Category: GBHackers
Discord has become a household name in online gaming and digital communication. Gamers, friends, and families flock to this platform…
AgentTesla, a notorious information stealer, is observed spreading via CHM and PDF Files, which covertly harvest critical information from the…
In an ever-changing digital landscape, robust security measures are paramount. As Windows adapts to meet the evolving demands of our world,…
Cybercriminals behind the AvosLocker ransomware attack employed a tactic of infecting organizations through Open-Source Remote Administration Tools. This method allowed…
GitOps is a methodology that uses Git (or other version control systems) to store all aspects of a project’s infrastructure,…
A new phishing attack has been discovered, which uses malicious archive files to exploit the recently found WinRAR vulnerability CVE-2023-38831…
The ever-evolving world of cybercrime has given birth to a disturbing phenomenon – Phishing-as-a-Service (PhaaS), and one name that sends…
ToddyCat, a highly skilled advanced persistent threat (APT) actor notorious for launching targeted attacks in Europe and Asia, has recently…
The US cybersecurity organization CISA has updated its Known Exploited Vulnerabilities catalog to include five new security flaws that are…
Threat actors target telecoms and government ministries because they house valuable data and infrastructure. Telecoms hold sensitive communication records and…
Three new vulnerabilities have been discovered in Junos OS: password disclosure, MAC address validation bypass, and Time-of-check Time-of-use (TOCTOU) Race…
The latest stable version of Google Chrome (version 118.0.5993.70) has been released for Mac and Linux. In contrast, the Windows…











