Category: GBHackers

DarkGate Evolved Complete Toolkit
27
Nov
2023

MOVEit Hack :AutoZone Users Personal Data Hacked

AutoZone Inc., a US retailer of automotive parts and accessories, warned customers that their data had been compromised as a…

DarkGate Evolved Complete Toolkit
27
Nov
2023

Dell Command Flaw Let Attackers Compromise Vulnerable System

It has been discovered that there is a high-severity vulnerability in Dell Command Configure that could potentially be exploited by…

DarkGate Evolved Complete Toolkit
27
Nov
2023

North Korean Hackers Exploiting Zero-day Vulnerabilities

The DPRK has been a great threat to organizations in recent times. Their attack methods have been discovered with several…

ZTNA and VPN
27
Nov
2023

DarkGate Malware-as-a-Service Evolved as Complete Toolkit

DarkGate is a complete toolkit, first discovered in 2018, that provides attackers with extensive capabilities to access target systems completely. On…

ZTNA and VPN
25
Nov
2023

The RAT King “NetSupport RAT” Back in Action Via Fake Browser

In the perpetually evolving realm of cybersecurity, the reawakening of NetSupport RAT, a Remote Access Trojan (RAT), casts a looming…

ZTNA and VPN
24
Nov
2023

Authorities Seized $9M in Crypt0 Dollar Conversion

Authorities seized about $9 million in crypto, which was earned by taking advantage of over 70 victims nationwide through alleged…

MySQL Security
24
Nov
2023

ZTNA and VPN – What is the Difference?

In the late 1990s, VPN technology revolutionized remote work. However, the traditional VPN model has become outdated and unworkable as…

Cisco Patch HTTP/2 Rapid Reset Attack
23
Nov
2023

MySQL Security Best Practices Guide

MySQL stands out for its reliability and efficiency among the various database systems available. However, as with any technology that…

Cisco Patch HTTP/2 Rapid Reset Attack
23
Nov
2023

Kubernetes Secrets Allow Hackers Access Sensitive Environments

Kubernetes is an open-source container orchestration platform that automates the deployment, scaling, and management of containerized applications.  Besides this, hackers…

Cisco Patch HTTP/2 Rapid Reset Attack
23
Nov
2023

Researchers Hacked Windows Hello Fingerprint Authentication

Microsoft Windows Hello Fingerprint authentication was evaluated for security over its fingerprint sensors embedded in laptops. This led to the…

poloniex cyber attack
23
Nov
2023

Cisco Patched Products Vulnerable to HTTP/2 Rapid Reset Attack

A new high-severity vulnerability has been discovered in multiple Cisco products, which could potentially allow HTTP/2 Rapid Reset Attack. This…

poloniex cyber attack
23
Nov
2023

117 Vulnerabilities Discovered in Microsoft 365 Apps

Microsoft 365 Apps is a suite of productivity tools that includes the following apps and services offered by Microsoft through…