computer security Archives - GBHackers Security | #1 Globally Trusted Cyber Security News Platform https://gbhackers.com/tag/computer-security/ GBhackers Offering Exclusive Cyber Security News Coverage, New Research papers & Technology Updates. Mon, 02 Sep 2024 08:52:23 +0000 en-US hourly 1 https://wordpress.org/?v=6.6.2 https://gbhackers.com/wp-content/uploads/2024/09/cropped-gbh-32x32.png computer security Archives - GBHackers Security | #1 Globally Trusted Cyber Security News Platform https://gbhackers.com/tag/computer-security/ 32 32 Proofpoint’s Email Protection Let Attackers Send Millions Of Phishing Emails https://gbhackers.com/proofpoints-email-protection-phishing-emails/ https://gbhackers.com/proofpoints-email-protection-phishing-emails/#respond Tue, 30 Jul 2024 11:48:14 +0000 https://gbhackers.com/?p=94659 Hackers use phishing emails to mislead recipients into providing personal data like usernames, passwords, credit card numbers, or social security numbers. This method exploits human emotions and trust, allowing a threat actor to compromise an account, steal an identity, or disseminate malware with little technical skill. Guardio Labs recently discovered “EchoSpoofing” which is a serious […]

The post Proofpoint’s Email Protection Let Attackers Send Millions Of Phishing Emails appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

The post Proofpoint’s Email Protection Let Attackers Send Millions Of Phishing Emails appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/proofpoints-email-protection-phishing-emails/feed/ 0
Water Sigbin Exploiting Oracle WebLogic Server Flaw https://gbhackers.com/water-sigbin-exploiting-oracle/ https://gbhackers.com/water-sigbin-exploiting-oracle/#respond Tue, 02 Jul 2024 08:27:18 +0000 https://gbhackers.com/?p=92805 Water Sigbin (8220 Gang) exploits vulnerabilities (CVE-2017-3506, CVE-2023-21839) in Oracle WebLogic servers to deliver cryptocurrency miners using PowerShell scripts.  They use a multi-stage loading technique with a .Net Reactor protecting the payload to deploy the PureCrypter loader and XMRig miner, which makes it hard to analyze the code and implement defensive measures.  Water Sigbin exploits […]

The post Water Sigbin Exploiting Oracle WebLogic Server Flaw appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

The post Water Sigbin Exploiting Oracle WebLogic Server Flaw appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/water-sigbin-exploiting-oracle/feed/ 0
Hackers Weaponizing Windows Shortcut Files for Phishing https://gbhackers.com/weaponizing-windows-phishing/ https://gbhackers.com/weaponizing-windows-phishing/#respond Fri, 21 Jun 2024 07:02:05 +0000 https://gbhackers.com/?p=92114 LNK files, a shortcut file type in Windows OS, provide easy access to programs, folders, or websites. Created automatically during shortcut creation or manually by users, LNK files contain the target location and other information useful for threat intelligence.  It includes details like the machine identifier where the LNK was built, volume labels, and drive […]

The post Hackers Weaponizing Windows Shortcut Files for Phishing appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

The post Hackers Weaponizing Windows Shortcut Files for Phishing appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/weaponizing-windows-phishing/feed/ 0
Chrome Security Update – Patch for 6 Vulnerabilities https://gbhackers.com/chrome-security-update-patch-for-6-vulnerabilities/ https://gbhackers.com/chrome-security-update-patch-for-6-vulnerabilities/#respond Wed, 19 Jun 2024 14:23:46 +0000 https://gbhackers.com/?p=92128 Google has announced a new update for the Chrome browser, rolling out version 126.0.6478.114/115 for Windows and Mac and 126.0.6478.114 for Linux. This update, which will be distributed over the coming days and weeks, addresses several security vulnerabilities. Users are encouraged to update their browsers to protect themselves against potential threats. The official Chrome Log […]

The post Chrome Security Update – Patch for 6 Vulnerabilities appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

The post Chrome Security Update – Patch for 6 Vulnerabilities appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/chrome-security-update-patch-for-6-vulnerabilities/feed/ 0
Hackers Weaponizing MSC Files In Targeted Attack Campaign https://gbhackers.com/hackers-weaponizing-msc-files/ https://gbhackers.com/hackers-weaponizing-msc-files/#respond Tue, 11 Jun 2024 07:58:26 +0000 https://gbhackers.com/?p=91582 Hackers utilize MSC or Microsoft Management Console files in themed attack campaigns as these files contain commands and scripts that enable them to perform different administrative tasks on the target system.  By mimicking legitimate files, MSC files can evade various security properties and access overview and control of the vulnerable system with privileges, consequently resulting […]

The post Hackers Weaponizing MSC Files In Targeted Attack Campaign appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

