Category: GBHackers
The threat actor “Midnight Blizzard” is engaging in increasing credential attack activity. They conceal the origin of their assaults by…
CalPERS (California Public Employees’ Retirement Systems) is an organization working to provide pension benefits for retirees and health security services…
An attack called RepoJacking may potentially affect millions of GitHub repositories. If abused, this vulnerability might result in code execution…
The latest version of Microsoft Teams had a security flaw uncovered recently by Max Corbridge (@CorbridgeMax) and Tom Ellson (@tde_sec),…
Malicious cyber actors might exploit a known flaw in Microsoft Windows’ secure startup process to bypass Secure Boot protection and run the…
In the most extreme action taken against the firm by the agency’s chair, Lina Khan, the Federal Trade Commission filed…
The latest research unveiled the JavaScript-based droppers, which deliver Bumblebee and IcedID malware instead of PowerShell-based droppers. These two malware…
XSS is a very commonly exploited vulnerability type that is very widely spread and easily detectable, and also it is…
Recently, the cybersecurity researchers at CYFIRMA found that hackers are actively using “Mystic Stealer Malware,” a new information stealer. It’s…
Recently, it’s been confirmed by Microsoft that the current outage problems experienced by the following services of Microsoft were due…
Since August 2022, a recently discovered Android virus named “GravityRAT” has rapidly circulated through a new Android malware campaign. It…
Cybersecurity is a constant concern for modern companies. While enterprises can use several world-class tools to protect their internal networks,…