PetSmart, Inc. is a renowned retail chain operating in the United States, Canada, and Puerto Rico. It offers a comprehensive range of pet products and services such as pet supplies, grooming, training, and in-store adoptions. PetSmart prides itself on being…
Tag: GBHackers on Security | #1 Globally Trusted Cyber Security News Platform
NSA Details Seven Pillars Of Zero Trust
The National Security Agency (NSA) issued a Cybersecurity Information Sheet (CSI) that discusses limiting adversary lateral movement within an organization’s network to access sensitive data and vital systems. This offers instructions on how to use Zero Trust principles to strengthen internal…
Hackers Use Number of Legitimate Tools in Ransomware Attacks
Ransomware attacks remain a formidable challenge for organizations worldwide. These attacks not only encrypt critical data, rendering it inaccessible to the rightful owners but increasingly involve the exfiltration of sensitive information. This dual-threat approach amplifies the potential damage, as attackers…
Hackers Exploiting iOS 0-Day To Attack iPhones – Patch Now!
Apple releases emergency fixes to address two new zero-day vulnerabilities in iOS that impact iPhones. The two zero-day vulnerabilities were discovered in RTKit, tracked as CVE-2024-23296, and the iOS Kernel, tracked as CVE-2024-23225. If exploited by an attacker with kernel…
OpenNMS XSS Flaw Let Attackers Inject JavaScript Payload
A critical vulnerability in OpenNMS, a widely used network monitoring solution, has been identified, allowing attackers to inject malicious JavaScript payloads through a Cross-Site Scripting (XSS) flaw. This vulnerability, tracked as CVE-2023-0846, has raised significant concerns due to its potential…
Data Breach Alert: American Express Credit Card Information Exposed
American Express has recently notified its customers of a data breach involving a third-party service provider, marking a security incident that has potentially compromised customer information. This breach underscores the vulnerabilities that can arise from third-party partnerships, even when a…
Hackers Abuse QEMU Hardware Emulator for Stealthy C2 Communication
QEMU is an open-source platform that provides a secure and private virtualized space for trying out malicious codes, exploits, and attacks on their own environments. This controlled testing ground minimizes the risk of detection and legal matters. Moreover, QEMU…
225,000+ ChatGPT Credentials Up For Sale on Dark Web Markets
A prominent cybersecurity technology creator, has released its latest report, “Hi-Tech Crime Trends 2023/2024,” highlighting critical global cyber threats. The report reveals a concerning trend where over 225,000 compromised ChatGPT credentials are being sold on dark web markets, posing security…
Hackers Install macOS Malware Using Weaponised Calendar Invites
Hackers use weaponized calendar invites to exploit vulnerabilities in email systems, tricking users into clicking on malicious links or downloading malware disguised as event attachments. By leveraging trust in calendar invitations, threat actors increase the likelihood of successful phishing attacks…
Hackers use Zoom & Google Meet Lures to Attack Android & Windows users
A threat actor has been identified as creating fraudulent Skype, Google Meet, and Zoom websites to distribute malware, explicitly targeting Android and Windows users. This article delves into the details of this malicious campaign and explains how users can identify…