FBI Hacks Back Hive Ransomware Gang’s Infrastructure – Website Seized
GBHackers On Security
by Guru Baran
2d ago
As a result of an international law enforcement operation, the sites utilized by the Hive ransomware operation for both payments and data leaks on the Tor network were successfully taken over, following the FBI’s infiltration of the group’s infrastructure in July. An international law enforcement operation, led by the US Department of Justice and Europol, […] The post FBI Hacks Back Hive Ransomware Gang’s Infrastructure – Website Seized appeared first on GBHackers - Latest Cyber Security News | Hacker News ..read more
Visit website
Yandex Denies Hack – Source Code Leaked on Popular Hacking Forum
GBHackers On Security
by Guru Baran
3d ago
The source code of Yandex, the largest IT company in Russia and commonly referred to as the Russian Google, was hacked by attackers. On a well-known hacker site, a Yandex source code repository purportedly stolen by a former employee of the Russian technology giant was leaked as a torrent. Specifics of the Yandex Data Leak […] The post Yandex Denies Hack – Source Code Leaked on Popular Hacking Forum appeared first on GBHackers - Latest Cyber Security News | Hacker News ..read more
Visit website
U.S. Sues Google for Dominance Over Digital Advertising Technologies
GBHackers On Security
by Guru Baran
4d ago
Recently, the US Justice Department along with the eight states filed a lawsuit against Google, accusing the company of having a monopoly on the online advertising market, which they argue harms advertisers, consumers, and even the US government.  They claim that Google has breached Sections 1 and 2 of the Sherman Act. While the goal […] The post <strong>U.S. Sues Google for Dominance Over Digital Advertising Technologies</strong> appeared first on GBHackers - Latest Cyber Security News | Hacker News ..read more
Visit website
Top FinTech API Security Challenges
GBHackers On Security
by Vinugayathri Chinnasamy
5d ago
A recent report reveals that the number of attacks on financial service APIs and web applications worldwide increased by 257%.   There are more APIs in use than ever, and the average FinTech company takes advantage of hundreds if not thousands of connections in their daily operations. APIs have become a critical component of fintech but also open […] The post Top FinTech API Security Challenges appeared first on GBHackers - Latest Cyber Security News | Hacker News ..read more
Visit website
Wireshark 4.0.3 Released – What’s New!
GBHackers On Security
by Guru Baran
5d ago
The Wireshark Team has recently unveiled the latest iteration of their widely-utilized packet analyzer, Wireshark 4.0.3.  This version boasts a multitude of improvements, including new features and updates, as well as the resolution of various bugs to ensure a smooth and efficient user experience. The Wireshark packet analyzer is a free and open-source application that […] The post Wireshark 4.0.3 Released – What’s New! appeared first on GBHackers - Latest Cyber Security News | Hacker News ..read more
Visit website
Hackers Using Sliver Framework as an Alternative to Cobalt Strike & Metasploit
GBHackers On Security
by BALAJI N
5d ago
Silver is an open-source command-and-control framework that is becoming increasingly popular among malicious actors at current attacks. As threat actors are opting for this option since it offers a viable alternative to commercial tools such as:- Designed with scalability in mind, the Sliver security testing tool can be used by organizations of all sizes and […] The post Hackers Using Sliver Framework as an Alternative to Cobalt Strike & Metasploit appeared first on GBHackers - Latest Cyber Security News | Hacker News ..read more
Visit website
What is XDR, MXDR, DRs & SBOM ? – Cybersecurity Acronyms 2023
GBHackers On Security
by BALAJI N
6d ago
The field of cybersecurity is rife with acronyms. From AES to VPN, these technical alphabet soup terms have been part of the knowledge of not only cybersecurity experts but also organizations that are planning to buy security solutions or implement security technologies. Enterprise Strategy Group (ESG) has released its 2023 Technology Spending Intentions Survey, and […] The post What is XDR, MXDR, DRs & SBOM ? – Cybersecurity Acronyms 2023 appeared first on GBHackers - Latest Cyber Security News | Hacker News ..read more
Visit website
Chinese Hackers Exploit FortiOS Zero-Day Vulnerability to Deploy New Malware
GBHackers On Security
by BALAJI N
6d ago
Mandiant recently reported that a group of hackers originating from China utilized a vulnerability within FortiOS SSL-VPN that had only recently been discovered, and marked as a zero-day exploit, in December.  The hackers targeted both a government organization in Europe and an African-based managed service provider with a new, specifically designed malware called ‘BOLDMOVE’ that […] The post <strong>Chinese Hackers Exploit FortiOS Zero-Day Vulnerability to Deploy New Malware</strong> appeared first on GBHackers - Latest Cyber Security News | Hacker News ..read more
Visit website
ChatGPT Can Be Used to Create Dangerous Polymorphic Malware
GBHackers On Security
by Guru Baran
1w ago
The cybersecurity experts at CyberArk have provided information on the mechanism by which the ChatGPT AI chatbot can produce a new strain of polymorphic malware. Polymorphic malware could be easily made using ChatGPT. With relatively little effort or expenditure on the part of the attacker, this malware’s sophisticated capabilities can readily elude security tools and […] The post <strong>ChatGPT Can Be Used to Create Dangerous Polymorphic Malware</strong> appeared first on GBHackers - Latest Cyber Security News | Hacker News ..read more
Visit website
Cisco Unified CM SQL Injection Flaw Let Attackers Execute Crafted SQL Queries
GBHackers On Security
by Guru Baran
1w ago
Cisco released fixes for Unified Communications Manager (CM) and Unified Communications Manager Session Management Edition to address high-severity SQL injection vulnerability. “An attacker could exploit this vulnerability by authenticating to the application as a low-privileged user and sending crafted SQL queries to an affected system”, Cisco reports. “A successful exploit could allow the attacker to […] The post <strong>Cisco Unified CM SQL Injection Flaw Let Attackers Execute Crafted SQL Queries</strong> appeared first on GBHackers - Latest Cyber Security News | Hacker News ..read more
Visit website

Follow GBHackers On Security on Feedspot

Continue with Google
OR