Category: GBHackers
Researchers identified three malicious PyPI (Python Package Index) packages that deploy a CoinMiner executable on Linux devices, affecting latency in device…
The latest stable channel update for Google Chrome, version 120.0.6099.199 for Mac and Linux and 120.0.6099.199/200 for Windows, is now available…
A vulnerability in the encryption algorithm used by the Black Basta ransomware has led researchers to develop a free decryptor…
Four Chinese cybercriminals were taken into custody after using ChatGPT to create ransomware. The lawsuit is the first of its…
Active Directory infiltration methods exploit vulnerabilities or weaknesses in Microsoft’s Active Directory to gain unauthorized access. Active Directory is a…
Wireshark is a popular open-source network protocol analyzer that allows users to inspect and capture data on a network in…
A Critical Google Cookies exploit involves manipulating or stealing user cookies, which store authentication information, to gain unauthorized access to…
DLL hijacking is a technique where a malicious DLL (Dynamic Link Library) is placed in a directory that a vulnerable…
Google Kubernetes Engine (GEK) has been detected with two flaws that a threat actor can utilize to create significant damage…
Cyber attacks are evolving rapidly with advancements in technology, as threat actors exploit new vulnerabilities in:- The rise of the…
Hackers abuse the ChatGPT name for malicious domains to exploit the credibility associated with the ChatGPT model, deceiving users into…
While the world celebrated Christmas, the cybercrime underworld feasted on a different kind of treat: the release of Meduza 2.2,…











