Aggregator
RansomHub
RansomHub
RansomHub
Alleged Data Breach of Customer Support Networks Up for Sale on Dark Web
Rite Aid Agrees to $6.8M Data Breach Lawsuit Settlement
American pharmacy chain giant Rite Aid reached a $6.8 million agreement to settle a data breach class action lawsuit, which includes a pledge to improve its cybersecurity practices. The breach involved a ransomware group stealing data pertaining to 2.2 million customers.
The Browser: The Modern Alternative to VDI
Rite Aid Agrees to $6.8M Data Breach Lawsuit Settlement
American pharmacy chain giant Rite Aid reached a $6.8 million agreement to settle a data breach class action lawsuit, which includes a pledge to improve its cybersecurity practices. The breach involved a ransomware group stealing data pertaining to 2.2 million customers.
Cryptohack Roundup: Trump's Strategic Crypto Reserve
This week, Trump announced a crypto strategic reserve; Bybit hackers laundered stolen Ether; Iris Ramaya Au, ex-girlfriend of crypto fraudster, pleaded guilty to a tax charge; CoinDCX will manage crypto seized by India's enforcement directorate.
InvokeADCheck – New Powershell Module for Active Directory Assessment
Orange Cyberdefense has announced the development of InvokeADCheck, a new PowerShell module designed to streamline Active Directory (AD) assessments. Created by Niels Hofland and colleague Justin, this tool aims to address the challenges faced by IT administrators and security professionals in efficiently evaluating AD environments. Streamlining AD Assessment Process InvokeADCheck offers a comprehensive solution for […]
The post InvokeADCheck – New Powershell Module for Active Directory Assessment appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Detecting Malicious Activities With Traffic Distribution Systems
Traffic Distribution Systems (TDS) have emerged as critical tools for both legitimate and malicious purposes, serving as sophisticated redirection networks that manage traffic flow across multiple endpoints. While businesses use TDS to optimize marketing campaigns and improve service reliability, cybercriminals exploit this infrastructure to orchestrate phishing attacks, malvertising campaigns, and illicit services. These systems obfuscate […]
The post Detecting Malicious Activities With Traffic Distribution Systems appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Hackers Deploy Advanced Social Engineering Tactics in Phishing Attacks
Cybercriminals are evolving their phishing methods, employing more sophisticated social engineering tactics to deceive their targets. Recent findings from ESET’s APT Activity Report highlight a concerning trend where threat actors are establishing relationships with potential victims before deploying malicious content. This shift in strategy makes it increasingly challenging for employees to identify and avoid phishing […]
The post Hackers Deploy Advanced Social Engineering Tactics in Phishing Attacks appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Cybercriminals Exploit Compromised Email Servers for Fraudulent Campaigns
Trend Micro’s Managed XDR team has recently investigated a sophisticated Business Email Compromise (BEC) attack that targeted multiple business partners. The incident, which occurred over several days, involved the exploitation of a compromised email server to orchestrate a complex fraud scheme. Intricate Web of Deception The attack involved three business partners (Partner A, Partner B, […]
The post Cybercriminals Exploit Compromised Email Servers for Fraudulent Campaigns appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Identifying Cyber Attack Patterns Through Threat Actor Infrastructure Analysis
Kudelski Security Research recently published an article detailing advanced methods for tracking and analyzing threat actor infrastructure, providing valuable insights into cyber attack patterns and attribution techniques. Decoding Threat Actor Infrastructure: A Case Study The research team demonstrated their approach using a phishing campaign targeting U.S. and Israeli government officials, attributed to the Iranian group […]
The post Identifying Cyber Attack Patterns Through Threat Actor Infrastructure Analysis appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
As an SOC/DFIR Team Member, How to Analyse Real-Time Linux Malware Network Traffic
Network traffic analysis has emerged as one of the most effective methods for detecting and investigating linux based malware infections . By scrutinizing communication patterns, security professionals can uncover signs of malicious activity, including command-and-control (C2) connections, data exfiltration, and Distributed Denial-of-Service (DDoS) attacks. This guide explores how traffic analysis aids in malware detection, the […]
The post As an SOC/DFIR Team Member, How to Analyse Real-Time Linux Malware Network Traffic appeared first on Cyber Security News.
BadBox Malware Infects 50,000+ Android Devices via 24 Apps on Google Play
HUMAN’s Satori Threat Intelligence and Research team has uncovered a complex cyberattack dubbed “BADBOX 2.0,” an evolution of the previously disclosed BADBOX operation. This sophisticated botnet has infected over 1 million consumer devices worldwide, with a significant portion compromised through 24 malicious apps on the Google Play Store. The BADBOX 2.0 operation centers on a […]
The post BadBox Malware Infects 50,000+ Android Devices via 24 Apps on Google Play appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Hackers Exploit ‘Any/Any’ Communication Configurations in Cloud Services to Host Malware
Recent research by Veriti has uncovered a disturbing trend in cybersecurity: malicious actors are increasingly leveraging cloud infrastructure to distribute malware and operate command-and-control (C2) servers. This shift in tactics presents significant challenges for detection and exposes organizations to heightened security risks. Cloud Misconfigurations Open Doors for Attackers The study reveals that over 40% of […]
The post Hackers Exploit ‘Any/Any’ Communication Configurations in Cloud Services to Host Malware appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Threat Actors Mimic Electronic Frontier Foundation To Attack Gaming Community
Cybersecurity researchers have uncovered a sophisticated campaign targeting the Albion Online gaming community through impersonation of the Electronic Frontier Foundation (EFF). The operation, discovered in early March 2025, leverages decoy documents designed to appear as official EFF communications while deploying malware in the background. Albion Online, a multiplayer online role-playing game with a player-driven economy, […]
The post Threat Actors Mimic Electronic Frontier Foundation To Attack Gaming Community appeared first on Cyber Security News.
Microsoft Warns of Silk Typhoon Hackers Exploiting Cloud Services to Attack IT Supply Chain
Microsoft Threat Intelligence has identified a significant shift in tactics by Silk Typhoon, a Chinese espionage group, now targeting common IT solutions such as remote management tools and cloud applications for initial access. This well-resourced and technically proficient threat actor has demonstrated a large targeting footprint among Chinese threat actors, exploiting vulnerabilities in edge devices […]
The post Microsoft Warns of Silk Typhoon Hackers Exploiting Cloud Services to Attack IT Supply Chain appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
PrintSteal Cybercrime Group Mass-Producing Fake Aadhaar & PAN Cards
A large-scale cybercrime operation dubbed “PrintSteal” has been exposed, revealing a complex network involved in the mass production and distribution of fraudulent Indian KYC documents. The operation, which has been active since at least 2021, utilizes a vast network of over 1,800 domains to generate fake Aadhaar cards, PAN cards, and birth certificates on an […]
The post PrintSteal Cybercrime Group Mass-Producing Fake Aadhaar & PAN Cards appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.