Category: GBHackers
DotRunpeX is one of the new and stealthiest .NET injectors that employs the “Process Hollowing” method, through which this malware…
Android Smartphones lay a vital role in our daily life, as they help us to stay connected and, not only…
The recent Africa Cyber Surge II operation conducted by INTERPOL and AFRIPOL has revealed a stark reality – the surge…
Threat actors are actively modifying their TTPs to counter the advanced security mechanisms and tools to accomplish their illicit goals…
The Cuba ransomware seems to be gaining more pace with each passing year, and this ransomware has been operating and…
Cynomi, the leading AI-powered virtual Chief Information Security Officer (vCISO) platform vendor for Managed Service Providers (MSPs), Managed Security Service…
The Airplane mode in smartphones ensures safe device use on flights, as this feature prevents interference with critical flight systems…
Web servers are a prime target for threat actors due to their open and volatile nature. However, these servers must…
In the current world of cybersecurity, security threats are evolving at a rapid pace, as there are always new problems…
An SQL injection vulnerability was discovered in the web-based management interface of Cisco Unified Communications Manager (Unified CM) and Cisco…
The vulnerabilities, CVE-2023-38401 and CVE-2023-38402, affect the HPE Aruba Networking Virtual Intranet Access (VIA) client for the Microsoft Windows operating…
An ongoing campaign has resulted in the compromise of multiple LinkedIn accounts. However, the motive behind this campaign remains unclear…