The Akira ransomware group has intensified its operations, targeting over 350 organizations and claiming approximately $42 million USD in ransom proceeds by the beginning of 2024. This sophisticated cybercriminal entity has been deploying a strategy known as “double extortion,” where…
Tag: GBHackers Security | #1 Globally Trusted Cyber Security News Platform
Detecting And Blocking DNS Tunneling Techniques Using Network Analytics
DNS tunneling is a covert technique that cybercriminals use to bypass traditional network security measures and exfiltrate data or establish command and control channels within an organization. By leveraging the essential and often trusted Domain Name System (DNS) protocol, attackers…
New Phishing Technique Hides Weaponized HTML Files Within SVG Images
Cybersecurity experts have observed an alarming increase in the use of SVG (Scalable Vector Graphics) files for phishing attacks. These attacks leverage the versatility of SVG format, which allows embedding of HTML and JavaScript code within what appears to be…
Security Awareness Metrics That Matter to the CISO
In today’s rapidly evolving threat landscape, Chief Information Security Officers (CISOs) are tasked with more than just deploying the latest security technologies; they must also foster a culture of security awareness across their organizations. While technical controls are essential, the…
Cyber Hygiene Best Practices for Modern Enterprises
Cyber hygiene refers to the routine practices and fundamental security measures organizations implement to maintain system health and improve security posture. In today’s rapidly evolving digital landscape, the attack surface for cyber threats expands continuously, making robust cyber hygiene essential…
Cloud Security Challenges Every CISO Must Address in Hybrid Environments
Hybrid cloud environments, which blend on-premises infrastructure with public and private cloud services, have become the backbone of modern enterprises. While they offer flexibility and scalability, they introduce complex security challenges that demand strategic oversight. Chief Information Security Officers (CISOs)…
Cybercriminals Deploy FOG Ransomware Disguised as DOGE via Malicious Emails
A new variant of the FOG ransomware has been identified, with attackers exploiting the name of the Department of Government Efficiency (DOGE) to mislead victims. This operation, which came to light through the analysis of nine malware samples uploaded to…
Ransomware Attacks Cost Banks $6.08 Million on Average, Triggering Downtime and Reputation Damage
In an era where cybersecurity has become paramount, the banking and financial sectors are facing an alarming escalation in ransomware attacks. According to recent findings, each ransomware attack costs banks an average of $6.08 million, excluding the additional expenses on…
VibeScamming: Hackers Leverage AI to Craft Phishing Schemes and Functional Attack Models
Cybersecurity researchers at Guardio Labs have unveiled a troubling new trend dubbed “VibeScamming,” where cybercriminals are using AI tools to create sophisticated phishing campaigns with unprecedented ease. This development, which allows even novice hackers to craft convincing scams, marks a…
Hackers Exploit Stolen Certificates and Private Keys to Breach Organizations
Recent research has unveiled a concerning vulnerability within the realm of containerized applications, where threat actors are leveraging stolen certificates and private keys to infiltrate organizations. This tactic not only allows hackers to bypass security measures but also potentially permits…