Aggregator
MORF:一款轻量级移动端网络安全侦查框架
HPE Insight 远程支持遭遇重大漏洞,发布紧急补丁程序
Researchers Detailed New Exfiltration Techniques Used By Ransomware Groups
Ransomware groups and state-sponsored actors increasingly exploit data exfiltration to maximize extortion and intelligence gains by leveraging a mix of custom and legitimate tools to steal sensitive data, including financial, personal, and classified information. To mitigate risks, organizations must implement robust security measures, such as network monitoring, file integrity checks, and endpoint detection and response, […]
The post Researchers Detailed New Exfiltration Techniques Used By Ransomware Groups appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
New Skimmer Malware Steals Credit Card Data From Checkout Pages
A JavaScript-based malware targeting Magento eCommerce websites has been identified, which is designed to skim payment card details and activates exclusively on checkout pages. The malware dynamically generates a fraudulent credit card form or directly extracts sensitive payment information, where the stolen data is encrypted and transmitted to a remote server. The attack vector involves […]
The post New Skimmer Malware Steals Credit Card Data From Checkout Pages appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Elpaco 勒索软件: 一种新的威胁行为体利用 CVE-2020-1472 进行全球攻击
В России разрабатывают защиту автомобилей от кибератак
SMOKEDHAM Backdoor Mimic As Legitimate Tools Leveraging Google Drive & Dropbox
UNC2465, a financially motivated threat actor, leverages the SMOKEDHAM backdoor to gain initial access to target networks, which are often delivered via phishing emails, trojanized software, or supply chain attacks, enabling persistence and lateral movement. Once in the network, UNC2465 utilizes tools like Advanced IP Scanner and BloodHound for reconnaissance, RDP for lateral movement, and […]
The post SMOKEDHAM Backdoor Mimic As Legitimate Tools Leveraging Google Drive & Dropbox appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
T-Mobile detected network intrusion attempts and blocked them
Helldown Ransomware Attacking Windows And Linux Servers Evading Detection
Helldown Ransomware, a sophisticated cyber threat, actively targets critical industries worldwide by leveraging advanced cross-platform capabilities, including Windows and Linux, to encrypt files and exploit system vulnerabilities. Its modular design and anti-detection techniques enable continuous evolution and persistent attacks, which makes it a significant threat to global cybersecurity, demanding immediate attention and robust mitigation strategies. […]
The post Helldown Ransomware Attacking Windows And Linux Servers Evading Detection appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
3500 万台设备易受攻击:Matrix DDoS 活动凸显了日益增长的 IoT 威胁
APT-C-60 Attacking HR Department With Weaponized Resumes
APT-C-60 launched a phishing attack in August 2024, targeting domestic organizations with malicious emails disguised as job applications. These emails, sent to recruitment departments, contained malware designed to compromise systems and potentially steal sensitive data. The attack leverages a targeted phishing email to distribute a malicious VHDX file hosted on Google Drive. Once mounted, the […]
The post APT-C-60 Attacking HR Department With Weaponized Resumes appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.