Category: GBHackers
A critical security vulnerability has been discovered in the wpDataTables – WordPress Data Table, Dynamic Tables & Table Charts Plugin,…
Threat actors have claimed responsibility for a data breach involving Heineken employees. The news broke through a post on the…
DDoS-as-a-Service botnets are used by hackers to facilitate the most easily and cheaply launch of devastating distributed denial-of-service (DDoS) attacks….
Attackers in South Korea are distributing malware disguised as cracked software, including RATs and crypto miners, and registering themselves with…
Ever since Russia’s invasion of Ukraine on February 24, 2022, there have been heavy tensions between the nations and worldwide….
ELLIO, a provider of real-time, highly accurate intelligence for filtering of unwanted network traffic and cybernoise, and ntop, a provider…
Hackers target IT industries as they hold valuable data, possess critical infrastructure, and often have access to sensitive information from…
In recent cyberattacks, hackers are actively exploiting stored cross-site scripting (XSS) vulnerabilities in various WordPress plugins. According to Fastly reports,…
VirusTotal, a leading online service for analyzing files and URLs for viruses, worms, trojans, and other malicious content, is celebrating…
eSentire’s Threat Response Unit (TRU) uncovered a sophisticated malware campaign involving fake browser updates. This campaign has been responsible for…
CryptoChameleon, a phishing tool detected in February 2024, was developed by someone anonymous and is used by threat actors to…
A new vulnerability related to authentication bypass was discovered in the Progress Telerik Report server. The CVE for this vulnerability…











