The database includes indicators of compromise (IOCs) and relationships between different artifacts observed within an analysis session. In October 2022, ANY.RUN launched TI Threat Intelligence Feeds to allow users to utilize this data. Security experts assess threats using ANY.RUN, an…
Tag: GBHackers on Security | #1 Globally Trusted Cyber Security News Platform
CryptoWire Ransomware Attacking Abuses Schedule Task To maintain Persistence
AhnLab security researchers detected a resurgence of CryptoWire, a ransomware strain originally prevalent in 2018, built with the AutoIt scripting language, which primarily spreads through phishing emails. Unlike most ransomware, CryptoWire reportedly includes the decryption key within its code, while…
E-Root Admin Sentenced to 42 Months in Prison for Selling 350,000 Credentials
Tampa, FL – In a significant crackdown on cybercrime, Sandu Boris Diaconu, a 31-year-old Moldovan national, has been sentenced to 42 months in federal prison after pleading guilty to charges related to operating a network of illicit websites. U.S. Senior…
WhiteSnake Stealer Checks for Mutex & VM Function Before Execution
A new variant of the WhiteSnake Stealer, a formidable malware that has been updated to be more elusive and efficient in its malicious endeavors. One of the key features of the updated WhiteSnake Stealer is its use of mutexes (mutual…
Researchers Hack AI Assistants Using ASCII Art
Large language models (LLMs) are vulnerable to attacks, leveraging their inability to recognize prompts conveyed through ASCII art. ASCII art is a form of visual art created using characters from the ASCII (American Standard Code for Information Interchange) character set.…
Microsoft Deprecate 1024-bit RSA Encryption Keys in Windows
Microsoft has announced an important update for Windows users worldwide in a continuous effort to bolster security and performance. As part of its latest security enhancements, Microsoft is phasing out the support for 1024-bit RSA encryption keys within the Windows…
Beware Of Free wedding Invite WhatsApp Scam That Steal Sensitive Data
The ongoing “free wedding invite” scam is one of several innovative campaigns aimed at the senior population. Through social media chats like WhatsApp, fraudsters use deceptive tactics, most often involving fake wedding invitations. It communicates with its victims over WhatsApp…
Hackers Using Weaponized SVG Files in Cyber Attacks
Cybercriminals have repurposed Scalable Vector Graphics (SVG) files to deliver malware, a technique that has evolved significantly with the advent of the AutoSmuggle tool. Introduced in May 2022, AutoSmuggle facilitates embedding malicious files within HTML or SVG content, making it…
New Acoustic Keyboard Side Channel Attack Let Attackers Steal Sensitive Data
In recent years, personal data security has surged in importance due to digital device usage. Side-channel attacks exploit system side effects to gather information. Electronic emissions are a known vulnerability to such attacks. Acoustic side-channel attacks are particularly threatening. In…
Discontinued WordPress Plugin Flaw Exposes Websites to Cyber Attacks
A critical vulnerability was discovered in two plugins developed by miniOrange. The affected plugins, miniOrange’s Malware Scanner and Web Application Firewall, contained a severe privilege escalation flaw that could allow unauthenticated attackers to gain administrative access to WordPress sites. This…