Category: GBHackers
On April Patch Tuesday, Microsoft fixed 149 bugs—one of the biggest security update releases in the company’s history. Many of…
The cybersecurity community is again on high alert as the notorious botnet group RUBYCARP, known for its SSH brute force…
A new critical vulnerability has been discovered in two of the Rust standard libraries, which could allow a threat actor…
Two new techniques uncovered in SharePoint enable malicious actors to bypass traditional security measures and exfiltrate sensitive data without triggering…
Cyber Threat Intelligence (CTI) is a process that actively gathers and analyzes information on potential cyber threats, including Indicators of…
Cybercriminals have actively exploited a critical vulnerability in D-Link Network Attached Storage (NAS) devices globally. Identified as CVE-2024-3273, this remote…
Cyber Threat Intelligence (CTI) is a process that actively gathers and analyzes information on potential cyber threats, including Indicators of…
Greylock McKinnon Associates, a prominent consulting firm, has reported a cyber attack that exposed personal data belonging to 341,000 individuals,…
Ahoy, which is often associated with communicating to ships, has now been playfully adopted in pirate language. We coin ‘Ahoi,’…
Hackers exploit Oracle WebLogic Servers, knowing that they are extensively used in enterprises. Threat actors can use security vulnerabilities present…
A Sandbox is a protective medium that blocks the entire system from any application accessing vulnerable resources. Restrictive environments for…
In a recent cybersecurity revelation, Ivanti, a leading provider of enterprise-grade secure access solutions, has been found to have significant…