Category: GBHackers
Cloud Computing Penetration Testing is a method of actively checking and examining the Cloud system by simulating the attack from…
Alexa Top 1 Million sites Probable Whitelist of the top 1 Million sites from Amazon(Alexa). Apility.io Apility.io is a Minimal…
Threat actors have managed to get their hands on two shady applications that were uploaded to the app stores managed…
Passion Group, a Killnet, and Anonymous Russia affiliate, recently started providing DDoS-as-a-Service to pro-Russian hackers. During the attacks on January…
Computer Forensics tools are more often used by security industries to test the vulnerabilities in networks and applications by collecting…
The cybersecurity analysts at Check Point Research recently reported that TrickGate, a shellcode-based packer, has been in operation for over…
Cyble Research and Intelligence Labs (CRIL) is a security research organization that has been monitoring the actions of a group…
Prilex is indeed a single threat actor that transformed from malware targeted at ATMs into distinctive modular point-of-sale (PoS) malware. Prilex…
Multiple fraudulent Microsoft Partner Network accounts were discovered to have created harmful OAuth applications, causing breaches in organizations’ cloud environments…
GitHub announced that it suffered a security breach in which unauthorized individuals obtained access to specific development and release planning…
The lack of rate-limiting in Instagram was discovered by Gtm Mänôz, a security researcher from Kathmandu, Nepal. This flaw could…
Microsoft has been strongly encouraging its customers to keep updating their Exchange servers, in addition to taking steps to ensure…