Category: GBHackers
In a concerning development within the Android ecosystem, a new malware variant known as “Gorilla” has been identified, primarily targeting…
In today’s digital era, businesses are increasingly adopting cloud computing to store data, run applications, and manage infrastructure. However, as…
In today’s digital landscape, maintaining secure and efficient IT systems is critical for organizations. Patch management tools play a vital…
The landscape of cyber threats targeting Canadian financial institutions saw significant shifts after LabHost, a prominent phishing-as-a-service (PhaaS) platform, was…
In a sophisticated cyber-espionage operation, a group known as UNC5221, suspected to have China-nexus, has exploited a critical vulnerability in…
A new malware strain known as SuperCard X has emerged, utilizing an innovative Near-Field Communication (NFC)-relay attack to execute unauthorized…
Modern cyberattacks increasingly exploit network protocols and web applications to bypass traditional security controls. To counter these threats, security teams…
Small and Medium-sized Businesses (SMBs) have become prime targets for cybercriminals, being three times more likely to be targeted by…
DNS tunneling represents one of the most sophisticated attack vectors targeting enterprise networks today, leveraging the trusted Domain Name System…
Obfuscated malware presents one of the most challenging threats in cybersecurity today. As static analysis tools have become standard components…
A security vulnerability, tracked as CVE-2024-53141, has recently come to light in the Linux kernel’s ipset component. This flaw enables out-of-bounds…
Threat intelligence experts at Perplexity uncovered an advanced variant of the SpyMax/SpyNote family of Android spyware, cleverly disguised as the…











