Category: GBHackers
Multiple Google services and Cloud users were allegedly the target of a unique HTTP/2-based DDoS attack. The attack used a cutting-edge method…
Microsoft has published its October security patches in which over 100 vulnerabilities were fixed in multiple Microsoft products, including Windows…
Protecting personal data is a growing concern, with local storage as the last line of defense. Even here, precautions are…
A command injection vulnerability has been discovered in the D-Link DAP-X1860 range extender, allowing threat actors to execute remote code…
Your perceived reality can differ from the .NET code you observe in debuggers like dnSpy, raising questions about its behavior…
The latest version of Cobalt Strike 4.9 is now available. This release includes improvements to Cobalt Strike’s post-exploitation capabilities, including…
In September 2023, FortiGuard Labs’ vigilant team uncovered a significant development in the IZ1H9 Mirai-based DDoS campaign. This campaign, known…
A new zero-day vulnerability has been discovered in Apple’s macOS systems, which allows threat actors to execute code on behalf…
Pablo Martínez, a member of the Red Team at cybersecurity firm Entelgy Innotec Security, has uncovered significant vulnerabilities in low-cost…
Two new vulnerabilities have been discovered in the widely used Curl tool. These two vulnerabilities are identified as CVE-2023-38545 and…
Threat actors have been laundering currencies with multiple methods. One of the most predominant ways they have been using lately…
The Trojan War’s famous horse trick inspired the term for cyberattacks, where a user unwittingly downloads a file that causes…