Category: GBHackers

Democratizing Cybersecurity for Organizations of All Sizes
30
Jan
2024

Control D Launches Control D for Organizations

In an era where online threats no longer discriminate by business size, Control D, powered by Windscribe VPN‘s robust security…

Webinar
29
Jan
2024

Exploit Released for Critical Jenkins RCE Flaw

Jenkins has been discovered with a critical vulnerability that is associated with arbitrary code execution that threat actors can exploit…

Webinar
26
Jan
2024

Russian TrickBot Malware Developer Pleaded Guilty

Vladimir Dunaev, a resident of Amur Blast and aged 40, has confessed to creating and distributing Trickbot malware. The purpose…

Webinar
26
Jan
2024

Chinese Hackers Hijack Software Updates to Install Malware

In order to obtain unauthorized access and control, hackers take advantage of software vulnerabilities by manipulating updates. By corrupting the…

Webinar
25
Jan
2024

Google Kubernetes Flaw Let Any Google User Control the Cluster

Researchers have discovered a new loophole in Google Kubernetes Engine (GKE), which threat actors can utilize with a Google account…

Webinar
25
Jan
2024

198% Surge in Browser Based zero-hour Phishing Attacks

The digital landscape is under siege. Surging browser-based phishing attacks, a 198% increase in just the second half of 2023,…

Pure Malware Tools Masquerade As Legitimate Software to Bypass Detections
25
Jan
2024

Pure Malware Tools Masquerade As Legitimate Software to Bypass Detections

An extensive examination of the growing danger posed by the Pure malware family has been released, providing the industry with…

Webinar
25
Jan
2024

Kasseika Ransomware Exploits Driver Functionality to Kill Antivirus

Ransomware is a tool that hackers use to extort money from their targets like individuals, businesses, and governments. The malware…

Webinar
25
Jan
2024

Hackers Targeting Indian Users with Fake Android Loan Apps

Hackers in India are using fake loan applications to target Android users to take advantage of the rising demand for…

Webinar
24
Jan
2024

Beware of Weaponized Office Documents that Deliver VenomRAT

Since office documents are often used in business communications, hackers take advantage of this fact to disseminate malicious malware easily….

Webinar
24
Jan
2024

Hackers Deploy Malicious npm Packages to Steal SSH Key

Two malicious npm packages were discovered on the npm open source package manager, which leverages GitHub to store stolen Base64-encrypted…

Webinar
24
Jan
2024

Hackers Use SYSTEMBC Tool to Maintain Access

To maintain access to compromised networks, hackers use specialized hacking tools. Such tools help the threat actors evade the detection…