Category: GBHackers
Hackers exploit the Microsoft Build Engine because it can execute code and build applications. This engine provides an easy means…
Hackers exploit ransomware as it enables them to extort money from victims by encrypting their data and demanding a ransom…
AI SPERA, a leader in Cyber Threat Intelligence (CTI) solutions, announced today that its proprietary search engine, Criminal IP, is…
A phishing email with a malicious zip attachment initiates the attack. The zip contains a single executable disguised as an…
OmniVision Technologies, Inc. (OVT) recently disclosed a significant security breach that compromised its clients’ personal data. The company, known for…
The widely used team workspace corporate wiki Confluence has been discovered to have a critical remote code execution vulnerability. This…
In a recent investigation into Amazon Web Services (AWS) security breaches, Mandiant uncovered a troubling scenario client-specific secrets were leaked…
Western Sydney University has informed approximately 7,500 individuals today of an unauthorized access incident involving its IT network. The breach,…
Memcyco Inc., provider of digital trust technology designed to protect companies and their customers from digital impersonation fraud, released its…
North Korean hacking groups are suspected of hijacking the personal email accounts of high-ranking military officials. The Defense Ministry confirmed…
Microsoft has been prioritizing security in Windows, as they introduced Secured-Core PCs to protect from hardware to cloud attacks and…
A new critical vulnerability has been discovered in Fluent Bit’s built-in HTTP server, which has been termed “Linguistic Lumberjack” (CVE-2024-4323)….







