CYBERSECURITY / DEFENSE / INTELLIGENCE

1010.TEAM 🇺🇦

/

Archive

/

Tag: cyber security

  • Linux, traditionally viewed as a more secure operating system than Windows, has experienced a notable increase in malware attacks. In 2022, Linux malware incidents surged by 50%, significantly increasing and highlighting the critical need for robust analysis and defense mechanisms. This article explores the importance of Linux malware analysis and presents detailed case studies using […] The post How to Analyse Linux Malware in ANY.RUN appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News Platform.

    ·

    ¶¶¶¶¶

    ¶¶¶¶¶

  • In a startling revelation that has sent shockwaves through the cybersecurity community, a massive data leak has exposed the inner workings of I-Soon (上海安洵), a Chinese tech security firm with deep ties to the country’s government agencies, including the Ministry of Public Security, Ministry of State Security, and the People’s Liberation Army. Over the weekend […] The post Leak of China’s Hacking Documentation Stunned Researchers appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News Platform.

    ·

    ¶¶¶¶¶

    ¶¶¶¶¶

  • In a significant move against cybercrime, the U.S. government has announced a bounty of up to $15 million for information that could lead to the identification, arrest, or conviction of individuals associated with the notorious LockBit ransomware group. This announcement comes as part of a broader crackdown on ransomware operations that have caused extensive damage […] The post US to Pay $15M for Info About Lockbit Ransomware Operator Data appeared first on GBHackers on Security | #1 Globally Trusted Cyber…

    ·

    ¶¶¶¶¶

    ¶¶¶¶¶

  • VMware has issued an urgent advisory to administrators to remove a deprecated authentication plugin vulnerable to severe security threats. The Enhanced Authentication Plugin (EAP), which provided seamless login capabilities to vSphere’s management interfaces, is susceptible to authentication relay and session hijack attacks due to two unpatched security vulnerabilities. Document Live Account Takeover Attack Simulation How […] The post VMware Urges to Remove Enhanced EAP Plugin to Stop Auth & Session Hijack Attacks appeared first on GBHackers on Security | #1…

    ·

    ¶¶¶¶¶

    ¶¶¶¶¶

  • VMware has issued an urgent advisory to administrators to remove a deprecated authentication plugin vulnerable to severe security threats. The Enhanced Authentication Plugin (EAP), which provided seamless login capabilities to vSphere’s management interfaces, is susceptible to authentication relay and session hijack attacks due to two unpatched security vulnerabilities. Document Live Account Takeover Attack Simulation How […] The post VMware Urges to Remove Enhanced EAP Plugin to Stop Auth & Session Hijack Attacks appeared first on GBHackers on Security | #1…

    ·

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Spyware firms target iOS, Android, and Windows devices due to their widespread usage, making them lucrative targets for gathering sensitive information.  Each platform offers unique exploitation opportunities, with iOS and Android dominating the mobile market, while Windows remains a primary operating system for computers.  This complete scenario provides diverse avenues for surveillance and data collection. […] The post Meta Unveils 8 Spyware Companies Targeting iOS, Android, & Windows Devices appeared first on GBHackers on Security | #1 Globally Trusted Cyber…

    ·

    ¶¶¶¶¶

    ¶¶¶¶¶

  • ESET, a cybersecurity firm, has released patches for a high-severity vulnerability identified in several Windows-based security products, including consumer, business, and server security. The vulnerability tracked as CVE-2024-0353 has a CVSS score of 7.8 and was identified in the real-time file system protection feature of ESET’s products, which handles file operations. The Real-time file system […] The post ESET Privilege Escalation Flaw Let Attackers Delete Arbitrary Files appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News…

    ·

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Vyacheslav Igorevich Penchukov, a 37-year-old resident of Donetsk, Ukraine, has pleaded guilty to his key role in developing and deploying the notorious Zeus and IcedID malware attacks.  In 2022, he was apprehended in Switzerland and extradited to the United States in 2023. These two malware gangs are notorious for their ability to infect thousands of […] The post Ukrainian Hacker Pleads Guilty for Leading Zeus & IcedID Malware Attacks appeared first on GBHackers on Security | #1 Globally Trusted Cyber…

    ·

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Outlook has been discovered to have an interesting vulnerability while handling specific hyperlinks, which was found to be exploited by threat actors in the wild. This vulnerability has been assigned with CVE-2024-21413, and the severity was given as 9.8 (Critical). However, Microsoft has addressed this vulnerability and fixed it as part of their Patch Tuesday […] The post New Outlook 0-day RCE Flaw Exploited in the Wild appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News…

    ·

  • Wireshark is backed by the nonprofit Wireshark Foundation, which relies on your support to advance protocol analysis education. However, Wireshark 4.2.3 is out now, and this new version is Packed with multiple new features, rich protocol support, user-friendly design, and powerful filtering tools for real-time network analysis. This new version of Wireshark (Wireshark 4.2.3) was […] The post Wireshark 4.2.3 Released – What’s New! appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News Platform.

    ·

    ¶¶¶¶¶

    ¶¶¶¶¶