Category: GBHackers
Hackers utilize MSC or Microsoft Management Console files in themed attack campaigns as these files contain commands and scripts that…
The Mali GPU driver is a widely used Graphical Processing Unit for multiple devices, including Android and Linux. A new…
Officers have made two arrests in connection with using a “text message blaster,” believed to have been used to send…
AI SPERA, a leader in Cyber Threat Intelligence (CTI) solutions, announced that it has started selling its paid threat detection…
VPN apps for Android increase privacy and security over the internet since connection data is encrypted, consequently making it impossible…
A proof-of-concept (PoC) exploit has been released for a critical authentication bypass vulnerability in Veeam Backup Enterprise Manager. The vulnerability,…
Ransomware is used by hackers to abuse victims’ data, locking it until a ransom is paid. This method of cyber…
DuckDuckGo has unveiled a new feature, AI Chat, which offers users an anonymous way to access popular AI chatbots. This…
Researchers detected an attack involving a fake KMSPico activator tool, which delivered Vidar Stealer through several events. The attack leveraged…
Due to the growing popularity of Apple devices, cybercriminals are increasingly targeting iOS and macOS with malware. The App Store…
Sticky Werewolf, a cyber threat group, has shifted its targeting strategy from sending phishing emails with download links to malicious…
The North Korean state-sponsored group known as Kimsuky has launched a sophisticated cyber-espionage campaign targeting a prominent weapons manufacturer in…











