Category: GBHackers

Notepad++ Wants Your Help to Take Down the Parasite Website
09
Apr
2024

Notepad++ Wants Your Help to Take Down the Parasite Website

In a recent announcement, the team behind the widely acclaimed source code editor, Notepad++, has issued a call to arms…

Top Israeli Spy Chief Identity Exposed In A Privacy Mistake
09
Apr
2024

Top Israeli Spy Chief Identity Exposed In A Privacy Mistake

Privacy mistakes could pose a serious threat to sensitive information or systems,, which threat actors could exploit for their gain….

Google Rolls Out “Find My Device” Network for Android Users
09
Apr
2024

Google Rolls Out “Find My Device” Network for Android Users

Google has announced the global rollout of its revamped Find My Device network. This innovative feature is set to transform…

How Penetration Tests Are Classified
09
Apr
2024

Hackers Launch DOS Attacks on Web Servers

Researchers identified a significant vulnerability within the HTTP/2 protocol, potentially allowing hackers to launch Denial of Service (DOS) attacks on…

Exploring How Penetration Tests Are Classified
09
Apr
2024

Exploring How Penetration Tests Are Classified

In the dynamic and ever-evolving landscape of cyber security defenses, enterprise-grade penetration testing is one of the most crucial practices…

AGENT TESLA Malware Steals login Credentials From Chrome & Firefox
08
Apr
2024

AGENT TESLA Malware Steals login Credentials From Chrome & Firefox

Researchers investigated a recent Agent Tesla malware campaign targeting US and Australian organizations, which used phishing emails with fake purchase…

Hackers Deliver Malware via YouTube Video Game Cracks
08
Apr
2024

Hackers Deliver Malware via YouTube Video Game Cracks

Threat actors target home users with information-stealing malware like Vidar, StealC, and Lumma Stealer, which disguises the malware as pirated…

Chinese Hackers Using AI Tools To Influence Upcoming Elections
08
Apr
2024

Chinese Hackers Using AI Tools To Influence Upcoming Elections

By exploiting the AI tools deepfake hackers could make videos or audios of political candidates to spread misinformation or disinformation,…

Cisco IOS Vulnerability Allows DOS Attacks via Malicious Traffic
08
Apr
2024

Cisco IOS Vulnerability Allows DOS Attacks via Malicious Traffic

Cisco recently fixed a high-severity vulnerability in Cisco IOS Software for Catalyst 6000 Series Switches, which could lead to a denial…

Veterinary Giant IT System Attacked by Hackers
08
Apr
2024

Veterinary Giant IT System Attacked by Hackers

CVS Group, a leading veterinary service provider, has confirmed that it fell victim to a cyber-attack involving unauthorized access to…

Vedalia APT Group Exploits Oversized LNK Files to Malware
08
Apr
2024

Vedalia APT Group Exploits Oversized LNK Files to Malware

The Vedalia Advanced Persistent Threat (APT) group, also known by its alias Konni, has been distributing malware using an innovative…

Multiple CData Flaws Let Attackers Bypass Security Restrictions
08
Apr
2024

Multiple CData Flaws Let Attackers Bypass Security Restrictions

A path traversal vulnerability was discovered in the Java versions of multiple CData products when using the embedded Jetty server,…