Category: GBHackers
Hackers have been found exploiting Google search ads to distribute malware through MSI (Microsoft Installer) packages. This campaign, involving the…
Veeam Service Provider console has been discovered with two critical vulnerabilities that were associated with Remote Code Execution. A CVE…
A new critical vulnerability has been discovered in PDF.js, which could allow a threat actor to execute arbitrary code when…
Juniper Threat Labs has reported active exploitation attempts targeting vulnerabilities in Ivanti Pulse Secure VPN appliances. These vulnerabilities, identified as…
Google has announced an update to its two-factor authentication (2FA) process, also known as 2-step Verification (2SV), aimed at simplifying…
Chinese state-sponsored hackers are highly sophisticated, leveraging advanced techniques and vast resources to conduct cyber espionage and steal sensitive data…
Hunters, the pioneer in modern SOC platforms, today announced its full adoption of the Open Cybersecurity Schema Framework (OCSF), coupled…
In collaboration with US and Australian authorities, the UK’s National Crime Agency (NCA) has unmasked and sanctioned the leader of…
Hackers target LNK (Windows shortcut) files to disseminate malware because they can embed malicious code that automatically executes when the…
A significant update for Trend Micro’s Antivirus One software has been released. The update addresses a critical vulnerability that may…
In a cybersecurity update, Samsung announced the patching of 25 vulnerabilities in its mobile devices, aiming to fortify them against…
A security vulnerability has been identified in Citrix NetScaler ADC and Gateway appliances, allowing remote attackers to access sensitive data…