The landscape of cyber threats targeting Canadian financial institutions saw significant shifts after LabHost, a prominent phishing-as-a-service (PhaaS) platform, was shut down. LabHost, known for its extensive Interac-branded phishing kits, was responsible for around three-fourths of such phishing attempts. Its…
Tag: GBHackers Security | #1 Globally Trusted Cyber Security News Platform
New Android SuperCard X Malware Uses NFC-Relay Technique for POS & ATM Transactions
A new malware strain known as SuperCard X has emerged, utilizing an innovative Near-Field Communication (NFC)-relay attack to execute unauthorized transactions at Point-of-Sale (POS) systems and Automated Teller Machines (ATMs). Detailed in a recent report by the Cleafy Threat Intelligence…
How To Hunt Web And Network-Based Threats From Packet Capture To Payload
Modern cyberattacks increasingly exploit network protocols and web applications to bypass traditional security controls. To counter these threats, security teams must adopt advanced techniques for analyzing raw network traffic, from packet-level metadata to payload content. This article provides a technical…
How SMBs Can Improve SOC Maturity With Limited Resources
Small and Medium-sized Businesses (SMBs) have become prime targets for cybercriminals, being three times more likely to be targeted by phishing attacks than larger organizations. These attacks often serve as entry points for ransomware infections that can devastate operations. As…
How Security Analysts Detect and Prevent DNS Tunneling Attack In Enterprise Networks
DNS tunneling represents one of the most sophisticated attack vectors targeting enterprise networks today, leveraging the trusted Domain Name System protocol to exfiltrate data and establish covert command and control channels. This technique exploits the fact that DNS traffic typically…
How To Detect Obfuscated Malware That Evades Static Analysis Tools
Obfuscated malware presents one of the most challenging threats in cybersecurity today. As static analysis tools have become standard components of security defenses, malware authors have responded by developing increasingly sophisticated obfuscation techniques that can bypass these conventional detection methods.…
U.S DOGE Allegedly Breached – Whistleblower Leaked Most Sensitive Documents
A federal whistleblower has accused the Department of Government Efficiency (DOGE) of orchestrating a major cybersecurity breach at the National Labor Relations Board (NLRB), involving unauthorized data extraction, disabled security protocols, and attempted logins from a Russian IP address. The…
How to Conduct a Cloud Security Assessment
Cloud adoption has transformed organizations’ operations but introduces complex security challenges that demand proactive leadership and a thorough Cloud Security Assessment. A cloud security assessment systematically evaluates your cloud infrastructure to identify vulnerabilities, enforce compliance, and safeguard critical assets. For…
Building a Security First Culture – Advice from Industry CISOs
In today’s threat landscape, cybersecurity is no longer confined to firewalls and encryption it’s a cultural imperative. Chief Information Security Officers (CISOs) play a pivotal role in transforming organizations into security-first environments where every employee, from interns to executives, actively…
Critical AnythingLLM Vulnerability Exposes Systems to Remote Code Execution
A critical security flaw (CVE-2024-13059) in the open-source AI framework AnythingLLM has raised alarms across cybersecurity communities. The vulnerability, discovered in February 2025, allows attackers with administrative privileges to execute malicious code remotely, potentially compromising entire systems. Detail Description CVE ID CVE-2024-13059…