results and offers a blueprint for future anti-fraud efforts.…
macOS Users Beware Of Weaponized Meeting App From North Korean Hackers
Meeting apps are often targeted and turned into weapons by hackers as they are largely employed for communication and collaboration, frequently carrying sensitive data and user groups that are wide. Such platforms gain trust among their users as of their…
TAG-100 Actors Using Open-Source Tools To Attack Gov & Private Orgs
Hackers exploit open-source tools to execute attacks because they are readily available, well-documented, and often have extensive community support, making them easy to modify and deploy. Besides this, open-source tools can be customized to evade detection, automate tasks, and leverage…
Octo Tempest Know for Attacking VMWare ESXi Servers Added RansomHub & Qilin to Its Arsenal
Threat actors often attack VMware ESXi servers since they accommodate many virtual machines, which link to a variety of systems via one breach. Compromising an ESXi server can bring the targeted services down. Additionally, valuable resources and data are stored…
MacOS Users Beware Of Weaponized Meeting App From North Korean Hackers
Meeting apps are often targeted and turned into weapons by hackers as they are largely employed for communication and collaboration, frequently carrying sensitive data and user groups that are wide. Such platforms gain trust among their users as of their…
Hackers Exploiting Legitimate RMM Tools With BugSleep Malware
Since October 2023, MuddyWater, which is an Iranian threat group linked to MOIS, has escalated its phishing campaigns in Middle East countries, specifically Israel. In their approach, they use already compromised email accounts to spread malicious content across various sectors.…
New TE.0 HTTP Request Smuggling Flaw Impacts Google Cloud Websites
HTTP Request Smuggling is a flaw in web security that is derived from variations in the way different web servers or intermediaries, such as load balancers and proxies handle HTTP request sequences. By creating malicious HTTP requests that exploit these…
Cybercriminals Exploit Attack on Donald Trump for Crypto Scams
Researchers at Bitdefender Labs remain ever-vigilant, informing users about the latest scams and internet perils that threaten their security and finances. The latest discovery involves cybercriminals exploiting an alleged assassination attempt on former US President Donald Trump to conduct extensive…