Category: GBHackers
An extensive examination of the growing danger posed by the Pure malware family has been released, providing the industry with…
Ransomware is a tool that hackers use to extort money from their targets like individuals, businesses, and governments. The malware…
Hackers in India are using fake loan applications to target Android users to take advantage of the rising demand for…
Since office documents are often used in business communications, hackers take advantage of this fact to disseminate malicious malware easily….
Two malicious npm packages were discovered on the npm open source package manager, which leverages GitHub to store stolen Base64-encrypted…
To maintain access to compromised networks, hackers use specialized hacking tools. Such tools help the threat actors evade the detection…
VexTrio, a cybercrime syndicate with a history dating back to at least 2017, has been implicated in nefarious activities utilizing…
Hackers use supply chain attacks to breach a target by gaining access to and taking advantage of weaknesses in the…
In the murky depths of the digital world lurks a cunning predator – Parrot TDS, a cyber campaign that has…
Hackers target cybersecurity professionals as successfully compromising their systems or gaining access to their credentials provides a gateway to valuable…
A PyPI malware author identified as “WS” was discovered by researchers to be covertly uploading malicious packages to PyPI that were impacting…
In a brazen act of digital deception, the U.S. Securities and Exchange Commission’s (SEC) official Twitter account, @SECGov, was compromised…