Bhuvanesh Prabhakaran, Author at GBHackers - Latest Cyber Security News | Hacker News https://gbhackers.com/author/bhuvanesh/ Cyber Security News, Hacking News, Information security, Cyber Security, Penetration testing Fri, 07 Jul 2023 10:49:44 +0000 en-US hourly 1 https://wordpress.org/?v=6.2.2 116523949 SOC First Defense – Understanding The Cyber Attack Chain – A Defense with/without SOC https://gbhackers.com/soc-defense-attack-chain/ https://gbhackers.com/soc-defense-attack-chain/#respond Mon, 26 Jun 2023 10:51:52 +0000 https://gbhackers.com/?p=27396 This article will help you to understand the SOC modern cyber threats and the most commonly used attack surfaces behind any malware/cyber-attacks. Most times, cyber-attacks are getting executed in stages. So the SOC team must understand the attack patterns and the attack chain. So breaking the attack chain and averting the criminal’s intent to stop their […]

The post SOC First Defense – Understanding The Cyber Attack Chain – A Defense with/without SOC appeared first on GBHackers - Latest Cyber Security News | Hacker News.

]]>
https://gbhackers.com/soc-defense-attack-chain/feed/ 0 27396
Telemedicine: Top 5 Benefits of Virtual Healthcare https://gbhackers.com/telemedicine-top-5-benefits-of-virtual-healthcare/ https://gbhackers.com/telemedicine-top-5-benefits-of-virtual-healthcare/#respond Mon, 05 Dec 2022 17:38:00 +0000 https://gbhackers.com/?p=63647 The term telehealth refers to delivering healthcare services over the internet or through mobile devices. Doctors deliver this type of healthcare remotely, unlike the traditional approach of seeing a doctor in person. You can access medical care for a wide range of conditions and concerns through telemedicine development services, and these online visits offer numerous […]

The post Telemedicine: Top 5 Benefits of Virtual Healthcare appeared first on GBHackers - Latest Cyber Security News | Hacker News.

]]>
https://gbhackers.com/telemedicine-top-5-benefits-of-virtual-healthcare/feed/ 0 63647
SOC Third Defense Phase – Understanding Your Organization Assets https://gbhackers.com/soc-third-defense-phase/ https://gbhackers.com/soc-third-defense-phase/#respond Sat, 07 Aug 2021 04:42:00 +0000 https://gbhackers.com/?p=27850 In our first phase, we have seen the basic defense mechanisms which were recommended in organizations. In our second phase, we have seen the understanding and the importance of the behaviors of modern-day malware to encounter. In this third phase, we are going to see the importance of understanding your organization assets to provide better […]

The post SOC Third Defense Phase – Understanding Your Organization Assets appeared first on GBHackers - Latest Cyber Security News | Hacker News.

]]>
https://gbhackers.com/soc-third-defense-phase/feed/ 0 27850
SOC Second Defense Phase – Understanding the Cyber Threat Profiles https://gbhackers.com/soc-defense-phase-threat-profiles/ https://gbhackers.com/soc-defense-phase-threat-profiles/#respond Mon, 19 Jul 2021 01:30:00 +0000 https://gbhackers.com/?p=27818 In the first phase of architecturing the SOC, we have seen the basic level understanding of the attacks and necessary steps to breaking the Attack Chain. Let’s move on to the phases of SOC and advanced level of protecting the organization from various Threat Profiles. Early years, when we say the virus, it’s just an […]

The post SOC Second Defense Phase – Understanding the Cyber Threat Profiles appeared first on GBHackers - Latest Cyber Security News | Hacker News.

]]>
https://gbhackers.com/soc-defense-phase-threat-profiles/feed/ 0 27818
CoronaVirus Cyber Attack Panic – Threat Actors Targets Victims Worldwide https://gbhackers.com/coronavirus-cyber-attack/ https://gbhackers.com/coronavirus-cyber-attack/#respond Mon, 16 Mar 2020 05:26:07 +0000 https://gbhackers.com/?p=43688 Spammers are using the Coronavirus outbreak to spread malware via emails claiming to be “Offer information on how to defend against the real-world virus”, according to Bleeping Computer, which attributed the campaign to Emotet. Cybercriminals are taking advantage of global fears surrounding the deadly Coronavirus by sending out malware-laden emails supposedly offering guidance. The strain […]

The post CoronaVirus Cyber Attack Panic – Threat Actors Targets Victims Worldwide appeared first on GBHackers - Latest Cyber Security News | Hacker News.

