Cybersecurity Threats Archives - GBHackers Security | #1 Globally Trusted Cyber Security News Platform https://gbhackers.com/tag/cybersecurity-threats/ GBhackers Offering Exclusive Cyber Security News Coverage, New Research papers & Technology Updates. Mon, 11 Nov 2024 11:11:47 +0000 en-US hourly 1 https://wordpress.org/?v=6.6.2 https://gbhackers.com/wp-content/uploads/2024/09/cropped-gbh-32x32.png Cybersecurity Threats Archives - GBHackers Security | #1 Globally Trusted Cyber Security News Platform https://gbhackers.com/tag/cybersecurity-threats/ 32 32 Researchers Detailed Credential Abuse Cycle https://gbhackers.com/credential-abuse-cycle-research-2/ https://gbhackers.com/credential-abuse-cycle-research-2/#respond Mon, 11 Nov 2024 11:11:46 +0000 https://gbhackers.com/?p=114618 Cybercriminals exploit leaked credentials, obtained through various means, to compromise systems and data, enabling them to gain unauthorized access. This can lead to data breaches, identity theft, and financial loss across diverse industries and geographic locations. Compromised credentials pose a significant security risk primarily due to data breaches and user negligence. In Q3 2024, they […]

The post Researchers Detailed Credential Abuse Cycle appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/credential-abuse-cycle-research-2/feed/ 0
Russia, Iran, And China Influence U.S. Elections, Microsoft Warns https://gbhackers.com/foreign-influence-us-elections/ https://gbhackers.com/foreign-influence-us-elections/#respond Mon, 04 Nov 2024 12:02:03 +0000 https://gbhackers.com/?p=114066 The researchers have observed consistent efforts by Russia, Iran, and China to exert foreign influence on democratic processes in the United States.  Recent U.S. government actions have exposed Iranian cyberattacks on the Trump-Vance campaign and the dissemination of stolen Trump campaign materials to Biden campaign associates and media outlets. Foreign entities can spread misleading information […]

The post Russia, Iran, And China Influence U.S. Elections, Microsoft Warns appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/foreign-influence-us-elections/feed/ 0
Threat Actors Forcing victims Into Entering Login Credentials For Stealing https://gbhackers.com/threat-actors-credential-theft/ https://gbhackers.com/threat-actors-credential-theft/#respond Thu, 19 Sep 2024 15:39:37 +0000 https://gbhackers.com/?p=112042 Recent intelligence indicates a new technique employed by stealers to trick victims into entering credentials directly into a browser, enabling subsequent theft from the browser’s credential store. This method, used in conjunction with StealC malware, was first observed in August 2024 and is primarily deployed by Amadey. The technique involves forcing victims to interact with […]

The post Threat Actors Forcing victims Into Entering Login Credentials For Stealing appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/threat-actors-credential-theft/feed/ 0
New Loki Backdoor Attacking macOS Systems https://gbhackers.com/loki-macos-attack/ https://gbhackers.com/loki-macos-attack/#respond Thu, 12 Sep 2024 12:48:59 +0000 https://gbhackers.com/?p=111748 Cody Thomas developed Apfell, an open-source macOS post-exploitation framework, in 2018 and evolved into Mythic, a cross-platform framework that addresses the limitations of existing tools.  Mythic provides a unified interface for managing agents written in various languages for different platforms, which allows for flexibility and customization, enabling the creation of agents with specific functionalities.  Currently, […]

The post New Loki Backdoor Attacking macOS Systems appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/loki-macos-attack/feed/ 0
DISPOSSESSOR And RADAR Ransomware Emerging With RaaS Model https://gbhackers.com/dispossessor-and-radar-ransomware/ https://gbhackers.com/dispossessor-and-radar-ransomware/#respond Fri, 09 Aug 2024 07:42:07 +0000 https://gbhackers.com/?p=95040 Ransomware affiliates are forming alliances to recoup losses from unreliable partners. A prominent example involves ALPHV extorting $22 million from Change Healthcare but withholding funds from its data exfiltration affiliate.  To remedy this, the affiliate has reportedly partnered with RansomHub to demand additional payment from Change Healthcare for data deletion, showcasing a new tactic in […]

