GBH
GBH
Exploit FortiOS Zero-Day

Chinese Hackers Exploit FortiOS Zero-Day Vulnerability to Deploy New Malware

0
Mandiant recently reported that a group of hackers originating from China utilized a vulnerability within FortiOS SSL-VPN that had only recently been discovered, and...
ChatGPT and Polymorphic Malware

ChatGPT Can Be Used to Create Dangerous Polymorphic Malware

0
The cybersecurity experts at CyberArk have provided information on the mechanism by which the ChatGPT AI chatbot can produce a new strain of polymorphic...

Beware of the New ‘Blank Image’ Attack that Hides Malicious Scripts in Image Files

0
Avanan researchers have seen a new attack dubbed "Blank Image" spreading throughout the globe wherein hackers include blank images in HTML attachments. When opening...
organized threat actor Blind Eagle

Blind Eagle Hacker Group Launching Indiscriminate Attacks Using Powerful Toolset

0
There have been reports that an organized threat actor, known as Blind Eagle (tracked as APT-C-36), has re-appeared again with a refined toolset and...
Most Important Security Tools and Resources For Security Researcher and Malware Analyst

Best Malware Analysis Tools List For Security Researchers & Malware Analyst 2023

1
Malware analysis tools are highly essential for Security Professionals who always need to learn many tools, techniques, and concepts to analyze sophisticated Threats and...

Linux Malware Exploit Over 30 Vulnerabilities in WordPress Themes & Plugins

0
In an attempt to inject malicious JavaScript into WordPress plugins and themes that are outdated, a previously detected Linux malware that is unknown has...
GuLoader Malware Advanced Anti-Analysis

GuLoader Malware Uses Advanced Anti-Analysis Techniques to Evade Detection

0
An advanced malware downloader named GuLoader has recently been exposed by cybersecurity researchers at CrowdStrike. This advanced downloader has the capability to evade the...
Hackers Deploy New Information Stealer

Hackers Deploy New Information Stealer Malware onto Python Developers’ Machines

0
Researchers at Phylum recently discovered that hackers had been injecting information stealer malware into Python developers' machines in order to steal their information. As they...
KmsdBot DDoS Botnet

KmsdBot Botnet Leverages SSH to Compromise Systems and to Launch DDoS Attacks

0
Researchers from Akamai have continued to study the cryptomining botnet KmsdBot and have looked at its attack flow. It is believed that KmsdBot is...
New BrasDex Android Malware

Hackers Use New BrasDex Android Malware to Steal Users’ Banking Details

0
A new Android trojan called BrasDex has been identified as the work of the same threat actors responsible for the Casbaneiro malware that targets...

Complete Free Website Security Check

Website

Recent Posts