Category: GBHackers
Impersonating someone is an activity as old as mankind and has been performed to a great comedic effect by comedians…
The macOS operating system was fixed recently by Apple to eliminate a vulnerability found and reported by the principal security…
On Friday, Google released a beta version of Client-side encryption (CSE) for Gmail. This newest service is only useful to…
A new Android trojan called BrasDex has been identified as the work of the same threat actors responsible for the…
It has recently been discovered by researchers that Windows has a vulnerability that allows code execution that rivals EternalBlue in…
There is a new exploit chain dubbed, OWASSRF that threat actors are actively exploiting to gain arbitrary code execution through…
Researchers from Akamai have continued to study the cryptomining botnet KmsdBot and have looked at its attack flow. It is…
Recently, cybersecurity analysts at Prodraft’s threat intelligence team detected that the hacker group FIN7 was actively exploiting vulnerabilities in Microsoft…