Category: GBHackers
Recent reports indicate that threat actors have been manipulating Script kiddies or amateur hackers into performing malicious actions that they…
Microsoft Bug Bounty Program awarded $13.8M for their collaboration with over 345 security researchers from +45 countries around the world…
A Critical vulnerability was discovered in the widely used PaperCut MG/ NF print management software running on Windows prior to…
According to recent reports, there have been instances of threat actors using malware called “SkidMap” to exploit vulnerable Redis systems….
After being criticized as “grossly irresponsible” and “blatantly negligent” by the CEO of Tenable, Microsoft addressed a vulnerability in the…
IBM has discovered a vulnerability in the IBM SDK, Java Technology Edition, that allows threat actors to execute arbitrary code…
Tesla has a reputation for having highly integrated and technologically advanced car computers, which can be used for everything from…
Magniber Ransomware was first detected in late 2017; it targeted South Korean users through malvertising attacks using the Magnitude Exploit…
A versatile Java-based RAT that is capable of keylogging and credential theft from browsers and email clients emerged in 2020…
The Cybersecurity and Infrastructure Security Agency (CISA) has published a report which was co-authored by the NSA, FBI, and the…
BEC, an acronym for Business Email Compromise, is a sophisticated form of cybercrime. Cyber threats have become a pressing concern…
Cult of the Dead Cow (cDc) is one of the oldest and most highly influential hacking groups that was formed…