-
The FBI, CISA, MS-ISAC, and HHS have released a joint advisory detailing known RansomHub ransomware indicators of compromise (IOCs) and tactics, techniques, and procedures (TTPs). RansomHub, a ransomware-as-a-service variant, has been active since Feb…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
The FBI, CISA, MS-ISAC, and HHS have released a joint advisory detailing known RansomHub ransomware indicators of compromise (IOCs) and tactics, techniques, and procedures (TTPs). RansomHub, a ransomware-as-a-service variant, has been active since Feb…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
The People’s Cyber Army of Russia is a Russian hacktivist group known for its strategic use of DDoS attacks and other disruptive tactics. Operating as part of the broader Russian cyber warfare landscape, the group has been involved in several at…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
The stable channel for desktops has been updated to version 128.0.6613.119/.120 for Windows and Mac, and 128.0.6613.119 for Linux. This update will be gradually rolled out over the coming days and weeks. For those using the Extended Stable channel, ver…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
The company’s new product covers every base for digital legacies, resulting in the industry’s first truly comprehensive product. SafeTech Labs, a company specializing in pioneering blockchain development and technology, announced today that its releasing Inheriti® 2.0, which enables users to create secure, lasting, decentralized digital inheritance plans to pass down digital assets—anything from social media […] The post SafeTech Labs Takes Aim at $52B Digital Legacy Industry with World’s First Fully Comprehensive Digital Legacy Solution appeared first on GBHackers on…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Iranian cyber actors have been identified as the perpetrators behind ransomware attacks targeting U.S. organizations across multiple sectors. This revelation comes from a joint Cybersecurity Advisory issued by the Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), and the Department of Defense Cyber Crime Center (DC3). Background of the Threat Group […] The post Iranian Threat Group Attack US Organization via Ransomware appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News Platform.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Researchers from Proofpoint have uncovered a sophisticated cyberattack campaign leveraging Google Sheets as a command and control (C2) platform. Dubbed “Voldemort” by the researchers, this campaign targets Windows users globally, employing a novel attack chain that combines both common and rare techniques to deliver custom malware. This article delves into the intricacies of the campaign, […] The post Voldemort Threat Actors Abusing Google Sheets to Attack Windows Users appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Cary, North Carolina, August 30th, 2024, CyberNewsWire: INE Security is pleased to announce that it has been recognized as a 2024 SC Award finalist in the Excellence Award category for Best IT Security-Related Training Program. Marking its 27th year, the SC Awards recognize the solutions, organizations, and individuals that have demonstrated exceptional achievement in advancing […] The post INE Security Named 2024 SC Awards Finalist appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News Platform.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Researchers uncovered a sophisticated phishing campaign that exploits a .NET-based Snake Keylogger variant. This attack leverages weaponized Excel documents to infiltrate Windows systems, posing significant threats to user data security. This article delves into the mechanics of the attack, the techniques employed by the malware, and the implications for users and organizations. Understanding Snake Keylogger […] The post .NET-based Snake Keylogger Attack Windows Using Weaponized Excel Documents appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Cybercriminals are leveraging platforms like GitHub to spread the Lumma information stealer malware. This sophisticated threat is part of a growing trend where attackers use legitimate services to distribute malicious tools, posing significant risks to users worldwide. What is Lumma Stealer? Lumma Stealer is a highly advanced malware designed to siphon sensitive information from unsuspecting […] The post Attackers Spread Lumma Stealer Malware GitHub Comments appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News Platform.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