Authentic8, provider of the leading OSINT research platform Silo for Research, today launched their Silo Shield Program to enhance online security for high-risk communities. Also today, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) launched a webpage listing free tools…
Tag: GBHackers on Security | #1 Globally Trusted Cyber Security News Platform
5 Major Phishing Campaigns in March 2024
March saw many notable phishing attacks, with criminals using new tactics and approaches to target unsuspecting victims. It is time to explore some of the five most noteworthy campaigns to understand the current threat landscape better. Pay close attention to…
4 Incident Triage Best Practices for Your Organization in 2024
Maintaining uninterrupted services is vital for any organization. The backbone of ensuring this continuous uptime lies in the Incident Management process. Incident triage is a significant component of this process. It enables organizations to prioritize and address potential incidents efficiently.…
Swalwell for Congress Campaign Partners with Wolfsbane.ai to Protect Against AI-Generated Cloning
Today, Congressman Eric Swalwell, CA-14, announced that he has partnered with Wolfsbane.ai to help prevent his 2024 election campaign content from being used to create AI clones and deepfakes. Wolfsbane.ai will use its patent-pending technology to encode Rep. Swalwell’s campaign…
Indian Govt Rescues 250 Citizens Trapped In Cambodia Forced Into Cyber-Slavery
A massive cyber fraud operation targeting Indians in Cambodia has emerged, with an estimated Rs 500 crore stolen in six months. Over 5,000 Indian nationals are reportedly being held against their will and forced to participate in the elaborate scheme. …
PandaBuy Data Breach: 1.3 Million Customers Data Leaked
PandaBuy, a popular online shopping platform, has been the victim of a significant data breach. This breach has resulted in the leak of personal information belonging to more than 1.3 million customers. The incident has raised serious concerns about cybersecurity…
Google to Delete Billions of User’s Personal Data Collected Via Chrome Browser
Google has agreed to delete billions of data records that reflect the private browsing activities of users. This decision comes as part of a settlement for a lawsuit that accused the tech giant of improperly tracking users’ web-browsing habits who…
Pentagon Releases Cybersecurity Strategy To Strengthen Defense Industrial Base
The DoD DIB Cybersecurity Strategy is a three-year plan (FY24-27) to improve cybersecurity for defense contractors that aims to create a secure and resilient information environment for the Defense Industrial Base (DIB). It will be achieved through collaboration between DoD…
xz-utils Backdoor Affects Kali Linux Installations – How to Check for Infection
A critical vulnerability has been identified in the xz-utils package, versions 5.6.0 to 5.6.1, which harbors a backdoor capable of compromising system security. This vulnerability, cataloged under CVE-2024-3094, poses a significant threat to the Linux ecosystem, including the widely used…
Live Forensic Techniques To Detect Ransomware Infection On Linux Machines
Ransomware, initially a Windows threat, now targets Linux systems, endangering IoT ecosystems. Linux ransomware employs diverse encryption methods, evading traditional forensics. Still developing, it shows potential for Windows-level impact. Early awareness allows for assessing IoT security implications. The following cybersecurity…