Anycubic 3D printer owners have been caught off guard by a series of unauthorized messages warning them of a critical security flaw. The incident has raised concerns about the safety of internet-connected devices and the potential for exploitation. You can…
Tag: GBHackers on Security | #1 Globally Trusted Cyber Security News Platform
Biden Crack Down Sale of Americans’ Personal Data to China & Russia
To safeguard the privacy and security of American citizens, President Joe Biden has issued an Executive Order to prevent the sale and transfer of sensitive personal data to countries deemed as threats, notably China and Russia. This decisive action represents…
Kali Linux 2024.1 Released – What’s New
Kali Linux recently released version 2024.1, the first release of the year 2024, with new Micro Mirror free software CDN, a theme refresh, additional Desktop environment changes, NetHunter updates, and four new tools. Kali Linux is one of the most…
LOCKBIT 3.0 Ransomware – Complete Malware Analysis Report
LockBit 3.0 is a sophisticated ransomware identified as a significant threat to organizations worldwide. This ransomware variant is designed to encrypt files on infected systems, rendering them inaccessible until a ransom is paid. LockBit” is a ransomware-as-a-service (RaaS) group active since September…
Chinese Mini PC Maker Acemagic Ships machines with Malware Pre-installed
Acemagic, a Chinese manufacturer of mini PCs, has been found to ship devices laden with malware, raising significant concerns about cybersecurity and consumer safety. Further investigations revealed that other models, including the AD15 and S1, also harbored similar malicious software.…
Millions of GitHub Repos Found Infected with Malicious Code
Security researchers have uncovered a massive campaign of repository confusion attacks on GitHub, affecting over 100,000 repositories and potentially millions more. This sophisticated cyberattack targets developers by tricking them into downloading and using malicious repositories disguised as legitimate ones. You…
Lazarus Hackers Exploited Windows 0-Day to Gain Kernel read/write Access
The Lazarus Group, a well-known cybercriminal organization, has recently exploited a zero-day vulnerability in Windows to gain kernel privileges, a critical level of system access. This vulnerability, identified as CVE-2024-21338, was found in the appid.Sys AppLocker driver was patched by…
Researchers Uncover Tools And Tactics Used By Chinese Hackers
Over the years, several reports associated with cybercriminals have been based in Russia and Western countries. This is due to the fact that many sophisticated cyber attacks and data leaks originate from these regions. Though this is the case, there…
Hackers Using Weaponized PDF Files To Kickstart Infection Chain
Threat actors use weaponized PDF files for initial infection. This is because they can be embedded with malicious code, PDF readers’ vulnerabilities are exploited, and users are tricked into activating the payload. Since they are common trusted file types, PDFs…
Researchers Exposed Predator Spyware Infrastructure & Domains Associated
The Predator Files project, coordinated by the European Investigative Collaborations (EIC), has highlighted the extensive use of Predator spyware by customers of Intellexa surveillance solutions. The intrusion set, known as Lycantrox, was exposed by Sekoia.io in collaboration with Amnesty International,…