Category: GBHackers
The 29-year-old man was arrested in Mykolaiv, Ukraine, for using hacked accounts to create 1 million virtual servers to illegally mine…
Hackers target vulnerable WordPress plugins as they provide a potential entry point to exploit website security weaknesses. These plugins often…
Several vulnerabilities have been discovered in Splunk Enterprise Security and Splunk User Behavior Analytics (UBA), which existed in several third-party…
Hackers use Qbot malware for its advanced capabilities, including keylogging, credential theft, and backdoor functionality. Previously distributed Qakbot malware campaign…
Invati Connect Secure (ICS) and Ivanti Policy Secure Gateways have been discovered with two new vulnerabilities associated with authentication bypass…
AgentTesla is a notorious malware that functions as a keylogger and information stealer. By logging keystrokes and capturing screenshots on…
Hackers use the Mirai botnet to launch large-scale Distributed Denial of Service (DDoS) attacks by exploiting vulnerable Internet of Things…
AirDrop was introduced in iOS 7, which allows Apple users to transmit files between iOS and macOS systems. Moreover, this…
Adobe has released a security update that fixes “Important-severity” vulnerabilities in its Substance 3D Stager product. The successful exploitation of…
Pikabot is a loader malware that is active in spam campaigns and has been used by the threat group Water…
Hackers use YouTube channels to deliver malware due to the huge user base of the platform. By using YouTube channels,…
Qakbot is a sophisticated banking trojan and malware that primarily targets financial institutions. This sophisticated malware steals sensitive information such…