Category: GBHackers
Two Zero-Day flaws have been discovered on Apple Devices affecting macOS, iOS, and iPadOS. The vulnerabilities involve an arbitrary code…
A new sophisticated stealing campaign named “Steal-It” has been discovered that exfiltrates NTLMv2 hashes using customized versions of Nishang’s Start-CaptureServer…
Google’s Threat Analysis Group (TAG) has issued an update regarding an ongoing campaign by North Korean threat actors targeting security…
Storm-0558, a threat actor based in China, has recently gained access to a Microsoft account consumer key. This has allowed…
Flipper Zero Devices have been discovered with the capability to perform Denial of Service attacks on iPhones. Threat actors can…
The АРТ28 hacking group, suspected to have ties to Russian special services, has made an audacious attempt to breach the…
The Raspberry Pi is a budget-friendly Linux computer system board that features GPIO pins for physical computing and IoT exploration….
MITRE has CISA (America’s cyber defense agency) unveiled a collection of plugins designed to extend the capabilities of Caldera into…
The usage of Blueshell malware spikes up by various threat actors to target Windows, Linux, and other operating systems across…
Reflectiz, a cybersecurity company specializing in continuous web threat management, offers an exclusive, fully remote solution to battle Magecart web-skimming…
Phylum analyzes source code and metadata for all registry-pushed packages. This year, in millions of packages they are aiming to…
The social network formerly known as Twitter, X, has released its latest data-gathering policy announcement. This includes collecting user information,…