Category: GBHackers
Google has released a patch for a zero-day exploit in its Chrome browser. The vulnerability, identified as CVE-2024-5274, involves a…
State-sponsored hackers recently exploited vulnerabilities in MITRE’s Networked Experimentation, Research, and Virtualization Environment (NERVE). They used rogue virtual machines (VMs)…
Cybersecurity researchers have identified a series of malicious software packages targeting MacOS users. These packages, found on the Python Package…
Hackers target military and government networks for varied reasons, primarily related to spying, which involves interference in the functioning of…
Zero Trust Maturity measures the extent to which an organization has adopted and implemented the Zero Trust security model. It…
The scalability and flexibility of cloud platforms recently boosted the emerging trend of cryptomining attacks in the cloud. Unlike on-premises…
In multiple aggressive phishing attempts, the financially motivated organization UAC-0006 heavily targeted Ukraine, utilizing ZIP and RAR attachments to distribute…
Gift cards are attractive to hackers since they provide quick monetization for stolen data or compromised systems. Reselling gift cards…
A new practical and powerful Denial of service attack has been discovered that exploits DNS queries and responses. This new…
Phishing attacks have evolved into increasingly sophisticated schemes to trick users into revealing their personal information. One such method that has gained prominence involves phishing emails masquerading as PDF viewer login pages….
Law enforcement agencies have successfully dismantled several dark web marketplaces offering illicit goods. Dubbed “Operation SpecTor,” this coordinated crackdown marks…
A consumer-grade spyware app named pcTattletale has been discovered running on the check-in systems of at least three Wyndham hotels…