Category: GBHackers

MrAnon Stealer Attacking Windows
11
Dec
2023

Hackers Spy iPhone Users Using Malicious Keyboard Apps

A new method of keylogging using malicious keyboard apps has been discovered to affect iPhones, evading all Apple’s security detection…

WordPress POP Chain Flaw
11
Dec
2023

Over 50% Insider Attacks Uses Privilege Escalation Vulnerability

In the labyrinth of cybersecurity, the specter of insider threats emerges as a formidable adversary, wielding both malicious intent and…

Star Blizzard New Evasion Techniques
11
Dec
2023

How Smart Cars Are Spying You?

Privacy concerns related to smart cars primarily revolve around the extensive data collection, sharing, and potential misuse of personal information….

WordPress POP Chain Flaw
11
Dec
2023

Crypto Exchange Founder Pleads Guilty for Dark Web Transfers

Bitzlato Ltd., a cryptocurrency exchange, was founded and is primarily owned by an individual who facilitated transactions between buyers and…

WordPress POP Chain Flaw
11
Dec
2023

Researchers Uncovered an Active Directory DNS spoofing exploit

In the intricate web of our interconnected world, the Domain Name System (DNS) stands as a linchpin, directing users to…

Star Blizzard New Evasion Techniques
09
Dec
2023

WordPress POP Chain Flaw Exposes Over 800M+ Sites to Attack

A critical remote code execution vulnerability has been patched as part of the WordPress 6.4.2 version. This vulnerability exists in…

TA422 Hackers Attack Organizations
09
Dec
2023

Star Blizzard New Evasion Techniques to Hijack Email Accounts

Hackers target email accounts because they contain valuable personal and financial information. Successful email breaches enable threat actors to:- Cybersecurity…

TA422 Hackers Attack Organizations
08
Dec
2023

Exploitation Methods Used by PlugX Malware Revealed

PlugX malware is sophisticated in evasion, as it uses the following techniques to avoid detection by antivirus programs, making it…

Atlassian Patches RCE Flaw
08
Dec
2023

TA422 Hackers Attack Organizations Using Outlook & WinRAR Vulnerabilities

Hackers exploit Outlook and WinRAR vulnerabilities because these widely used software programs are lucrative targets.  Outlook vulnerabilities offer:- Access to…

Atlassian Patches RCE Flaw
07
Dec
2023

A Threat to mobile Devices

An unauthenticated Bluetooth keystroke-injection vulnerability that affects Android, macOS, and iOS devices has been discovered. This vulnerability can be exploited…

SLAM Attack Gets Root Password
07
Dec
2023

Atlassian Patches RCE Flaw that Affected Multiple Products

Atlassian has been discovered with four new vulnerabilities associated with Remote Code Execution in multiple products. The CVEs for these…

SLAM Attack Gets Root Password
07
Dec
2023

Reflectiz Introduces AI-powered Insights on Top of Its Smart Alerting System

Reflectiz, a cybersecurity company specializing in continuous web threat management, proudly introduces a new AI-powered capability enhancing its Smart Alerting…