Category: GBHackers
GNOME desktop manager was equipped with a new feature which allowed remote users to create graphical sessions on the system…
Today marks a significant milestone for Malcat users with the release of version 0.9.6, introducing Kesakode, a remote hash lookup…
A critical vulnerability has been identified in Cisco Firepower Management Center (FMC) Software’s web-based management interface. This vulnerability could potentially…
Hackers have exploited an obscure WordPress plugin to inject malware into websites, specifically targeting WooCommerce online stores to steal credit…
Google has released a patch for a zero-day exploit in its Chrome browser. The vulnerability, identified as CVE-2024-5274, involves a…
State-sponsored hackers recently exploited vulnerabilities in MITRE’s Networked Experimentation, Research, and Virtualization Environment (NERVE). They used rogue virtual machines (VMs)…
Cybersecurity researchers have identified a series of malicious software packages targeting MacOS users. These packages, found on the Python Package…
Hackers target military and government networks for varied reasons, primarily related to spying, which involves interference in the functioning of…
Zero Trust Maturity measures the extent to which an organization has adopted and implemented the Zero Trust security model. It…
The scalability and flexibility of cloud platforms recently boosted the emerging trend of cryptomining attacks in the cloud. Unlike on-premises…
In multiple aggressive phishing attempts, the financially motivated organization UAC-0006 heavily targeted Ukraine, utilizing ZIP and RAR attachments to distribute…
Gift cards are attractive to hackers since they provide quick monetization for stolen data or compromised systems. Reselling gift cards…