Category: GBHackers
A critical vulnerability has been discovered in Fortinet’s FortiOS SSL-VPN and FortiProxy SSL-VPN. The flaw, identified as FG-IR-23-225, allows attackers…
Hackers exploit the Windows zero-day vulnerabilities, as they offer great advantages. This means that no patches or defenses exist for…
Adobe has addressed several critical code execution flaws across a broad spectrum of its products. This move underscores the company’s…
Google has issued an urgent security update for its Chrome browser after discovering a zero-day vulnerability that is currently being exploited by attackers. The vulnerability, tracked as CVE-2024-4761, affects the…
A court has sentenced the developer of the cryptocurrency mixing service Tornado Cash to over five years in prison. The…
Hackers target smart homes due to the increased interconnected devices with often insufficient security measures. Smart homes provide a wealth…
Tor Project has announced the release of Tor Browser 13.0.15. Available now on the Tor Browser download page and through…
Hackers exploit social engineering, which avoids technical security systems, by manipulating the psychology and behavior of a human being. Social…
In a concerning development for Dell Technologies, a threat actor known as Menelik has reportedly accessed and scraped sensitive customer…
In a sophisticated cyberattack campaign, hackers are using the online meeting platform GoToMeeting to distribute a Remote Access Trojan known…
iTunes has been found to have an arbitrary code execution vulnerability that might allow attackers to execute malicious code. To…
The New Jersey Cybersecurity & Communications Integration Cell (NJCCIC) has detected a formidable new cyber threat. Dubbed LockBit Black, this…











