Category: GBHackers
The threat actors have been spotted increasingly depending on Remote Management and Monitoring (RMM) tools, which resulted in a relatively botched Hive…
This article explores the conversion of Microsoft Outlook’s OST file to PST format and highlights the necessity of this conversion…
EvilBamboo, formerly known as “Evil Eye,” has been found to target Tibetan, Uyghur, and Taiwanese organizations and individuals. This threat…
In a recent disclosure, BIND 9, a widely-used DNS (Domain Name System) server software, has been found vulnerable to two…
OilRig (APT34) is an Iranian cyberespionage group active since 2014, targeting Middle Eastern governments and various industries like:- Chemical Energy…
Students, authors, and anybody else wishing to improve their vocabulary and language abilities frequently utilize Thesaurus, one of the well-known…
The financially motivated GOLD MELODY threat group has been active at least since 2017, attacking organizations by taking advantage of…
MOVEit transfer service pack has been discovered with three vulnerabilities associated with SQL injections (2) and a Reflected Cross-Site Scripted…
A new financially motivated threat group named “LUCR-3” has been discovered targeting organizations to steal intellectual property for extortion. This…
Only a few malware families can claim to have persisted for nearly twenty years, and QakBot (also referred to as…
For taking part in a large international scheme to earn millions of dollars by selling pirated business telephone system software licenses,…
If you use Trend Micro Apex One, you should know that the third-party Antivirus uninstaller feature may have a security…