Category: GBHackers
An unauthenticated critical API access vulnerability was found in the Ivanti Sentry interface, which could allow a threat actor to…
Researchers have identified a new Malware-as-a-Service (MaaS) operator called ‘EVLF DEV’ as being behind the creation of CypherRAT and CraxsRAT….
A blind XPath injection vulnerability was discovered in Apache Software Foundation Apache Ivy, which allows threat actors to exfiltrate data…
Multiple vulnerabilities have been discovered on Junos OS, which can be combined to execute a preAuth remote code execution vulnerability…
DotRunpeX is one of the new and stealthiest .NET injectors that employs the “Process Hollowing” method, through which this malware…
Android Smartphones lay a vital role in our daily life, as they help us to stay connected and, not only…
The recent Africa Cyber Surge II operation conducted by INTERPOL and AFRIPOL has revealed a stark reality – the surge…
Threat actors are actively modifying their TTPs to counter the advanced security mechanisms and tools to accomplish their illicit goals…
The Cuba ransomware seems to be gaining more pace with each passing year, and this ransomware has been operating and…
Cynomi, the leading AI-powered virtual Chief Information Security Officer (vCISO) platform vendor for Managed Service Providers (MSPs), Managed Security Service…
The Airplane mode in smartphones ensures safe device use on flights, as this feature prevents interference with critical flight systems…
Web servers are a prime target for threat actors due to their open and volatile nature. However, these servers must…