Category: GBHackers

Vulnerability Assessment In Cybersecurity
11
Jul
2023

What is Vulnerability Assessment In Cybersecurity?

One of the best methods for finding potential security gaps in your company’s cybersecurity design is a vulnerability assessment. You…

Legion Tool Steals PUBG Players' Browser Passwords
11
Jul
2023

Legion Tool Steals PUBG Players’ Browser Passwords

“The Legion” is a Python-based software that has been crafted with the explicit intention of gathering credentials. Its propagation initially…

Vulnerability Assessment In Cybersecurity
11
Jul
2023

Hackers use Rekoobe Backdoor to Attack Linux Systems

Rekoobe is a notorious backdoor that primarily targets Linux environments, and it’s actively exploited by the threat actors, mainly a…

GPT-4 API Available
11
Jul
2023

OpenAI Has Made The GPT-4 API Available To Everyone

GPT-4, OpenAI’s newest text-generation model, is now generally available through its API. As part of its upgrade, the company also…

A vulnerability in Edge Routers’s and AirCube’s miniupnpd
10
Jul
2023

A vulnerability in Edge Routers’s and AirCube’s miniupnpd

AirCube is a wireless access point device used in homes and Edge Routers are special routers manufactured by Ubiquiti that…

File Management App China
10
Jul
2023

Letscall – New Voice Over IP Phishing Attack Steal

Vishing’s popularity has surged significantly in recent years, and this phenomenon is gradually destroying the trust factor in unknown calls…

RomCom Threat Actor Uses Microsoft Word File to Deliver Malware
10
Jul
2023

RomCom Threat Actor Uses Microsoft Word File to Deliver Malware

RomCom is a RAT – that enables remote access/control over devices to exfiltrate sensitive information for financial gain, now being…

Cyber Threat Intelligence Benefits at Security Operation Centre
10
Jul
2023

Cyber Threat Intelligence Benefits at Security Operation Centre

Cyber Threat intelligence is one of the most critical concerns in the evolving threat environment of rapid day-zero attacks, cyber-criminality…

File Management App China
08
Jul
2023

Understanding The Difference Between DDR and EDR – GBHackers – Latest Cyber Security News

Cybersecurity is infamous for its acronyms. From APT to ZTNA, it is easy to get bogged down in the quagmire…

File Management App China
08
Jul
2023

1.5M Download File Management App Transfers Data to China

Cybersecurity researchers recently found 2 malicious applications on the Google Play store, installed by 1.5M users, collecting excessive data beyond…

Netwrix Auditor RCE Flaw
07
Jul
2023

Hackers Exploit Netwrix RCE Flaw in Truebot Malware Attack

A newly found Truebot Malware targets both US and Canada-based organizations to exfiltrate sensitive information by exploiting vulnerabilities in the…

New Linux kernel Privilege Escalation Vulnerability
07
Jul
2023

New Linux kernel Privilege Escalation Vulnerability

A security flaw has been identified in the Linux kernel called “stockRot” (CVE-2023-3269). This vulnerability grants attackers access to the…