Category: GBHackers
Hackers abuse the ChatGPT name for malicious domains to exploit the credibility associated with the ChatGPT model, deceiving users into…
While the world celebrated Christmas, the cybercrime underworld feasted on a different kind of treat: the release of Meduza 2.2,…
Hackers exploit Zero-Days because these vulnerabilities are unknown to software developers, making them valuable for launching attacks before developing patches. …
Barracuda Email Security Gateway (ESG) Appliance has been discovered with an Arbitrary code Execution vulnerability exploited by a China Nexus…
A new vulnerability has been discovered in Apache OfBiz, an open-source Enterprise Resource Planning (ERP) system. Apache OfBiz is used…
The cybersecurity domain is undergoing rapid changes owing to the rise in frequency and complexity of cyber threats. As the…
Threat actors targeting crypto wallets for illicit transactions have been in practice for quite some time. Threat actors have been…
Ubisoft, the renowned video game developer behind iconic franchises like Assassin’s Creed and Far Cry, narrowly escaped a potentially devastating…
Hackers use weaponized Word documents to deliver malicious payloads through social engineering. By embedding malware or exploiting vulnerabilities in these…
Android malware infects devices to take full control for various illicit purposes like:- Stealing sensitive information Generating unauthorized financial transactions…
In a strategic move destined to fortify its dominance in the ever-evolving realm of cloud security, Cisco has officially declared…
Organizations face an escalating threat of bot attacks in the rapidly evolving digital landscape. As revealed in our latest AppSec…