Category: GBHackers
Cybercriminals are known to exploit malicious advertising techniques for targeting the widely-used Notepad++ text editor for Windows. This could lead…
TeamViewer’s popularity and remote access capabilities make it an attractive target for those seeking to compromise systems for their gain….
A new campaign has been discovered that uses XorDDoS Trojan, which affects Linux systems and devices, turning them into zombies…
In the continuing Israel-Palestine conflict, there has been a noticeable rise in hacktivist groups who are planning an unending attack…
Discord has become a household name in online gaming and digital communication. Gamers, friends, and families flock to this platform…
AgentTesla, a notorious information stealer, is observed spreading via CHM and PDF Files, which covertly harvest critical information from the…
In an ever-changing digital landscape, robust security measures are paramount. As Windows adapts to meet the evolving demands of our world,…
Cybercriminals behind the AvosLocker ransomware attack employed a tactic of infecting organizations through Open-Source Remote Administration Tools. This method allowed…
GitOps is a methodology that uses Git (or other version control systems) to store all aspects of a project’s infrastructure,…
A new phishing attack has been discovered, which uses malicious archive files to exploit the recently found WinRAR vulnerability CVE-2023-38831…
The ever-evolving world of cybercrime has given birth to a disturbing phenomenon – Phishing-as-a-Service (PhaaS), and one name that sends…
ToddyCat, a highly skilled advanced persistent threat (APT) actor notorious for launching targeted attacks in Europe and Asia, has recently…