Category: GBHackers
Memcyco will showcase its solutions at Deloitte’s annual Cyber iCON event, demonstrating how organizations can build effective defenses to protect…
Similar to ZuRu malware, a new malware has been found embedded in pirated macOS applications, which downloads and executes several…
DarkGate is a type of malware that employs Auto-It compiled loaders that cause a considerable threat because of its advanced evasion strategies and persistence…
A new Outlook vulnerability that can be used to extract NTLMv2 hashes by exploiting Outlook, Windows Performance Analyzer (WPA), and…
Hackers exploit UEFI flaws to gain unauthorized access to a system’s firmware, enabling them to implant persistent malware or manipulate…
Malicious cyber incidents, such as ransomware and unauthorized access, have affected the Water and Wastewater Sector (WWS) in the past…
The allure of NFTs, those shimmering digital tokens holding unique artworks and promises of fortune, has captivated the world. But…
The Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) have raised a red flag: Chinese-made…
Android TVs are widely used, and due to their wide adoption, threat actors frequently target them for unauthorized access or…
OSINVGPT is an AI-based system that helps security analysts with open-source investigations and tool selection. While this tool was developed…
A cryptocurrency-related phishing scam that uses malware called a drainer is one of the most widely used tactics these days. From…
Today, DDoS attacks stand out as the most widespread cyber threat, extending their impact to APIs. When successfully executed, these…