The post DISPOSSESSOR And RADAR Ransomware Emerging With RaaS Model appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/dispossessor-and-radar-ransomware/feed/ 0
Rafel RAT Attacking Android Devices To Gain Unauthorized Access https://gbhackers.com/rafel-rat-android-attack/ https://gbhackers.com/rafel-rat-android-attack/#respond Wed, 03 Jul 2024 03:18:50 +0000 https://gbhackers.com/?p=92890 The Rafel RAT is an advanced Android-targeting Remote Access Trojan which poses a great cybersecurity danger. This malicious program has become popular due to its prominence for breaking into device security and taking away confidential details. Knowing the origin of Rafel RAT, the tactics it uses to perpetrate crimes, and its main attributes is vital […]

The post Rafel RAT Attacking Android Devices To Gain Unauthorized Access appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/rafel-rat-android-attack/feed/ 0
New PhaaS Platform Lets Attackers Bypass Two-Factor Authentication https://gbhackers.com/phaas-platform-bypass-2fa/ https://gbhackers.com/phaas-platform-bypass-2fa/#respond Wed, 19 Jun 2024 12:01:57 +0000 https://gbhackers.com/?p=92072 Several phishing campaign kits have been used widely by threat actors in the past. One popular PhaaS (Phishing-as-a-Platform) was Caffeine, which was first identified and reported by Mandiant researchers.  MRxC0DER, an Arabic-speaking threat actor, developed and maintained the caffeine kit. However, Caffeine has now been discovered to be rebranded as ONNX Store and is found […]

The post New PhaaS Platform Lets Attackers Bypass Two-Factor Authentication appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/phaas-platform-bypass-2fa/feed/ 0
Hacktivist Groups Attacking Industrial Control Systems To Disrupt Services https://gbhackers.com/acktivist-attacks-on-industrial-control-systems/ https://gbhackers.com/acktivist-attacks-on-industrial-control-systems/#respond Fri, 07 Jun 2024 12:28:05 +0000 https://gbhackers.com/?p=91408 Hacktivist groups are increasingly targeting critical infrastructure’s Operational Technology (OT) systems, motivated by geopolitical issues that, unlike traditional website defacements, can disrupt essential services and endanger public safety.   The success of high-profile attacks on Industrial control systems (ICS) by groups with minimal technical expertise highlights a worrying evolution in hacktivism, which necessitates reevaluating hacktivist tactics […]

The post Hacktivist Groups Attacking Industrial Control Systems To Disrupt Services appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/acktivist-attacks-on-industrial-control-systems/feed/ 0
FlyingYeti Exploits WinRAR Vulnerability For Targeted Malware Attacks https://gbhackers.com/flyingyeti-winrar-vulnerability-malware-attacks/ https://gbhackers.com/flyingyeti-winrar-vulnerability-malware-attacks/#respond Fri, 31 May 2024 12:56:13 +0000 https://gbhackers.com/?p=91091 Ever since Russia’s invasion of Ukraine on February 24, 2022, there have been heavy tensions between the nations and worldwide. After this incident, Ukraine imposed an eviction and termination moratorium on utility services for unpaid debt, ending in January 2024. However, this particular period was utilized by a threat actor who is identified as “FlyingYeti”. […]

The post FlyingYeti Exploits WinRAR Vulnerability For Targeted Malware Attacks appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/flyingyeti-winrar-vulnerability-malware-attacks/feed/ 0
Beware Of New Social Engineering Attack That Delivers Black Basta Ransomware https://gbhackers.com/social-engineering-black-basta-ransomware/ https://gbhackers.com/social-engineering-black-basta-ransomware/#respond Wed, 15 May 2024 06:36:31 +0000 https://gbhackers.com/?p=90074 Hackers exploit social engineering, which avoids technical security systems, by manipulating the psychology and behavior of a human being. Social engineering techniques, such as baiting emails or pretexting phone calls, manipulate victims into providing confidential information or performing actions that impede security details.  Attackers find it cheap and easy, as they need less specialist knowledge […]

The post Beware Of New Social Engineering Attack That Delivers Black Basta Ransomware appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/social-engineering-black-basta-ransomware/feed/ 0