Cybersecurity researchers have identified a series of malicious software packages targeting MacOS users. These packages, found on the Python Package Index (PyPI) and NPM, have been meticulously analyzed to uncover their malicious intent and sophisticated attack mechanisms. GuardDog: The Sentinel…
Tag: GBHackers on Security | #1 Globally Trusted Cyber Security News Platform
Beware Of HTML That Masquerade As PDF Viewer Login Pages
Phishing attacks have evolved into increasingly sophisticated schemes to trick users into revealing their personal information. One such method that has gained prominence involves phishing emails masquerading as PDF viewer login pages. These deceptive emails lure unsuspecting users into entering their email addresses and passwords, compromising their online security. Forcepoint X-Labs has recently observed many phishing emails targeting various government departments in the Asia-Pacific (APAC)…
Operation SpecTor: Authorities Seized Dark Markets Offering Illicit Goods
Law enforcement agencies have successfully dismantled several dark web marketplaces offering illicit goods. Dubbed “Operation SpecTor,” this coordinated crackdown marks a significant victory in the ongoing battle against cybercrime and illegal online activities. This news was shared on the Dark…
Apple’s Wi-Fi Positioning Can Be System Abused To Track Users
A new study by researchers at the University of Maryland has uncovered a privacy vulnerability in Apple’s Wi-Fi Positioning System (WPS) that allows attackers to track users’ locations and movements globally. The findings raise serious concerns about the potential for…
Spyware App Found Running on Multiple US Hotel Check-In Computers
A consumer-grade spyware app named pcTattletale has been discovered running on the check-in systems of at least three Wyndham hotels across the United States. This alarming discovery was made by TechCrunch, which reported that the app stealthily captured screenshots of…
OpenText Acquires Cybersecurity MDR Platform for MSPs
OpenText, a leader in information management solutions, has announced the acquisition of Pillr technology, a cloud-native, multi-tenant Managed Detection and Response (MDR) platform designed for Managed Service Providers (MSPs). This strategic move aims to improve OpenText’s cybersecurity capabilities, enabling it…
Microsoft Replacing VBScript With JavaScript & PowerShell
Microsoft has shifted its scripting options for web development and task automation. The company is replacing VBScript with more advanced alternatives such as JavaScript and PowerShell to provide users with the most modern and efficient tools. This article explores what…
Ikaruz Red Team Leveraging LockBit Builder To Launch Ransomware Attacks
Hackers exploit ransomware as it enables them to extort money from victims by encrypting their data and demanding a ransom for its release. While this method is highly lucrative and often difficult to trace back to the perpetrators. Sentinel One…
Turla Hackers Leveraging Microsoft Build Engine To Deliver Malware Stealthily
Hackers exploit the Microsoft Build Engine because it can execute code and build applications. This engine provides an easy means for them to send harmful payloads using legitimate software development tools. Moreover, inside corporate environments, Build Engine’s trusted nature enables…
Stealerium Malware Targeting Wi-Fi Networks, Outlook to Steal Login Credentials
A new strain of malware known as Stealerium has been identified. It targets Wi-Fi networks and Microsoft Outlook to steal login credentials. This sophisticated malware poses a significant threat to individual users and organizations, highlighting the need for heightened vigilance…