Quantcast
Channel: Tushar Subhra Dutta, Author at GBHackers on Security | #1 Globally Trusted Cyber Security News Platform
Browsing all 116 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

GoldDigger Malware Using Deep Fake AI Photos To Hijack Bank Accounts

Hackers use deep fake AI photos to impersonate individuals online, allowing them to deceive, manipulate, or gain unauthorized access to sensitive information or systems.  Cybersecurity researchers at...

View Article


Image may be NSFW.
Clik here to view.

Threat Actors Renting Out Compromised Routers To Other Criminals

APT actors and cybercriminals both exploit proxy anonymization layers and VPN nodes to mask their malicious activities, while Pawn Storm, a well-known APT group, infiltrated a cybercriminal botnet of...

View Article


Hackers Exploit Microsoft Graph API For C&C Communications

An emerging threat leverages Microsoft’s Graph API to facilitate command-and-control (C&C) communications through Microsoft cloud services.  Recently, security analysts at Symantec discovered a...

View Article

Image may be NSFW.
Clik here to view.

Hackers Moving To AI But Lacking Behind The Defenders In Adoption Rates

Hackers were actively exploiting the generative AI for cyber attacks; not only that, even threat actors are also exploring new ways to exploit other advanced LLMs like ChatGPT. They could leverage...

View Article

Image may be NSFW.
Clik here to view.

Scattered Spider Attacking Finance & Insurance Industries WorldWide

Hackers very frequently target the finance and insurance sectors due to the large volumes of sensitive data that they own. These areas manage huge quantities of valuable as well as critical financial...

View Article


Image may be NSFW.
Clik here to view.

Hackers Abuse DNS Tunneling For Covert Communication & Firewall Bypass

As a sneaky scheme, hackers use DNS tunneling to bypass traditional security measures. By wrapping malicious data inside DNS queries and responses, they can smuggle out sensitive information or talk...

View Article

Image may be NSFW.
Clik here to view.

IT Teams Beware! Weaponized WinSCP & PuTTY Delivers Ransomware

Attackers launched a campaign distributing trojanized installers for WinSCP and PuTTY in early March 2024, as clicking malicious ads after searching for the software leads to downloads containing a...

View Article

Image may be NSFW.
Clik here to view.

Cybersecurity Expert Jailed For Hacking 400K Smart Homes, Selling Videos

Hackers target smart homes due to the increased interconnected devices with often insufficient security measures.  Smart homes provide a wealth of personal and sensitive information, including access...

View Article


Image may be NSFW.
Clik here to view.

Beware Of New Social Engineering Attack That Delivers Black Basta Ransomware

Hackers exploit social engineering, which avoids technical security systems, by manipulating the psychology and behavior of a human being. Social engineering techniques, such as baiting emails or...

View Article


QakBot Malware Exploiting Windows Zero-Day To Gain System Privileges

Hackers exploit the Windows zero-day vulnerabilities, as they offer great advantages. This means that no patches or defenses exist for zero-day vulnerabilities as software vendors are unaware of them,...

View Article

Russian APT Hackers Attacking Critical Infrastructure

Russia leverages a mix of state-backed Advanced Persistent Threat (APT) groups and financially motivated cybercriminals to achieve its strategic goals, as APT groups conduct espionage to gather...

View Article

New Linux Backdoor Attacking Linux Users Via Installation Packages

Linux is widely used in numerous servers, cloud infrastructure, and Internet of Things devices, which makes it an attractive target for gaining unauthorized access or spreading malware.  Besides this,...

View Article

Image may be NSFW.
Clik here to view.

Hackers Exploiting Docusign With Phishing Attack To Steal Credentials

Hackers prefer phishing as it exploits human vulnerabilities rather than technical flaws which make it a highly effective and low-cost attack method.  Phishing attacks can be easily scaled to target a...

View Article


Image may be NSFW.
Clik here to view.

SWARM – Switchable Backdoor Attack Against Pre-trained Models

In the big data era, pre-training large vision transformer (ViT) models on massive datasets has become prevalent for enhanced performance on downstream tasks.  Visual prompting (VP), introducing...

View Article

Image may be NSFW.
Clik here to view.

Grandoreiro Malware Hijacks Outlook Client to Send Phishing Emails

X-Force identified a phishing campaign targeting Latin American users since March 2024, where emails impersonate legitimate entities like tax and utility services, urging recipients to click links for...

View Article


Image may be NSFW.
Clik here to view.

Turla Hackers Leveraging Microsoft Build Engine To Deliver Malware Stealthily

Hackers exploit the Microsoft Build Engine because it can execute code and build applications.  This engine provides an easy means for them to send harmful payloads using legitimate software...

View Article

Image may be NSFW.
Clik here to view.

Ikaruz Red Team Leveraging LockBit Builder To Launch Ransomware Attacks

Hackers exploit ransomware as it enables them to extort money from victims by encrypting their data and demanding a ransom for its release.  While this method is highly lucrative and often difficult...

View Article


Image may be NSFW.
Clik here to view.

Chinese Hackers Stay Hidden On Military And Government Networks For Six Years

Hackers target military and government networks for varied reasons, primarily related to spying, which involves interference in the functioning of critical infrastructure.  This is mainly because...

View Article

Image may be NSFW.
Clik here to view.

NSA Releases Guidance On Zero Trust Maturity To Secure Application From...

Zero Trust Maturity measures the extent to which an organization has adopted and implemented the Zero Trust security model.  It calculates how fully a company has adopted Zero Trust’s foundational...

View Article

Kinsing Malware Attacking Apache Tomcat Server With Vulnerabilities

The scalability and flexibility of cloud platforms recently boosted the emerging trend of cryptomining attacks in the cloud. Unlike on-premises infrastructure, whereby it is difficult to scale up...

View Article
Browsing all 116 articles
Browse latest View live


Latest Images