Category: GBHackers
Scammers no longer need to possess technical expertise or devise intricate fraud schemes. The rise of Fraud-as-a-Service (FaaS) has revolutionized…
A group of threat actors has claimed responsibility for breaching the database of fast-food giant KFC. The announcement was made…
In collaboration with international partners, the U.S. Federal Bureau of Investigation (FBI) and the Cyber National Mission Force (CNMF) have…
Hackers remotely execute malicious code on a compromised device or server by exploiting the Universal Code Execution vulnerability. Through this…
AI SPERA, a leading Cyber Threat Intelligence (CTI) company, has announced a partnership with UAE-based distributor Devcons to expand into…
A critical vulnerability has been discovered in the Ghostscript rendering platform, identified as CVE-2024-29510. This flaw, a format string vulnerability,…
Hackers often weaponize LNK files because they can carry malware into systems undetected by anyone. LNK files are shortcuts that,…
A critical security vulnerability has been discovered in HCL Domino, a popular enterprise server software, that could potentially expose sensitive…
Apple has removed several prominent VPN service apps from the Russian division of the App Store. The affected apps include…
The Egyptian Health Department (EHD) has reported a data breach affecting 121,995 individuals, including one resident of Maine. The breach,…
A new position paper argues that Privacy Enhancing Technologies (PET) used in Home Routing are making it difficult for law…
A newly identified multi-stage trojan, dubbed “Orcinius,” has been reported to exploit popular cloud services Dropbox and Google Docs as…











