Category: GBHackers
A lot of money is being spent to protect the enterprise against intrusion. Ransomware protection is currently in the spotlight…
A vulnerability of medium severity, identified as CVE-2023-20042, with a CVSS score of 6.8, was found in the AnyConnect SSL…
Bank robbers of today are nothing like their counterparts of the past. Modern-day Bonnie and Clyde operate remotely, carrying out…
The frequency of hackers exploiting macOS flaws varies over time, but Apple continuously releases security updates to patch vulnerabilities. While…
Hackers can exploit Massive Domain Generator and URL Shortener services by creating large numbers of deceptive or malicious domains and…
Hackers opt for DLL hijacking as a technique to exploit vulnerable applications because it allows them to load malicious code…
HWP documents are primarily associated with the Hangul Word Processor software used in South Korea. Hackers may opt for HWP…
F5 Networks has issued a security alert about a severe vulnerability in its BIG-IP Configuration utility, identified as CVE-2023-46748. This…
At the end of October, AssetNote released a proof-of-concept for the CVE-2023–4966 associated with sensitive information disclosure for Citrix Netscaler…
The NuGet package manager, which .NET developers widely use, has been under attack by a series of malicious activities, according…
Atlassian has been reported with a critical vulnerability in their Confluence Software, which several organizations have widely adopted. The CVE…
Cybercriminals are resorting to unscrupulous tactics to deploy Bonanza malware by exploiting Google Search Ads. The hackers are taking advantage…