Category: GBHackers
Hackers often use weaponized documents to exploit vulnerabilities in software, which enables the execution of malicious code. All these documents…
Three Command injection vulnerabilities have been discovered in Zyxel NAS (Network Attached Storage) products, which could allow a threat actor…
The latest analysis shows that tens of millions of people are creating weak passwords on three of the four most…
Google has fixed the sixth Chrome zero-day bug that was exploited in the wild this year. The flaw, identified as CVE-2023-6345,…
An Android malware campaign was previously discovered that distributed banking trojans targeting four major Iranian Banks: Bank Mellat, Bank Saderat,…
Six novel Bluetooth attack methods have been discovered, which were named BLUFFS (Bluetooth Forward and Future Secrecy) attacks. These attacks…
Recent years saw a surge in cloud tech adoption, highlighting the efficiency through tools like Google’s Domain-Wide Delegation. It enables…
In a digital age marred by deceit, 25-year-old Amir Hossein Golshan stands as a testament to the dark underbelly of…
BOSTON, MASS. and TEL AVIV, ISRAEL, November 28, 2023 – A severe design flaw in Google Workspace’s domain-wide delegation feature…
For over two years, a hacker group linked to China had uninterrupted access to NXP, the Dutch chip manufacturer’s computer…
Hackers launched ransomware attacks to extort money from the following two entities by encrypting their data and demanding a ransom…
Broadcom Inc., a multinational semiconductor manufacturing company headquartered in San Jose, CA, has announced the successful acquisition of VMware in…











