The Matanbuchus malware has been reported to initiate a new campaign, exploiting XLS files to compromise Windows machines. This sophisticated threat, known for its loader-as-a-service model, has been active for several years and poses a risk to users worldwide. Matanbuchus,…
Tag: GBHackers on Security | #1 Globally Trusted Cyber Security News Platform
Cybercriminals Hacking Systems with 10+ Legitimate Data-Extraction Tools
In recent months, the cybersecurity landscape has witnessed a significant evolution in ransomware attacks, with perpetrators deploying an increasingly diverse array of data-exfiltration tools. Symantec’s latest findings reveal that attackers have utilized at least a dozen different tools for data…
Ransomware Actors Using Dozen of Legitimate Data-Exfiltration Tools to Hack Systems
In recent months, the cybersecurity landscape has witnessed a significant evolution in ransomware attacks, with perpetrators deploying an increasingly diverse array of data-exfiltration tools. Symantec’s latest findings reveal that attackers have utilized at least a dozen different tools for data…
Vulnerability in 16.5K+ VMware ESXi Instances Let Attackers Execute Code
VMware’s ESXi, Workstation, and Fusion products could allow attackers to execute malicious code on affected systems. Impacted VMware Products These vulnerabilities impact the following VMware products: VMware has acknowledged the presence of several vulnerabilities in its products after they were…
New DoNex Ransomware Observed in the Wild Targeting Enterprises
Enterprises across the United States and Europe are on high alert as a new ransomware strain, dubbed “DoNex,” has been actively compromising companies and claiming victims. This emergent threat has cybersecurity experts working overtime to understand the attack’s full scope…
NSA Releases Top Ten Best Practices For Cloud Environments
Threat actors aim at Cloud environments because of their wide acceptance and one-stop storage of important information. Exploiting shortcomings in cloud security may enable unauthorized access to sensitive data, interruptions in infrastructure, or earning money. The fact that the systems…
Nigerian National Pleads Guilty for Hacking Business & Individual Emails
Henry Onyedikachi Echefu, a 32-year-old Nigerian national, has admitted to his role in a sophisticated business email compromise (BEC) scheme and money laundering activities. This case highlights the global nature of cybercrime and the importance of international cooperation in bringing…
MITRE Releases Aviation Risk Identification and Assessment Software Program
The Massachusetts Institute of Technology’s (MITRE) Aviation Risk Identification and Assessment (ARIA) software program is a powerful tool to enhance aviation safety and efficiency. Developed by the MITRE Corporation, a non-profit organization that operates federally funded research and development centers,…
Chinese Panda APT Hacking Websites To Infect Windows And MacOS Users
Evasive Panda dubbed BRONZE HIGHLAND and Daggerfly, a Chinese-speaking APT group operating since at least 2012, has been spotted conducting cyberespionage targeting individuals in mainland China, Hong Kong, Macao, and Nigeria. Southeast and East Asian governments, notably those in China, Macao,…
UAC-0050 Hacked Thousands Of Emails To Launch Malspam Attack
Threat actors target email addresses, as they provide a way to access personal and confidential information. Emails often hold valuable data such as financials, login credentials, and personal messages. The attackers could start different kinds of cyber-attacks and propagate malware…