Category: GBHackers

Webinar
31
Jan
2024

U.S. Officials Detained a 19-year-old SIM-Swap Hacker

In the murky depths of the digital underworld, a tale unfolds: the rise and fall of “King Bob,” a moniker…

Webinar
31
Jan
2024

45K+ Publicly Exposed Jenkins Instances Vulnerable to RCE Attacks

It was previously reported that Jenkins was discovered with a new critical vulnerability, which was associated with unauthenticated arbitrary file…

Webinar
30
Jan
2024

Aembit Announces New Workload IAM Integration with CrowdStrike

Aembit Becomes the First Workload IAM Platform to Integrate with the Industry-Leading CrowdStrike Falcon Platform to Drive Workload Conditional Access…

Webinar
30
Jan
2024

APT Hackers Using FalseFont Backdoor to Hacked Computer

Peach Sandstorm APT targets defense contractors globally via the FalseFont Backdoor, which can access remote systems and exfiltrate data. In this…

Webinar
30
Jan
2024

Beware of Phobos Ransomware Delivered via Office Document

Researchers discovered an Office document with a VBA script intended to spread the Phobos ransomware known as FAUST. The FAUST…

Webinar
30
Jan
2024

GitLab Flaw Let Attackers Write Files to Arbitrary Locations

GitLab releases security updates addressing several critical vulnerabilities, urging all users to upgrade immediately. This release is crucial for ensuring…

Democratizing Cybersecurity for Organizations of All Sizes
30
Jan
2024

Control D Launches Control D for Organizations

In an era where online threats no longer discriminate by business size, Control D, powered by Windscribe VPN‘s robust security…

Webinar
29
Jan
2024

Exploit Released for Critical Jenkins RCE Flaw

Jenkins has been discovered with a critical vulnerability that is associated with arbitrary code execution that threat actors can exploit…

Webinar
26
Jan
2024

Russian TrickBot Malware Developer Pleaded Guilty

Vladimir Dunaev, a resident of Amur Blast and aged 40, has confessed to creating and distributing Trickbot malware. The purpose…

Webinar
26
Jan
2024

Chinese Hackers Hijack Software Updates to Install Malware

In order to obtain unauthorized access and control, hackers take advantage of software vulnerabilities by manipulating updates. By corrupting the…

Webinar
25
Jan
2024

Google Kubernetes Flaw Let Any Google User Control the Cluster

Researchers have discovered a new loophole in Google Kubernetes Engine (GKE), which threat actors can utilize with a Google account…

Webinar
25
Jan
2024

198% Surge in Browser Based zero-hour Phishing Attacks

The digital landscape is under siege. Surging browser-based phishing attacks, a 198% increase in just the second half of 2023,…