Cyber Attack

WordPress Plugin Flaw Exposes 40,000+ Websites to Cyber AttackWordPress Plugin Flaw Exposes 40,000+ Websites to Cyber Attack

WordPress Plugin Flaw Exposes 40,000+ Websites to Cyber Attack

A popular WordPress plugin, Automatic (premium version), developed by ValvePress, has been found to harbor critical security vulnerabilities that put…

1 year ago
Hackers Attacking Critical US Water Systems, White House WarnsHackers Attacking Critical US Water Systems, White House Warns

Hackers Attacking Critical US Water Systems, White House Warns

In a stark warning issued by the White House, it has been revealed that cyberattacks are increasingly targeting water and…

1 year ago
Andariel Hackers Leveraging Remote Tools To Exploit OrganizationsAndariel Hackers Leveraging Remote Tools To Exploit Organizations

Andariel Hackers Leveraging Remote Tools To Exploit Organizations

The Andariel threat group has been discovered to be using MeshAgent when attacking Korean companies. The group has previously attacked…

1 year ago
Azorult Malware Abuses Google Sites To Steal Login CredentialsAzorult Malware Abuses Google Sites To Steal Login Credentials

Azorult Malware Abuses Google Sites To Steal Login Credentials

A new evasive Azorult campaign that uses HTML smuggling to deliver a malicious JSON payload from an external website.  The…

1 year ago
Novel Script-Based Attack That Leverages PowerShell And VBScriptNovel Script-Based Attack That Leverages PowerShell And VBScript

Novel Script-Based Attack That Leverages PowerShell And VBScript

A new campaign has been identified as DEEP#GOSU is likely linked to the Kimsuky group, and it employs a new script-based attack chain…

1 year ago
How ANY.RUN Malware Sandbox Process IOCs for Threat Intelligence Lookup?How ANY.RUN Malware Sandbox Process IOCs for Threat Intelligence Lookup?

How ANY.RUN Malware Sandbox Process IOCs for Threat Intelligence Lookup?

The database includes indicators of compromise (IOCs) and relationships between different artifacts observed within an analysis session. In October 2022,…

1 year ago
WhiteSnake Stealer Checks for Mutex & VM Function Before ExecutionWhiteSnake Stealer Checks for Mutex & VM Function Before Execution

WhiteSnake Stealer Checks for Mutex & VM Function Before Execution

A new variant of the WhiteSnake Stealer, a formidable malware that has been updated to be more elusive and efficient…

1 year ago
Discontinued WordPress Plugin Flaw Exposes Websites to Cyber AttacksDiscontinued WordPress Plugin Flaw Exposes Websites to Cyber Attacks

Discontinued WordPress Plugin Flaw Exposes Websites to Cyber Attacks

A critical vulnerability was discovered in two plugins developed by miniOrange. The affected plugins, miniOrange’s Malware Scanner and Web Application…

1 year ago
Hackers Launching AI-Powered Cyber Attacks to Steal BillionsHackers Launching AI-Powered Cyber Attacks to Steal Billions

Hackers Launching AI-Powered Cyber Attacks to Steal Billions

INTERPOL's latest assessment on global financial fraud uncovers the sophisticated evolution of cybercrime, fueled by advancements in technology such as…

1 year ago
GBHackers Weekly Round-Up: Cyber Attacks, Vulnerabilities, Threats & New Cyber StoriesGBHackers Weekly Round-Up: Cyber Attacks, Vulnerabilities, Threats & New Cyber Stories

GBHackers Weekly Round-Up: Cyber Attacks, Vulnerabilities, Threats & New Cyber Stories

With our weekly GBHackers news summary, explore and learn about the most recent developments in the cybersecurity field.  This practice…

1 year ago