The post Hackers Weaponizing MSC Files In Targeted Attack Campaign appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/hackers-weaponizing-msc-files/feed/ 0
Malicious PyPI & NPM Packages Attacking MacOS Users https://gbhackers.com/malicious-pypi-npm-packages/ https://gbhackers.com/malicious-pypi-npm-packages/#respond Fri, 24 May 2024 11:21:06 +0000 https://gbhackers.com/?p=90759 Cybersecurity researchers have identified a series of malicious software packages targeting MacOS users. These packages, found on the Python Package Index (PyPI) and NPM, have been meticulously analyzed to uncover their malicious intent and sophisticated attack mechanisms. GuardDog: The Sentinel Against Malicious Packages In late 2022, a CLI-based tool named GuardDog was released. Utilizing Semgrep […]

The post Malicious PyPI & NPM Packages Attacking MacOS Users appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

The post Malicious PyPI & NPM Packages Attacking MacOS Users appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/malicious-pypi-npm-packages/feed/ 0
FortiOS & FortiProxy SSL-VPN Flaw Allows IP Spoofing via Malicious Packets https://gbhackers.com/fortios-fortiproxy-ssl-vpn-flaw/ https://gbhackers.com/fortios-fortiproxy-ssl-vpn-flaw/#respond Wed, 15 May 2024 09:20:09 +0000 https://gbhackers.com/?p=90118 A critical vulnerability has been discovered in Fortinet’s FortiOS SSL-VPN and FortiProxy SSL-VPN. The flaw, identified as FG-IR-23-225, allows attackers to spoof IP addresses and bypass security controls by sending specially crafted packets. It affects multiple versions of FortiOS and FortiProxy. According to the advisory published by Fortinet, the vulnerability stems from improper validation of […]

The post FortiOS & FortiProxy SSL-VPN Flaw Allows IP Spoofing via Malicious Packets appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

The post FortiOS & FortiProxy SSL-VPN Flaw Allows IP Spoofing via Malicious Packets appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/fortios-fortiproxy-ssl-vpn-flaw/feed/ 0
Zscaler Concludes Investigation: Only Test Servers Compromised https://gbhackers.com/zscaler-test-servers-compromised/ https://gbhackers.com/zscaler-test-servers-compromised/#respond Tue, 14 May 2024 09:02:50 +0000 https://gbhackers.com/?p=90045 In a recent development, Zscaler Inc., a prominent cybersecurity firm, has concluded its investigation into a potential data breach initially reported last week. The company confirmed that the breach was confined to an isolated test environment on a single server containing no customer data. The investigation was triggered by claims from a hacker known as […]

The post Zscaler Concludes Investigation: Only Test Servers Compromised appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

The post Zscaler Concludes Investigation: Only Test Servers Compromised appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/zscaler-test-servers-compromised/feed/ 0
Hackers Abuse GoTo Meeting Tool to Deploy Remcos RAT https://gbhackers.com/hackers-abuse-goto-meeting-tool/ https://gbhackers.com/hackers-abuse-goto-meeting-tool/#respond Tue, 14 May 2024 08:24:17 +0000 https://gbhackers.com/?p=90019 In a sophisticated cyberattack campaign, hackers are using the online meeting platform GoToMeeting to distribute a Remote Access Trojan known as Remcos. This alarming development underscores cybercriminals’ evolving tactics of leveraging trusted software to breach security defenses and gain unauthorized access to victims’ systems. The attack mechanism involves manipulating GoToMeeting, a tool widely used by […]

The post Hackers Abuse GoTo Meeting Tool to Deploy Remcos RAT appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

The post Hackers Abuse GoTo Meeting Tool to Deploy Remcos RAT appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/hackers-abuse-goto-meeting-tool/feed/ 0
Warning! Google Chrome Zero-day Vulnerability Exploited in Wild https://gbhackers.com/warning-google-chrome-zero-day-vulnerability-exploited-in-wild/ https://gbhackers.com/warning-google-chrome-zero-day-vulnerability-exploited-in-wild/#respond Fri, 10 May 2024 06:28:24 +0000 https://gbhackers.com/?p=89638 Google released a critical security update for its Chrome web browser to address attackers exploiting a high-severity vulnerability. The update brings Chrome to version 124.0.6367.201 for Windows, Mac, and Linux users on the Stable release channel. The vulnerability, tracked as CVE-2024-4671, is a “use after free” flaw in the browser’s Visuals component that could allow […]

The post Warning! Google Chrome Zero-day Vulnerability Exploited in Wild appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

The post Warning! Google Chrome Zero-day Vulnerability Exploited in Wild appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/warning-google-chrome-zero-day-vulnerability-exploited-in-wild/feed/ 0