Category: GBHackers

Finland’s Most-Wanted Hacker Arrested
09
Feb
2023

Finland’s Most-Wanted Hacker Arrested

A 25-year-old Finnish man named Julius “Zeekill” Kivimäki was taken into custody this week in France. He is facing charges…

How Application Mapping Can Boost Application Security - GBHackers - Latest Cyber Security News
09
Feb
2023

How Application Mapping Can Boost Application Security – GBHackers – Latest Cyber Security News

Application security refers to the measures taken to protect the confidentiality, integrity, and availability of an application and its associated…

Tor and I2P Networks Suffered DDoS Attacks
09
Feb
2023

Tor and I2P Networks Suffered DDoS Attacks

Lately, a number of individuals have been encountering difficulties with the Tor network in terms of connectivity and performance. It’s…

Researcher Hacked Toyota's Global Supplier Portal
08
Feb
2023

Researcher Hacked Toyota’s Global Supplier Portal

The Global Supplier Preparation Information Management System, or GSPIMS, of Toyota, was breached by a security researcher using a backdoor….

Major CrackDown - Police Hacked Exclu 'secure'
08
Feb
2023

Major CrackDown – Police Hacked Exclu ‘secure’

The police and the Public Prosecution Service in the Netherlands have been able to gain access to data from a…

Exploit Released for GoAnywhere File Transfer Zero-Day Flaw
07
Feb
2023

Exploit Released for GoAnywhere File Transfer Zero-Day Flaw

A zero-day vulnerability affecting on-premise instances of Fortra’s GoAnywhere MFT-managed file transfer solution was actively exploited, according to a warning…

5 Best Technologies to Secure Kubernetes
07
Feb
2023

5 Best Technologies to Secure Kubernetes

Kubernetes security refers to the measures and practices used to protect a Kubernetes cluster and its resources, such as pods,…

Hackers Exploit VMware ESXi Servers to Deploy Ransomware
07
Feb
2023

Hackers Exploit VMware ESXi Servers to Deploy Ransomware

CERT-FR, the French Computer Emergency Response Team (CERT-FR), as well as administrators and hosting providers, have issued a warning concerning…

High-severity Flaw in F5 BIG-IP
06
Feb
2023

High-severity Flaw in F5 BIG-IP

F5 reports a high-severity format string vulnerability in BIG-IP that might allow an authenticated attacker to cause a denial-of-service (DoS)…

Cloud Computing Penetration Testing Checklist
05
Feb
2023

Cloud Computing Penetration Testing Checklist

Cloud Computing Penetration Testing is a method of actively checking and examining the Cloud system by simulating the attack from…

50 Free Cyber Threat Intelligence Tools 2023
05
Feb
2023

50 Free Cyber Threat Intelligence Tools 2023

Alexa Top 1 Million sites Probable Whitelist of the top 1 Million sites from Amazon(Alexa). Apility.io Apility.io is a Minimal…

Malicious Apps On Apple & Google
04
Feb
2023

Malicious Apps On Apple & Google

Threat actors have managed to get their hands on two shady applications that were uploaded to the app stores managed…