Category: GBHackers
AutoZone Inc., a US retailer of automotive parts and accessories, warned customers that their data had been compromised as a…
It has been discovered that there is a high-severity vulnerability in Dell Command Configure that could potentially be exploited by…
The DPRK has been a great threat to organizations in recent times. Their attack methods have been discovered with several…
DarkGate is a complete toolkit, first discovered in 2018, that provides attackers with extensive capabilities to access target systems completely. On…
In the perpetually evolving realm of cybersecurity, the reawakening of NetSupport RAT, a Remote Access Trojan (RAT), casts a looming…
Authorities seized about $9 million in crypto, which was earned by taking advantage of over 70 victims nationwide through alleged…
In the late 1990s, VPN technology revolutionized remote work. However, the traditional VPN model has become outdated and unworkable as…
MySQL stands out for its reliability and efficiency among the various database systems available. However, as with any technology that…
Kubernetes is an open-source container orchestration platform that automates the deployment, scaling, and management of containerized applications. Besides this, hackers…
Microsoft Windows Hello Fingerprint authentication was evaluated for security over its fingerprint sensors embedded in laptops. This led to the…
A new high-severity vulnerability has been discovered in multiple Cisco products, which could potentially allow HTTP/2 Rapid Reset Attack. This…
Microsoft 365 Apps is a suite of productivity tools that includes the following apps and services offered by Microsoft through…