Category: GBHackers

TCP vs UDP - What is the Difference?
28
Apr
2023

TCP vs UDP – What is the Difference?

If you have ever had to configure a firewall, set up a router, or choose the best VPN for your…

SOC Training - SOC Analyst Cyber Attack Intrusion Training
28
Apr
2023

SOC Training – SOC Analyst Cyber Attack Intrusion Training

SOC Training is one of the most critical concerns in building a Quality Security Operation Center Team to fight against…

Cosmos Bank Cyber Attack
28
Apr
2023

Cosmos Bank Cyber Attack – Hackers Stole Over 78 Crore

The Cosmos cooperative bank in Pune, among the city’s oldest urban cooperative banks, has fallen prey to cyber fraudsters. Hackers…

Git Project Security Vulnerabilities
28
Apr
2023

Git Project Flaws Let Attackers Execute Arbitrary Code

A fresh set of Git releases was made available to fix several security flaws. It gives attackers the ability to…

Critical VMware Vulnerabilities Let Attackers Execute Code
27
Apr
2023

Critical VMware Vulnerabilities Let Attackers Execute Code

VMware Workstation, Workstation Pro, and Fusion have been subjected to several privately reported and fixed flaws. VMware has published a…

TP-Link WAN-Side Vulnerability
27
Apr
2023

TP-Link WAN-Side Vulnerability Exploited to Install Mirai

Mirai botnet exploits CVE-2023-1389 to add TP-Link Archer A21 (AX1800) routers to DDoS attacks. During the Pwn2Own Toronto event in…

Cisco Zero-Day XSS Flaw
27
Apr
2023

Let Remote Attackers Launch XSS

A zero-day flaw in Cisco’s Prime Collaboration Deployment (PCD) software that can be used to launch cross-site scripting attacks has…

New Phishing Attacks
27
Apr
2023

New Phishing Attacks Using ChatGPT

Phishing has been one of the greatest threats to organizations, growing year after year. Phishing attacks have contributed to 90%…

Cisco Launches Advanced Threat Detection XDR Platform
26
Apr
2023

Cisco Launches Advanced Threat Detection XDR Platform

In the recent hybrid, multi-vendor, multi-threat world, Cisco Extended Detection and Response (XDR) streamlines security operations with unrivaled visibility across…

Google Authenticator Major Update Brings Cloud Backup Feature
26
Apr
2023

Google Authenticator Major Update Brings Cloud Backup Feature

Google Authenticator was launched in 2010, which provides additional security for various applications by providing authentication codes for every sign-in….

PoC Exploit Code Released for Critical Papercut Flaw
25
Apr
2023

PoC Exploit Code Released for Critical Papercut Flaw

Threat actors are actively taking advantage of critical vulnerabilities present in the PaperCut MF/NG print management software.  This exploitation aims…

Microsoft Taxonomy
25
Apr
2023

Microsoft Changed the Taxonomy of Naming the Hacker groups

Microsoft has initiated the naming taxonomy for threat actor groups. Over the years, threat actors have evolved massively, leading to…