Category: GBHackers
A critical CPU vulnerability can pose a significant threat by allowing:- Unauthorized access to sensitive data Enabling malicious code execution…
Researchers have discovered a new phishing campaign that targets Middle Eastern and North African Government Entities to deliver a new…
Cybersecurity researchers at Talos have discovered that spammers are taking advantage of Google Forms quizzes to disseminate various types of…
Researchers found that vulnerable MySQL servers are being deployed with the Ddostf DDoS bot, which is capable of launching Distributed…
As we rely on the Internet for communication, business transactions, and various aspects of our daily lives, the need for…
SystemBC (aka Coroxy or DroxiDat) is a multifunctional malware known as Proxy, Bot, Backdoor, and RAT, adapting to attackers’ needs. …
There have been several cases of GPT model-based detection for various attacks from system logs. However, there has been no…
Payment Card Industry Data Security Standard or PCI DSS 4.0 was released in May 2022 by the PCI Security Standards…
Recently, hackers have used the Ethereum network’s CREATE2 opcode to bypass wallet security alarms in certain wallets. Using Create2’s pre-calculation…
Dark forums and Telegram channels have become great places for threat actors to sell critical vulnerabilities and exploits. These vulnerabilities…
A class-action lawsuit had been filed against Intel due to a critical “Downfall” vulnerability in Intel CPUs, a defect that Intel was…
A notorious phishing service that supplied cybercriminals with phishing kits, scam pages, and stolen credentials has been disrupted by a…