Category: GBHackers
To avoid detection, hackers employed a new method dubbed “MalDoc in PDF” to insert a malicious Word file into a PDF…
Authorities in Poland arrested two individuals on suspicion of planning an unlawful hack into the communication network of the national…
Microsoft Edge has published a release note that mentioned a Privilege escalation vulnerability with the CVE ID of CVE-2023-36741 and…
The recent discovery of a zero-day vulnerability (CVE-2023-2868) in Barracuda Networks Email Security Gateway (ESG) appliances has brought significant concern. …
There has been a cyber attack on two cloud hosting providers, namely CloudNordic and Azero Cloud, which Certiqa Holding owns….
A high-severity vulnerability in TACACS+ and RADIUS remote authentication for Cisco NX-OS Software might allow an unauthenticated local attacker to…
The most widely used network protocol analyzer in the world, Wireshark, has released version 4.0.8. It is employed for network…
Brute force attacks have been one of the most common attack types. In Q1 2022, brute force made up 51%…
Privilege escalation is a commonly employed attack vector in the Windows operating system environment. Attackers often leverage offensive tools such…
Corporate mobile devices have become essential to everyday tasks for employees, but this convenience also comes with security risks. The…
Kali Linux 2023.3 is now available, and it includes a variety of new packages and tools, as well as the…
A cyber attack group – GroundPeony, targeting the Taiwanese government, was discovered in March 2023; it used several tactics, such…