Category: GBHackers
This article will help you to understand the modern cyber threats and the most commonly used attack surfaces behind any malware/cyber-attacks….
A shocking discovery has been made by researchers, unveiling an innovative method for extracting covert encryption keys from smart cards…
Bolster’s threat research team recently discovered an extensive brand impersonation effort targeting over 100 well-known clothes, footwear, and apparel firms….
The Chinese cyberespionage gang, identified as UNC3886, has been spotted employing a VMware ESXi zero-day vulnerability to get escalated privileges…
Based on the recent reports by IOActive, Drones, also called Unmanned Aerial Vehicles (UAVs), are vulnerable to code injection, which…
LockBit was one of the most widely used ransomware in 2022, targeting both small and large organizations irrespective of their…
It has been discovered that threat actors might take over expired Amazon S3 buckets to serve rogue binaries without changing…
Recently, the cybersecurity researchers at VulnCheck identified a growing trend of hackers masquerading as cybersecurity researchers on social platforms like…
A global cyberattack targeting numerous US federal government institutions has been launched as a result of the recent revelation of vulnerabilities…
Shell corporation has published a report indicating that they have faced a security incident that involved Accelion’s File Transfer appliance…
The information of hundreds of thousands of Indians who received the COVID vaccination was exposed in a significant data breach…
An alarming cyberattack has hit the University of Manchester, and the University confirmed this incident officially on June 9, 2023….