Category: GBHackers
Researchers have uncovered a sophisticated Linux malware, dubbed “perfctl,” actively targeting millions of Linux servers worldwide. This malicious software exploits…
Decoding Compliance | What CISOs Need to Know Non-compliance can result in substantial financial penalties, with average fines reaching up…
At DEF CON 32, the SquareX research team delivered a hard-hitting presentation titled Sneaky Extensions: The MV3 Escape Artists where…
Doppler, the leading platform in secrets management, today announces the launch of Change Requests, a new feature providing engineering teams…
The Police Service of Northern Ireland (PSNI) has been ordered to pay a £750,000 fine following a significant data breach…
ANY.RUN announced an upgrade to its Threat Intelligence Portal, enhancing its capabilities to identify and analyze emerging cyber threats. This…
The Cybersecurity and Infrastructure Security Agency (CISA) has announced the addition of a new vulnerability to its Known Exploited Vulnerabilities…
A critical vulnerability has been discovered in Cisco’s Nexus Dashboard Fabric Controller (NDFC), potentially allowing hackers to execute arbitrary commands…
The Tor Project has announced the release of Tor Browser 13.5.6, which is now available for download from its official…
Aembit, the non-human IAM company, today announced the appointment of Mario Duarte as chief information security officer (CISO). Duarte, formerly…
A recently discovered vulnerability in Bluetooth technology has raised significant security concerns. This flaw could allow hackers to intercept passcodes…
The need for advanced tools that can effectively simulate real-world threats is paramount. Enter GhostStrike, a sophisticated cybersecurity tool explicitly…