Category: GBHackers
The U.S. Securities and Exchange Commission (SEC) has made changes to Regulation S-P that require financial companies to report data…
In the big data era, pre-training large vision transformer (ViT) models on massive datasets has become prevalent for enhanced performance…
A critical remote code execution vulnerability has been discovered in the git clone which was assigned with CVE-2024-32002 and the…
In a recent encounter, the Akira ransomware group exploited a novel privilege escalation technique, where the attackers infiltrated the victim’s…
Two Chinese people have been arrested on suspicion of being involved in a complex cryptocurrency trading scam that stole more…
A proof-of-concept (PoC) exploit for a critical zero-day vulnerability (CVE-2024-4947) in Google Chrome has been made public. The potential for…
Kinsing malware, known for exploiting vulnerabilities on Linux cloud servers to deploy backdoors and cryptominers, has recently expanded its target…
The dark web has seen the release of a new vulnerability that targets SonicWALL SSL-VPN devices. Recently, the exploit, which…
Hackers prefer phishing as it exploits human vulnerabilities rather than technical flaws which make it a highly effective and low-cost…
ViperSoftX malware, known for stealing cryptocurrency information, now leverages Tesseract, an open-source OCR engine, to target infected systems, which extracts…
Linux is widely used in numerous servers, cloud infrastructure, and Internet of Things devices, which makes it an attractive target…
A very important message from the Norwegian National Cyber Security Centre (NCSC) says that Secure Socket Layer/Transport Layer Security (SSL/TLS)…