Category: GBHackers
BEC, an acronym for Business Email Compromise, is a sophisticated form of cybercrime. Cyber threats have become a pressing concern…
Cult of the Dead Cow (cDc) is one of the oldest and most highly influential hacking groups that was formed…
The notorious Hacktivists group, Known as Mysterious Team Bangladesh, exploits vulnerable versions of PHPMyAdmin and WordPress. It conducts DDoS and…
An unreported phishing campaign that disseminated a Python version of the NodeStealer has been found. NodeStealer gave threat actors the ability…
A critical remote code execution (RCE) vulnerability identified as CVE-2023-3519 has been the subject of several attacks, which have already compromised and…
Legitimate SSM agents can turn malicious when attackers with high-privilege access use it to carry out ongoing malicious activities on…
A website pretending to be Flipper Devices offers a free FlipperZero in exchange for completing an offer, but it merely…
HackerOne is a renowned cybersecurity company that offers bounty and penetration testing platforms to ethical hackers for the following activities:-…
The National Security Agency (NSA) has released best practices for configuring and hardening Cisco Firepower Threat Defense (FTD) which can…
LLMs are commonly trained on vast internet text data, often containing offensive content. To mitigate this, developers use “alignment” methods…
Threat actors targeting macOS have increased lately as there were several cases of macOS information stealer malware found in the…
The build and shared components on the CPUs are exploited by a method called Collide+Power. This attack vector does not…