Category: GBHackers
March saw many notable phishing attacks, with criminals using new tactics and approaches to target unsuspecting victims. It is time…
Maintaining uninterrupted services is vital for any organization. The backbone of ensuring this continuous uptime lies in the Incident Management…
Today, Congressman Eric Swalwell, CA-14, announced that he has partnered with Wolfsbane.ai to help prevent his 2024 election campaign content…
A massive cyber fraud operation targeting Indians in Cambodia has emerged, with an estimated Rs 500 crore stolen in six…
PandaBuy, a popular online shopping platform, has been the victim of a significant data breach. This breach has resulted in…
Google has agreed to delete billions of data records that reflect the private browsing activities of users. This decision comes…
Ransomware, initially a Windows threat, now targets Linux systems, endangering IoT ecosystems. Linux ransomware employs diverse encryption methods, evading traditional…
The DoD DIB Cybersecurity Strategy is a three-year plan (FY24-27) to improve cybersecurity for defense contractors that aims to create…
A critical vulnerability has been identified in the xz-utils package, versions 5.6.0 to 5.6.1, which harbors a backdoor capable of…
Veracode, a leading provider in the cybersecurity space, has officially announced its acquisition of Longbow Security. This strategic move is…
A startling revelation has identified a dangerous security vulnerability in the xz compression utility, specifically within its liblzma library. This…
Active since 2023, the Mysterious Werewolf cluster has shifted targets to the military-industrial complex (MIC) by using phishing emails with…











