The New Jersey Cybersecurity & Communications Integration Cell (NJCCIC) has detected a formidable new cyber threat. Dubbed LockBit Black, this ransomware campaign is leveraging a botnet to distribute millions of weaponized emails, posing a significant risk to individuals and organizations.…
Tag: GBHackers on Security | #1 Globally Trusted Cyber Security News Platform
Hackers Abuse DNS Tunneling For Covert Communication & Firewall Bypass
As a sneaky scheme, hackers use DNS tunneling to bypass traditional security measures. By wrapping malicious data inside DNS queries and responses, they can smuggle out sensitive information or talk to command and control servers without getting caught. DNS tunneling…
Threat Actor Selling INC Ransomware Code for $300,000
A notorious threat actor has decided to sell the INC Ransomware code for an unbelievable $300,000. As a result of this change, the number of cyber threats has significantly increased, putting many more businesses at risk of damaging hacks. A…
Zscaler Concludes Investigation: Only Test Servers Compromised
In a recent development, Zscaler Inc., a prominent cybersecurity firm, has concluded its investigation into a potential data breach initially reported last week. The company confirmed that the breach was confined to an isolated test environment on a single server…
Hackers Abuse GoTo Meeting Tool to Deploy Remcos RAT
In a sophisticated cyberattack campaign, hackers are using the online meeting platform GoToMeeting to distribute a Remote Access Trojan known as Remcos. This alarming development underscores cybercriminals’ evolving tactics of leveraging trusted software to breach security defenses and gain unauthorized…
Apple iTunes for Windows Flaw Let Attackers Execute Malicious Code
iTunes has been found to have an arbitrary code execution vulnerability that might allow attackers to execute malicious code. To fix this vulnerability, Apple has issued a security advisory. It also stated that until an investigation is complete and updates…
GPT-4o Released: Faster Model Available for Free to All Users
OpenAI, the top lab for researching artificial intelligence, just released GPT-4o, its newest advance in AI technology. In the field of generative AI, this newest and most advanced model is a big step forward because it can work with voice,…
MITRE Releases EMB3D Cybersecurity Threat Model for Embedded Devices
In collaboration with Red Balloon Security, Narf Industries, and Niyo Little Thunder Pearson (ONEGas, Inc.), MITER has unveiled EMB3D, a comprehensive threat model designed to address the growing cybersecurity risks faced by embedded devices in critical infrastructure sectors. Embedded devices,…
Tycoon 2FA Attacking Microsoft 365 AND Google Users To Bypass MFA
Tycoon 2FA, a recently emerged Phishing-as-a-Service (PhaaS) platform, targets Microsoft 365 and Gmail accounts, which leverage an Adversary-in-the-Middle (AitM) technique to steal user session cookies, bypassing multi-factor authentication (MFA) protections. By acting as an intermediary between the user and the…
Scattered Spider Attacking Finance & Insurance Industries WorldWide
Hackers very frequently target the finance and insurance sectors due to the large volumes of sensitive data that they own. These areas manage huge quantities of valuable as well as critical financial information, personal identities, and intellectual property. When their…