NSA Revealed A Russian APT28 Hackers Made Previously Undisclosed Stealthy “Drovorub” Linux Malware

NSA Revealed A Russian APT28 Hackers Made Previously Undisclosed Stealthy “Drovorub” Linux Malware

Recently, NSA, along with FBI, has revealed a Russian APT28 Linux malware named “Drovorub.” The experts asserted that this malware is managed by the Russian hackers, and the main motive of this malware was to plant backdoors inside hacked networks.  The threat actors named the group “Fancy Bear,” and it takes advantage of various functions […]

The post NSA Revealed A Russian APT28 Hackers Made Previously Undisclosed Stealthy “Drovorub” Linux Malware appeared first on GBHackers On Security.

Read more

Cybersecurity: Recommendations to prevent from Security attacks

Cybersecurity: Recommendations to prevent from Security attacks

In the latest times, we see many attacks arising in many organizations related to the data. Data Security is one of the essential aspects of an organization as everything runs around the data. The attackers have mostly targeted small businesses these days. Small businesses have less data with less secure networks, paving a way to […]

The post Cybersecurity: Recommendations to prevent from Security attacks appeared first on GBHackers On Security.

Read more

Black Hat USA 2020: Dangerous Wi-Fi KrØØk Vulnerability Affected More wi-fi chipset Than Previously Disclosed

Black Hat USA 2020: Dangerous Wi-Fi KrØØk Vulnerability Affected More wi-fi chipset Than Previously Disclosed

The security researchers have recently detected that small Qualcomm and MediaTek Wi-Fi chips are vulnerable to the latest variants of the KrØØk data exposure vulnerability. KrØØk is a quite dangerous vulnerability, and this vulnerability has now affected more Wi-Fi chipsets that allow unauthorized decryption of some WPA2-encrypted traffic. Initially, it was discovered in February and […]

The post Black Hat USA 2020: Dangerous Wi-Fi KrØØk Vulnerability Affected More wi-fi chipset Than Previously Disclosed appeared first on GBHackers On Security.

Read more

EtherOops – A New Attack Let Hackers Exploit a Bug in Ethernet Cables to Bypass Firewall and NATs

EtherOops – A New Attack Let Hackers Exploit a Bug in Ethernet Cables to Bypass Firewall and NATs

Researchers unveiled a very new method that helps to exploit a vulnerability in Ethernet cables to bypass firewalls and NATs.  Earlier, this exploitation is considered as non-exploitable; but, now the weakness was named as Etheroops. This vulnerability works only if the targeted system network includes faulty Ethernet cables on the path from attackers to the […]

The post EtherOops – A New Attack Let Hackers Exploit a Bug in Ethernet Cables to Bypass Firewall and NATs appeared first on GBHackers On Security.

Read more

US GOV Exposes Chinese Espionage Malware “TAIDOOR” Secretly Used To For a Decade

US GOV Exposes Chinese Espionage Malware “TAIDOOR” Secretly Used To For a Decade

Recently, the U.S. government exposed Chinese surveillance malware “TAIDOOR” that are secretly used by the Chinese government for a decade. There has been a joint notice on TAIDOOR that has been revealed by the cybersecurity department of Homeland security (DHS) and Infrastructure Security Agency (CISA), the Federal Bureau of Investigations (FBI) and the Department of […]

The post US GOV Exposes Chinese Espionage Malware “TAIDOOR” Secretly Used To For a Decade appeared first on GBHackers On Security.

Read more

Best Practices For Securing Remote Teams

Best Practices For Securing Remote Teams

A lot of businesses have transitioned to a remote workforce due to the current health crisis. As we face uncertain times, this new setup brings forth challenges in productivity, company morale, and operations. But more importantly, business leaders should be aware of the potential security issues that their remote teams might face now they are […]

The post Best Practices For Securing Remote Teams appeared first on GBHackers On Security.

Read more

How to Protect Your Smart Home from IoT Threats?

IoT Threats

Our world is increasingly becoming digital as we are moving towards a society that is interconnected through a web of internet-enabled devices. We call this network or technology IoT (Internet of Things) which is also understood as ‘smart homes’. But is this technology safe? Well, just like other technologies, it is safe if you take […]

The post How to Protect Your Smart Home from IoT Threats? appeared first on GBHackers On Security.

Read more