Category: GBHackers
In a shocking revelation, a threat actor has allegedly leaked sensitive data belonging to Shell, one of the world’s leading…
Researchers analyzed a batch of suspicious ELF files with low antivirus detection rates, which used anti-debugging techniques, obfuscation, and encryption,…
Phishing campaigns are abusing Cloudflare workers in two ways, where one injects malicious content hidden by HTML smuggling, similar to…
If there is a single theme circulating among Chief Information Security Officers (CISOs) right now, it is the question of…
Malicious traffic floods targeted systems, servers, or networks in Distributed Denial of Service (DDoS) attacks are actively exploited by hackers. …
Hackers target and exploit GitHub repositories for a multitude of reasons and illicit purposes. The widespread use of GitHub and…
Hackers employ DNS for various purposes like redirecting traffic to enable man-in-the-middle attacks, infecting malware through harmful sites, and flooding…
A new vulnerability has been discovered in macOS Sonoma that is associated with privilege escalation. This vulnerability has been assigned…
GNOME desktop manager was equipped with a new feature which allowed remote users to create graphical sessions on the system…
Today marks a significant milestone for Malcat users with the release of version 0.9.6, introducing Kesakode, a remote hash lookup…
A critical vulnerability has been identified in Cisco Firepower Management Center (FMC) Software’s web-based management interface. This vulnerability could potentially…
Hackers have exploited an obscure WordPress plugin to inject malware into websites, specifically targeting WooCommerce online stores to steal credit…