Category: GBHackers

Exploit Released for GoAnywhere File Transfer Zero-Day Flaw
07
Feb
2023

Exploit Released for GoAnywhere File Transfer Zero-Day Flaw

A zero-day vulnerability affecting on-premise instances of Fortra’s GoAnywhere MFT-managed file transfer solution was actively exploited, according to a warning…

5 Best Technologies to Secure Kubernetes
07
Feb
2023

5 Best Technologies to Secure Kubernetes

Kubernetes security refers to the measures and practices used to protect a Kubernetes cluster and its resources, such as pods,…

Hackers Exploit VMware ESXi Servers to Deploy Ransomware
07
Feb
2023

Hackers Exploit VMware ESXi Servers to Deploy Ransomware

CERT-FR, the French Computer Emergency Response Team (CERT-FR), as well as administrators and hosting providers, have issued a warning concerning…

High-severity Flaw in F5 BIG-IP
06
Feb
2023

High-severity Flaw in F5 BIG-IP

F5 reports a high-severity format string vulnerability in BIG-IP that might allow an authenticated attacker to cause a denial-of-service (DoS)…

Cloud Computing Penetration Testing Checklist
05
Feb
2023

Cloud Computing Penetration Testing Checklist

Cloud Computing Penetration Testing is a method of actively checking and examining the Cloud system by simulating the attack from…

50 Free Cyber Threat Intelligence Tools 2023
05
Feb
2023

50 Free Cyber Threat Intelligence Tools 2023

Alexa Top 1 Million sites Probable Whitelist of the top 1 Million sites from Amazon(Alexa). Apility.io Apility.io is a Minimal…

Malicious Apps On Apple & Google
04
Feb
2023

Malicious Apps On Apple & Google

Threat actors have managed to get their hands on two shady applications that were uploaded to the app stores managed…

New DDoS-as-a-Service Platform Attacking Medical Institutions
03
Feb
2023

New DDoS-as-a-Service Platform Attacking Medical Institutions

Passion Group, a Killnet, and Anonymous Russia affiliate, recently started providing DDoS-as-a-Service to pro-Russian hackers.  During the attacks on January…

Most Important Computer Forensics Tools for 2023
03
Feb
2023

Most Important Computer Forensics Tools for 2023

Computer Forensics tools are more often used by security industries to test the vulnerabilities in networks and applications by collecting…

Hackers Use TrickGate Packer to Deploy Emotet
03
Feb
2023

Hackers Use TrickGate Packer to Deploy Emotet

The cybersecurity analysts at Check Point Research recently reported that TrickGate, a shellcode-based packer, has been in operation for over…

Over 1800 Android Mobile App Web Injects for Sale
02
Feb
2023

Over 1800 Android Mobile App Web Injects for Sale

Cyble Research and Intelligence Labs (CRIL) is a security research organization that has been monitoring the actions of a group…

New Prilex Malware Blocks Contactless Payments
02
Feb
2023

New Prilex Malware Blocks Contactless Payments

Prilex is indeed a single threat actor that transformed from malware targeted at ATMs into distinctive modular point-of-sale (PoS) malware. Prilex…