Category: GBHackers
A privilege escalation vulnerability has been identified in the Trellix Windows DLP endpoint for Windows, which may be exploited to…
According to recent reports, a threat actor known as Storm-0324 has been using email-based initial infection vectors to attack organizations….
Email communication is still widely used as an attack vector despite the ever-changing nature of cyber threats. The vast number…
Cisco has been discovered with an arbitrary code execution flaw on their Cisco IOS XR Software image verification checks, which…
SolarWinds Platform has published its release notes 2023.3.1, which provides multiple bug fixes and security updates. With this release, the…
A new and highly concerning cyber threat has emerged, as a botnet known as “MrTonyScam” has been orchestrating an extensive…
Burp Suite, the renowned Bug Bounty Hunting and Web Application Penetration Testing tool, has been improvised with many extensions over…
In recent years, Linux systems gained prominence among diverse threat actors, with more than 260,000 unique samples emerging in H1…
Cybersecurity researchers at Symantec’s Threat Hunter Team recently discovered that the Redfly threat actor group used ShadowPad Trojan to breach…
In a race against time to safeguard user security, major browser vendors, including Google and Mozilla, have scrambled to release…
Chrome’s Stable and Extended stable channels have been upgraded to 116.0.5845.187 for Mac and Linux and 116.0.5845.187/.188 for Windows as…
Threat actors were using Windows Arbitrary File Deletion to perform Denial-of-service attacks on systems affected by this vulnerability. However, recent…