Aggregator
HOW I HACKED BILLION ANDROID USERS SOCIAL AND 3rd PARTY ACCOUNT | A STORY ABOUT 5000$ BUG |…
Fog
Tracking Digital Footprints: Using OSINT for Investigative Cybersecurity
针对面向公众服务器的 ProjectSend 存在严重漏洞,正被积极利用
A Threat Actor is Allegedly Selling a Kraken Live Phishing Panel
Elementary OS 8 释出
ESET Research 发现了首个专为 Linux 系统设计的 UEFI 引导工具包 Bootkitty
网络犯罪分子利用游戏引擎创建无法检测的恶意软件加载程序
FSMON:一款多平台文件系统安全监控工具
长达一年的供应链攻击: 恶意 NPM 软件包破坏加密货币钱包
A Threat Actor Has Allegedly Leaked the Data of Universidad Católica Santo Toribio de Mogrovejo
Jenkins 用户小心: 发现多个安全漏洞
MORF:一款轻量级移动端网络安全侦查框架
HPE Insight 远程支持遭遇重大漏洞,发布紧急补丁程序
Researchers Detailed New Exfiltration Techniques Used By Ransomware Groups
Ransomware groups and state-sponsored actors increasingly exploit data exfiltration to maximize extortion and intelligence gains by leveraging a mix of custom and legitimate tools to steal sensitive data, including financial, personal, and classified information. To mitigate risks, organizations must implement robust security measures, such as network monitoring, file integrity checks, and endpoint detection and response, […]
The post Researchers Detailed New Exfiltration Techniques Used By Ransomware Groups appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
New Skimmer Malware Steals Credit Card Data From Checkout Pages
A JavaScript-based malware targeting Magento eCommerce websites has been identified, which is designed to skim payment card details and activates exclusively on checkout pages. The malware dynamically generates a fraudulent credit card form or directly extracts sensitive payment information, where the stolen data is encrypted and transmitted to a remote server. The attack vector involves […]
The post New Skimmer Malware Steals Credit Card Data From Checkout Pages appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Elpaco 勒索软件: 一种新的威胁行为体利用 CVE-2020-1472 进行全球攻击
В России разрабатывают защиту автомобилей от кибератак
SMOKEDHAM Backdoor Mimic As Legitimate Tools Leveraging Google Drive & Dropbox
UNC2465, a financially motivated threat actor, leverages the SMOKEDHAM backdoor to gain initial access to target networks, which are often delivered via phishing emails, trojanized software, or supply chain attacks, enabling persistence and lateral movement. Once in the network, UNC2465 utilizes tools like Advanced IP Scanner and BloodHound for reconnaissance, RDP for lateral movement, and […]
The post SMOKEDHAM Backdoor Mimic As Legitimate Tools Leveraging Google Drive & Dropbox appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.