Category: GBHackers

Wireless Penetration Testing Checklist - A Detailed Cheat Sheet
18
Jan
2023

Wireless Penetration Testing Checklist – A Detailed Cheat Sheet

Wireless Penetration testing actively examines the process of Information security Measures which is Placed in WiFi Networks and also analyses…

Over 6000 Internet-Exposed Cacti Servers are Unpatched
17
Jan
2023

Over 6000 Internet-Exposed Cacti Servers are Unpatched

A significant number of servers that use the Cacti software, and are connected to the internet, have not been updated…

Hackers Compromised CircleCI Employee's Laptop
16
Jan
2023

Hackers Compromised CircleCI Employee’s Laptop

CircleCI, a DevOps platform, discovered that malware installed on a CircleCI engineer’s laptop was used by an unauthorized third party…

Norton Password Manager Breached
16
Jan
2023

Norton Password Manager Breached

Customers were notified by NortonLifeLock – Gen Digital that accounts for Norton Password Manager had been successfully breached. They made…

Most Important Network Penetration Testing Checklist - GBHackers - Latest Cyber Security News
15
Jan
2023

Most Important Network Penetration Testing Checklist – GBHackers – Latest Cyber Security News

Network Penetration Testing determines vulnerabilities in the network posture by discovering Open ports, Troubleshooting live systems, services and grabbing system…

FortiOS SSL-VPN Zero-day Flaw Exploited to Attack Government
14
Jan
2023

FortiOS SSL-VPN Zero-day Flaw Exploited to Attack Government

There have been a number of attacks against government organizations and government-related targets using FortiOS SSL-VPN zero-day vulnerabilities patched by…

SymStealer Vulnerability Let Attacker Steal Login Credentials
13
Jan
2023

SymStealer Vulnerability Let Attacker Steal Login Credentials

The SymStealer vulnerability CVE-2022-3656, newly disclosed by the Imperva Red Team, affects over 2.5 billion users of Google Chrome and…

Protecting Your Cloud Environments With Zero Trust
13
Jan
2023

Protecting Your Cloud Environments With Zero Trust

When moving to a cloud infrastructure, businesses should be looking toward a Zero Trust strategy. This security model protects the…

Microsoft Exchange Vulnerabilities Most Exploited by Hackers
12
Jan
2023

Microsoft Exchange Vulnerabilities Most Exploited by Hackers

During the month of November, researchers at the cybersecurity firm LookingGlass examined the most significant vulnerabilities in the financial services…

Hackers Selling Telegram Insider Server Access
12
Jan
2023

Hackers Selling Telegram Insider Server Access

SafetyDetectives’ cybersecurity researchers came across a dark web marketplace that claims to provide consumers with access to Telegram’s internal server…

Microsoft Patch Tuesday - 98 Flaws Patched
11
Jan
2023

Microsoft Patch Tuesday – 98 Flaws Patched

A total of 98 vulnerabilities were fixed on January Patch Tuesday 2023 by Microsoft, including a zero-day vulnerability that was…

Default Setup - A New Option to Set Up Code Scanning on GitHub
11
Jan
2023

Default Setup – A New Option to Set Up Code Scanning on GitHub

The GitHub code scanning feature has been enhanced with a new option called “default setup,” designed to assist developers in…