Category: GBHackers
INE, a global leader in networking and cybersecurity training and certifications, is proud to announce they have earned 14 awards…
Cybercriminals have shifted their focus to mobile devices, targeting users with a malicious crypto drainer app disguised as the legitimate…
Conversational AI platforms, powered by chatbots, are witnessing a surge in malicious attacks, which leverage NLP and ML are increasingly…
The LummaC2 obfuscator employs a novel control flow protection scheme designed specifically for its stealer component, which is part of…
Phishing attackers employed an HTML smuggling technique to deliver a malicious payload, as the attack chain started with a phishing…
Hackers are increasingly exploiting third-party email infrastructures to send spam emails. This tactic complicates the detection and prevention of spam…
Cybersecurity researchers have uncovered a significant vulnerability in Kia vehicles that allowed hackers to remotely control key functions using nothing…
The RomCom malware family, particularly its SnipBot variant, has evolved into a sophisticated threat capable of ransomware, extortion, and targeted…
Runtime environments offer a flexible way to customize Automation Account Runbooks with specific packages. While base system-generated environments can’t be…
The threat actor, formed in 2023, specializes in ransomware attacks targeting Russian government organizations. It encrypts and deletes victim data,…
North Korean IT workers, disguised as non-North Koreans, infiltrate various industries to generate revenue for their regime, evading sanctions and…
Researchers observed two distinct instances where users were inadvertently led to malicious websites after conducting Google searches for video streaming…











