Category: GBHackers

FortiOS SSL-VPN Zero-day Flaw Exploited to Attack Government
14
Jan
2023

FortiOS SSL-VPN Zero-day Flaw Exploited to Attack Government

There have been a number of attacks against government organizations and government-related targets using FortiOS SSL-VPN zero-day vulnerabilities patched by…

SymStealer Vulnerability Let Attacker Steal Login Credentials
13
Jan
2023

SymStealer Vulnerability Let Attacker Steal Login Credentials

The SymStealer vulnerability CVE-2022-3656, newly disclosed by the Imperva Red Team, affects over 2.5 billion users of Google Chrome and…

Protecting Your Cloud Environments With Zero Trust
13
Jan
2023

Protecting Your Cloud Environments With Zero Trust

When moving to a cloud infrastructure, businesses should be looking toward a Zero Trust strategy. This security model protects the…

Microsoft Exchange Vulnerabilities Most Exploited by Hackers
12
Jan
2023

Microsoft Exchange Vulnerabilities Most Exploited by Hackers

During the month of November, researchers at the cybersecurity firm LookingGlass examined the most significant vulnerabilities in the financial services…

Hackers Selling Telegram Insider Server Access
12
Jan
2023

Hackers Selling Telegram Insider Server Access

SafetyDetectives’ cybersecurity researchers came across a dark web marketplace that claims to provide consumers with access to Telegram’s internal server…

Microsoft Patch Tuesday - 98 Flaws Patched
11
Jan
2023

Microsoft Patch Tuesday – 98 Flaws Patched

A total of 98 vulnerabilities were fixed on January Patch Tuesday 2023 by Microsoft, including a zero-day vulnerability that was…

Default Setup - A New Option to Set Up Code Scanning on GitHub
11
Jan
2023

Default Setup – A New Option to Set Up Code Scanning on GitHub

The GitHub code scanning feature has been enhanced with a new option called “default setup,” designed to assist developers in…

Hackers Use Text-to-SQL Attacks to Break into Your Databases
10
Jan
2023

Hackers Use Text-to-SQL Attacks to Break into Your Databases

Recently, a group of researchers successfully demonstrated a new type of attack that utilizes Text-to-SQL models in order to generate…

Hackers to Deliver Ransomware to macOS Devices
10
Jan
2023

Hackers to Deliver Ransomware to macOS Devices

One of the most dominating threats in the current cyberspace era is ransomware which is constantly affecting organizations of all…

Dridex Malware Targeting macOS Platform
09
Jan
2023

Dridex Malware Targeting macOS Platform

By using email attachments that resemble regular documents, a variant of Dridex (aka Bugat and Cridex), which is a banking…

10 Best Vulnerability Scanner Tools
08
Jan
2023

10 Best Vulnerability Scanner Tools

A Vulnerability Scanner Tools is one of the essential tools in IT departments Since vulnerabilities pop up every day and…

Blind Eagle Hacker Group Launching Indiscriminate Attacks
08
Jan
2023

Blind Eagle Hacker Group Launching Indiscriminate Attacks

There have been reports that an organized threat actor, known as Blind Eagle (tracked as APT-C-36), has re-appeared again with…