Category: GBHackers
Cybercriminals are leveraging platforms like GitHub to spread the Lumma information stealer malware. This sophisticated threat is part of a…
Cybersecurity researchers from Mandiant and Google Cloud have uncovered a sophisticated scheme where hackers exploit digital advertising tools to conduct…
Hackers have been exploiting vulnerabilities in iOS and Google Chrome to target government websites, particularly in Mongolia. Google’s Threat Analysis…
Check Point® Software Technologies Ltd. (NASDAQ: CHKP), a leading cybersecurity solutions provider, has announced a definitive agreement to acquire Cyberint…
A critical vulnerability has been identified in App::cpanminus (cpanm), a widely used tool for downloading and installing Perl modules. This…
The Wireshark Foundation has announced the release of Wireshark 4.4.0, marking a significant update to the popular open-source network protocol…
Windows drivers can be abused to bypass security measures. Attackers can exploit vulnerabilities in legitimate drivers or use stolen or…
The eight Android and iOS apps fail to adequately protect user data, which transmits sensitive information, such as device details,…
A significant data breach occurred at ServiceBridge, a technology company specializing in field service management. An unsecured database housing a…
Texas Dow Employees Credit Union (TDECU) has disclosed that the personal information of over 500,000 members was exposed due to…
Versa Networks specializes in successful business. It offers Secure Access Service Edge (SASE), consolidating networking and security services in a…
Two suspects have been apprehended for mail theft after being tracked using an AirTag locator device. The incident unfolded on…