Category: GBHackers
The ScrubCrypt obfuscation tool has been discovered to be utilized in attacks to disseminate the RedLine Stealer malware, and its new variant was being marketed in…
According to a recent report by Secureworks, a well-planned and advanced phishing attack was carried out, specifically targeting hotels and…
Zoom, the most widely used video conferencing platform has been discovered with a critical vulnerability that threat actors could potentially…
Hackers use weaponized invoices to exploit trust in financial transactions, embedding malware or malicious links within seemingly legitimate payment requests. …
The U.S. Treasury Department sanctioned the famous cryptocurrency mixer Sinbad after it was claimed that the North Korean hacker group…
In a disconcerting turn of events, cyber threat actors have set their sights on Unitronics programmable logic controllers (PLCs) embedded…
Hackers often use weaponized documents to exploit vulnerabilities in software, which enables the execution of malicious code. All these documents…
Three Command injection vulnerabilities have been discovered in Zyxel NAS (Network Attached Storage) products, which could allow a threat actor…
The latest analysis shows that tens of millions of people are creating weak passwords on three of the four most…
Google has fixed the sixth Chrome zero-day bug that was exploited in the wild this year. The flaw, identified as CVE-2023-6345,…
An Android malware campaign was previously discovered that distributed banking trojans targeting four major Iranian Banks: Bank Mellat, Bank Saderat,…
Six novel Bluetooth attack methods have been discovered, which were named BLUFFS (Bluetooth Forward and Future Secrecy) attacks. These attacks…