Category: GBHackers
The U.S. Department of Justice has announced a $10 million reward for information leading to the arrest of Amin Timovich…
Cyberespionage actors are increasingly using ransomware as a final attack stage for financial gain, disruption, or to cover their tracks,…
Geisinger Health System discovered a data breach involving the personal information of over one million patients. The breach was traced…
Infinidat, a leading provider of enterprise storage solutions, has introduced a new automated cyber resiliency and recovery solution that will…
A new variant of the Medusa malware family was discovered disguised as a “4K Sports” app, which exhibits changes in…
A Proof-of-Concept (PoC) exploit has been released for a critical SQL Injection vulnerability in Fortra FileCatalyst Workflow. This vulnerability could…
Threat actors use RATs because they provide attackers with persistent access to compromised systems, enabling long-term espionage and exploitation. North…
Malware storage, distribution, and command and control (C2) operations are increasingly being used to leverage cloud services for recent cybersecurity…
KakaoTalk is an Android application that is predominantly installed and used by over 100 million people. It is a widely…
Google has unveiled new features for Chrome Enterprise Core, formerly known as Chrome Browser Cloud Management. As organizations increasingly rely…
Multiple vulnerabilities have been identified in the TP-Link Omada system, a software-defined networking solution widely used by small to medium-sized…
Bharat Sanchar Nigam Limited (BSNL), India’s state-owned telecommunications provider, has suffered a major data breach orchestrated by a threat actor…











