Category: GBHackers
VexTrio, a cybercrime syndicate with a history dating back to at least 2017, has been implicated in nefarious activities utilizing…
Hackers use supply chain attacks to breach a target by gaining access to and taking advantage of weaknesses in the…
In the murky depths of the digital world lurks a cunning predator – Parrot TDS, a cyber campaign that has…
Hackers target cybersecurity professionals as successfully compromising their systems or gaining access to their credentials provides a gateway to valuable…
A PyPI malware author identified as “WS” was discovered by researchers to be covertly uploading malicious packages to PyPI that were impacting…
In a brazen act of digital deception, the U.S. Securities and Exchange Commission’s (SEC) official Twitter account, @SECGov, was compromised…
Threat actors have been using several methods for credential stealing, which varies based on the environment and infrastructure of the…
SSH or Secure Shell is a cryptographic network protocol that enables secure communication and remote access over an unsecured network. …
Memcyco will showcase its solutions at Deloitte’s annual Cyber iCON event, demonstrating how organizations can build effective defenses to protect…
Similar to ZuRu malware, a new malware has been found embedded in pirated macOS applications, which downloads and executes several…
DarkGate is a type of malware that employs Auto-It compiled loaders that cause a considerable threat because of its advanced evasion strategies and persistence…
A new Outlook vulnerability that can be used to extract NTLMv2 hashes by exploiting Outlook, Windows Performance Analyzer (WPA), and…











