Category: GBHackers
Since office documents are often used in business communications, hackers take advantage of this fact to disseminate malicious malware easily….
Two malicious npm packages were discovered on the npm open source package manager, which leverages GitHub to store stolen Base64-encrypted…
To maintain access to compromised networks, hackers use specialized hacking tools. Such tools help the threat actors evade the detection…
VexTrio, a cybercrime syndicate with a history dating back to at least 2017, has been implicated in nefarious activities utilizing…
Hackers use supply chain attacks to breach a target by gaining access to and taking advantage of weaknesses in the…
In the murky depths of the digital world lurks a cunning predator – Parrot TDS, a cyber campaign that has…
Hackers target cybersecurity professionals as successfully compromising their systems or gaining access to their credentials provides a gateway to valuable…
A PyPI malware author identified as “WS” was discovered by researchers to be covertly uploading malicious packages to PyPI that were impacting…
In a brazen act of digital deception, the U.S. Securities and Exchange Commission’s (SEC) official Twitter account, @SECGov, was compromised…
Threat actors have been using several methods for credential stealing, which varies based on the environment and infrastructure of the…
SSH or Secure Shell is a cryptographic network protocol that enables secure communication and remote access over an unsecured network. …
Memcyco will showcase its solutions at Deloitte’s annual Cyber iCON event, demonstrating how organizations can build effective defenses to protect…











