Category: GBHackers

Hackers Use Text-to-SQL Attacks to Break into Your Databases
10
Jan
2023

Hackers Use Text-to-SQL Attacks to Break into Your Databases

Recently, a group of researchers successfully demonstrated a new type of attack that utilizes Text-to-SQL models in order to generate…

Hackers to Deliver Ransomware to macOS Devices
10
Jan
2023

Hackers to Deliver Ransomware to macOS Devices

One of the most dominating threats in the current cyberspace era is ransomware which is constantly affecting organizations of all…

Dridex Malware Targeting macOS Platform
09
Jan
2023

Dridex Malware Targeting macOS Platform

By using email attachments that resemble regular documents, a variant of Dridex (aka Bugat and Cridex), which is a banking…

10 Best Vulnerability Scanner Tools
08
Jan
2023

10 Best Vulnerability Scanner Tools

A Vulnerability Scanner Tools is one of the essential tools in IT departments Since vulnerabilities pop up every day and…

Blind Eagle Hacker Group Launching Indiscriminate Attacks
08
Jan
2023

Blind Eagle Hacker Group Launching Indiscriminate Attacks

There have been reports that an organized threat actor, known as Blind Eagle (tracked as APT-C-36), has re-appeared again with…

Spynote Android Malware Targeting Financial Institutions
06
Jan
2023

Spynote Android Malware Targeting Financial Institutions

Since October 2022, a new version of Android malware known as SpyNote (aka SpyMax) has been targeting financial institutions as…

WhatsApp Proxy Support For Users to Bypass Internet Restrictions
06
Jan
2023

WhatsApp Proxy Support For Users to Bypass Internet Restrictions

WhatsApp Proxy support is now available to all WhatsApp users worldwide, giving them the ability to continue using the app…

CybeReady Named a Representative Provider in 2022 Gartner® Innovation Insight on Security Behavior - GBHackers - Latest Cyber Security News
05
Jan
2023

CybeReady Named a Representative Provider in 2022 Gartner® Innovation Insight on Security Behavior – GBHackers – Latest Cyber Security News

CybeReady, provider of the world’s fastest security awareness solution, is honored to be named as a Representative Provider in the…

Chinese Researchers Claim That RSA Algorithm Can Be Broken
05
Jan
2023

Chinese Researchers Claim That RSA Algorithm Can Be Broken

It was recently reported that Chinese researchers had made a breakthrough in the field of quantum computing. A quantum computer…

Volvo Cars Suffered A New Data Breach
05
Jan
2023

Volvo Cars Suffered A New Data Breach

According to a post on a well-known hacker forum, Volvo Cars has experienced a new data breach, with stolen information…

Can Open Source Security Prevent Zero-Day Attacks? - GBHackers - Latest Cyber Security News
04
Jan
2023

Can Open Source Security Prevent Zero-Day Attacks? – GBHackers – Latest Cyber Security News

A zero-day (or zero-day) vulnerability is a software security risk that is not known to the software vendor or user….

Over 60,000 Online Exchange Servers Unpatched
04
Jan
2023

Over 60,000 Online Exchange Servers Unpatched

One of the two security flaws targeted by ProxyNotShell exploits, CVE-2022-41082 RCE vulnerability, has not been patched on more than…