Browsing CategoryComputer Security

Modern CyberSOC – A Brief  Implementation Of Building a Collaborative Cyber Security Infrastructure

In earlier years, everyone depends on SOC (includes firewalls, WAF, SIEM,etc.) and the prioritize in building the SOC provides security and the CIA was maintained. However, later the emerge of the attacks and the threat actors becomes more challenge and the existing SOC will not able to provide better security over the CIA. There are […]

The post Modern CyberSOC – A Brief Implementation Of Building a Collaborative Cyber Security Infrastructure appeared first on GBHackers On Security.

Zerologon

Microsoft Patchs the new critical vulnerability in Zerologon, A feature of Netlogon allows the domain controller to authenticate computers and update passwords in the Active Directory. “The elevation of privilege vulnerability for Zerologon, or CVE-2020-147, exists when an attacker establishes a vulnerable Netlogon secure channel connection to a domain controller, using the Netlogon Remote Protocol […]

The post Beware of the New Critical Zerologon Vulnerability in The Windows Server appeared first on GBHackers On Security.

Free Password Manager

Free Password Manager always helps to make Strong passwords to protect your devices, online banking accounts and other data sources from unauthorized access. In this article, we highlight the Best open source Password Manager for Android, Mac and iPhone. Do I really need a password manager? Manage different password for so many accounts in online […]

The post 10 Best Free Password Manager to Secure Your Password For 2020 appeared first on GBHackers On Security.

Microsoft Teams Updater

A new flaw with Microsoft Teams Updater allows attackers to install and run malware from a remote location Using Living off the Land Technique. The issue was first disclosed last year and it relies on using the ‘update’ command to run the arbitrary binary code with the context of the current user. Microsoft Teams Updater […]

The post Hackers Abuse Microsoft Teams Updater to Install Malware Using Living off the Land Technique appeared first on GBHackers On Security.

WastedLocker Ransomware

Recently one of the most dangerous ransomware, WastedLocker, owes its success to a unique bypass mechanism for security solutions and tools that block ransomware. Initially, WastedLocker appeared this year in May, and it’s a part of the arsenal of the famous cybercriminal group Evil Corp, which is also known as Dridex. It was used in […]

The post Hackers Abuse Windows Feature To Launch WastedLocker Ransomware to Evade Detection appeared first on GBHackers On Security.

Macro Pack

Malware delivery trends change every day. For the last few years, we have observed various hacker groups like ( APT12 to Turla ) uses various techniques to deliver malware on the system or network. One of the best technique hackers groups used is to write malicious code and obfuscate it and embed with Office documents […]

The post Macro Pack – Automatize Obfuscation and Generation of Malicious Office Documents appeared first on GBHackers On Security.

What is DNS Attack and How Does it Works?

DNS Attack is a type of cyber attack that exploits the weakness or vulnerability in Domain name system. Today, the internet has turned into an integral part of our life. From communicating to banking to shopping to traveling, every aspect of our life is around the internet. Since the internet has been widely used, cybersecurity […]

The post What is DNS Attack and How Does it Works? appeared first on GBHackers On Security.

Cyber attack

The cyber attack occurs on a daily basis, and these can range from attacks on tech giants to individuals falling foul to the many scams which are present online. Thankfully, there are ways in which people and groups at both ends of the scale can reduce their level of susceptibility to attacks, with virtual private […]

The post Most Important Cyber Attack Techniques that often used by Hackers appeared first on GBHackers On Security.

VHD Ransomware

Lazarus hacker group is known for its attack on Sony Pictures in 2014, the group is financially motivated and know to be active since 2009. The Lazarus Group believed to be operated by the North Korean government, the group is designated as an advanced persistent threat due to intended nature, threat, and a wide array […]

The post Lazarus Hacking Groups Behind the Targeted VHD Ransomware Attacks appeared first on GBHackers On Security.

QSnatch Malware

CISA and NCSC warn that more than 62,000 QNAP NAS devices infected with a malware strain known as QSnatch. All QNAP NAS devices are affected if the latest security fixes are not applied. The campaign found to be active since late 2019, and they primarily target Network Attached Storage (NAS) devices manufactured by the firm […]

The post CISA Warns that More than 62,000 QNAP NAS Devices Affected with QSnatch Malware appeared first on GBHackers On Security.