]]>
https://gbhackers.com/coronavirus-cyber-attack/feed/ 0 43688
Cyber Security is Not an Easy Game for CISO – It’s an Absolute End Game! https://gbhackers.com/cyber-security-is-not-an-easy-game-for-ciso-its-an-absolute-end-game/ https://gbhackers.com/cyber-security-is-not-an-easy-game-for-ciso-its-an-absolute-end-game/#respond Fri, 31 May 2019 13:47:14 +0000 https://gbhackers.com/?p=26411 Let’s breakdown the little pieces and the critical dots to connect in the perspective of a CISO and a point-of-view from CyberSpace. The threats and the risks are potentially increasing in Cyber Space and no organization is 100% safe, every CISO should follow the “Zer0-Trust” model over their organization and their security team. Digital Data […]

The post Cyber Security is Not an Easy Game for CISO – It’s an Absolute End Game! appeared first on GBHackers - Latest Cyber Security News | Hacker News.

]]>
https://gbhackers.com/cyber-security-is-not-an-easy-game-for-ciso-its-an-absolute-end-game/feed/ 0 26411
APT Malware LOLBins & GTFOBins Attack users by Evading the Security Sysem https://gbhackers.com/apt-malware-lolbins-gtfobins-attack-users-by-evading-the-security-sysem/ https://gbhackers.com/apt-malware-lolbins-gtfobins-attack-users-by-evading-the-security-sysem/#respond Sat, 02 Feb 2019 11:52:08 +0000 https://gbhackers.com/?p=27122 Earlier time, cybercriminals depend more on the malware files, scripts, VBscripts to achieve their course of action. Modern ay cyber threat actors, depends more on abusing the genuine windows system files and achieve their goal in persistence, defense evasion, lateral movement and more. In every system, there are Trusted Binaries, Scripts and Library files are […]

The post APT Malware LOLBins & GTFOBins Attack users by Evading the Security Sysem appeared first on GBHackers - Latest Cyber Security News | Hacker News.

]]>
https://gbhackers.com/apt-malware-lolbins-gtfobins-attack-users-by-evading-the-security-sysem/feed/ 0 27122
Rising Threats in CyberSpace – Organizations Must be Prepared to Experience https://gbhackers.com/rising-threats-in-cyberspace-organizations-must-be-prepared-to-experience/ https://gbhackers.com/rising-threats-in-cyberspace-organizations-must-be-prepared-to-experience/#respond Sat, 02 Feb 2019 00:01:00 +0000 https://gbhackers.com/?p=27046 Recently we have seen more increase in various threats and the ways of intruding the network and there were increase by APT groups. Mostly because of political agenda, cyberespionage, cyberwars, competitions and more of script kiddies. Even though it’s urging and pushing us to implement SOC in your organization, still it does not achieve what […]

The post Rising Threats in CyberSpace – Organizations Must be Prepared to Experience appeared first on GBHackers - Latest Cyber Security News | Hacker News.

]]>
https://gbhackers.com/rising-threats-in-cyberspace-organizations-must-be-prepared-to-experience/feed/ 0 27046
FORMBOOK Malware Delivered via Weaponized RTF Word Docs – Using CVE-2017-11882 https://gbhackers.com/formbook-malware-weaponized-rtf/ https://gbhackers.com/formbook-malware-weaponized-rtf/#respond Wed, 30 Jan 2019 06:58:05 +0000 https://gbhackers.com/?p=26934 Formbook campaign with what looks like a few changes. Recently the criminals distributing this malware have been using .exe files inside various forms of an archive, including .iso, .ace, .rar. , zip. Frequently they use various Microsoft Office Equation Editor exploits to contact a remote site & download the payload. Very occasionally I have seen […]

The post FORMBOOK Malware Delivered via Weaponized RTF Word Docs – Using CVE-2017-11882 appeared first on GBHackers - Latest Cyber Security News | Hacker News.

]]>
https://gbhackers.com/formbook-malware-weaponized-rtf/feed/ 0 26934
Hackers Conducting RDP Attacks Using New Technique to Bypass Protections https://gbhackers.com/threat-actors-conducting-rdp-attacks/ https://gbhackers.com/threat-actors-conducting-rdp-attacks/#respond Mon, 28 Jan 2019 03:25:39 +0000 https://gbhackers.com/?p=26813 A Microsoft Windows component, RDP was designed to provide administrators, engineers, and users with remote access to systems. However, threat actors have been using the technology for nefarious purposes, and the trend continues, especially since an RDP attack is usually more difficult to detect than a backdoor.  “Threat actors continue to prefer RDP for the […]

The post Hackers Conducting RDP Attacks Using New Technique to Bypass Protections appeared first on GBHackers - Latest Cyber Security News | Hacker News.

]]>
https://gbhackers.com/threat-actors-conducting-rdp-attacks/feed/ 0 26813