Category: GBHackers
XSS is a very commonly exploited vulnerability type that is very widely spread and easily detectable, and also it is…
Recently, the cybersecurity researchers at CYFIRMA found that hackers are actively using “Mystic Stealer Malware,” a new information stealer. It’s…
Recently, it’s been confirmed by Microsoft that the current outage problems experienced by the following services of Microsoft were due…
Since August 2022, a recently discovered Android virus named “GravityRAT” has rapidly circulated through a new Android malware campaign. It…
Cybersecurity is a constant concern for modern companies. While enterprises can use several world-class tools to protect their internal networks,…
This article will help you to understand the modern cyber threats and the most commonly used attack surfaces behind any malware/cyber-attacks….
A shocking discovery has been made by researchers, unveiling an innovative method for extracting covert encryption keys from smart cards…
Bolster’s threat research team recently discovered an extensive brand impersonation effort targeting over 100 well-known clothes, footwear, and apparel firms….
The Chinese cyberespionage gang, identified as UNC3886, has been spotted employing a VMware ESXi zero-day vulnerability to get escalated privileges…
Based on the recent reports by IOActive, Drones, also called Unmanned Aerial Vehicles (UAVs), are vulnerable to code injection, which…
LockBit was one of the most widely used ransomware in 2022, targeting both small and large organizations irrespective of their…
It has been discovered that threat actors might take over expired Amazon S3 buckets to serve rogue binaries without changing…