Category: GBHackers
Cyberattacks are becoming increasingly sophisticated, threatening organizations’ critical infrastructure and sensitive data more than ever. Core solutions such as SIEMs…
For a supply chain attack and to plant the Korplug backdoor (aka PlugX) on the systems of the targeted victims,…
Two Server-Side Request Forgery (SSRF) vulnerabilities were found in Apache Batik, which could allow a threat actor to access sensitive…
An unauthenticated critical API access vulnerability was found in the Ivanti Sentry interface, which could allow a threat actor to…
Researchers have identified a new Malware-as-a-Service (MaaS) operator called ‘EVLF DEV’ as being behind the creation of CypherRAT and CraxsRAT….
A blind XPath injection vulnerability was discovered in Apache Software Foundation Apache Ivy, which allows threat actors to exfiltrate data…
Multiple vulnerabilities have been discovered on Junos OS, which can be combined to execute a preAuth remote code execution vulnerability…
DotRunpeX is one of the new and stealthiest .NET injectors that employs the “Process Hollowing” method, through which this malware…
Android Smartphones lay a vital role in our daily life, as they help us to stay connected and, not only…
The recent Africa Cyber Surge II operation conducted by INTERPOL and AFRIPOL has revealed a stark reality – the surge…
Threat actors are actively modifying their TTPs to counter the advanced security mechanisms and tools to accomplish their illicit goals…
The Cuba ransomware seems to be gaining more pace with each passing year, and this ransomware has been operating and…