• In a startling revelation, nearly 20% of Docker Hub repositories have been identified as conduits for malware and phishing scams, underscoring the sophisticated tactics employed by cybercriminals to exploit the platform’s credibility. The investigation unveiled that attackers had been operating under the radar for over three years, creating almost three million malicious repositories on Docker […] The post Millions of Malicious β€œImageless” Docker Hub Repositories Drop Malware appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News…

    Β·

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

  • Kubernetes (K8s) is an open-source container orchestration platform designed to automate application container deployment, scaling, and running.Β  Containers are isolated software packages that are lightweight and contain everything required for running an app.Β  In Kubernetes, a β€œsidecar” refers to an additional container that runs alongside the main application container in the same pod to enhance […] The post Attackers Leverage Sidecar Container Injection Technique To Stay Stealthy appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News…

    Β·

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

  • Microsoft’s Azure platform is a highly acclaimed and widely recognized solution that organizations worldwide are leveraging. It is regarded as a game-changer in the industry and has emerged as a dependable and efficient platform that helps businesses achieve their goals effectively. With its robust logging and monitoring tools, Azure offers a comprehensive suite of capabilities […] The post How to Utilize Azure Logs to Identify Threats: Insights From Microsoft appeared first on GBHackers on Security | #1 Globally Trusted Cyber…

    Β·

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

  • Microsoft’s Azure platform is a highly acclaimed and widely recognized solution that organizations worldwide are leveraging. It is regarded as a game-changer in the industry and has emerged as a dependable and efficient platform that helps businesses achieve their goals effectively. With its robust logging and monitoring tools, Azure offers a comprehensive suite of capabilities […] The post How to Utilize Azure Logs to Identify Threats: Insights From Microsoft appeared first on GBHackers on Security | #1 Globally Trusted Cyber…

    Β·

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

  • The first instance of Redline using such a method is in a new variant of Redline Stealer malware that McAfee has discovered uses Lua bytecode to obfuscate its malicious code.Β  The malware was discovered on a legitimate Microsoft repository (vcpkg) disguised within a zip file named β€œCheat.Lab.2.7.2.zip,”  containing an MSI installer that deployed two executables […] The post Redline Malware Using Lua Bytecode to Challenge the SOC/TI Team to Detect appeared first on GBHackers on Security | #1 Globally Trusted…

    Β·

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

  • A threat actor reportedly sells a database containing 49 million user records from Dell, one of the world’s leading technology companies. This significant security breach encompasses a wide range of personal and corporate information, potentially exposing millions of Dell customers to unprecedented risks. Comprehensive Breach of Customer Data The database in question allegedly includes detailed […] The post Threat Actor Claims Selling of Dell Database with 49M User Records appeared first on GBHackers on Security | #1 Globally Trusted Cyber…

    Β·

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

  • A safe and trusted Google Play experience is our top priority. We leverage our SAFE (see below) principles to provide the framework to create that experience for both users and developers. Here’s what these principles mean in practice: With those principles in mind, we’ve made recent improvements and introduced new measures to keep Google Play’s […] The post Google Blocks 2.28M Malicious Apps Entering The Play Store appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News…

    Β·

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

  • Operational Technology (OT) refers to the hardware and software used to change, monitor, or control the enterprise’s physical devices, processes, and events. Unlike traditional Information Technology (IT) systems, OT systems directly impact the ph…

    Β·

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

  • BlackBerry reported a new iOS LightSpy malware, but Huntress researchers found it to be a macOS variant targeting Intel or Apple Silicon with Rosetta 2-enabled devices.Β  This caused media confusion, as Apple’s recent spyware alert likely referred to Pegasus spyware, and there is no evidence of an iOS version in this discovery. The researchers also […] The post LightSpy Malware Actively Targeting MacOS Devices appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News Platform.

    Β·

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

  • A new RAT malware has been discovered to be targeting Android devices. This malware is capable of executing additional commands compared to other RAT malware. This malware can also perform phishing attacks by disguising itself as legitimate applications like Snapchat, Instagram, WhatsApp, Twitter, and Google to harvest credentials from the victim. Sonicwall’s further investigation found […] The post New Android Malware Mimic As Social Media Apps Steals Sensitive Data appeared first on GBHackers on Security | #1 Globally Trusted Cyber…

    Β·

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