Category: GBHackers
Threat actors target a niche group of internet users, security researchers, penetration testers, and even cybercriminals. The weapon of choice…
A Proof of Concept (PoC) exploit has been released for a vulnerability in the OpenEdge Authentication Gateway and AdminServer. This…
The Matanbuchus malware has been reported to initiate a new campaign, exploiting XLS files to compromise Windows machines. This sophisticated…
VMware’s ESXi, Workstation, and Fusion products could allow attackers to execute malicious code on affected systems. Impacted VMware Products These…
Threat actors aim at Cloud environments because of their wide acceptance and one-stop storage of important information. Exploiting shortcomings in…
The Massachusetts Institute of Technology’s (MITRE) Aviation Risk Identification and Assessment (ARIA) software program is a powerful tool to enhance…
Henry Onyedikachi Echefu, a 32-year-old Nigerian national, has admitted to his role in a sophisticated business email compromise (BEC) scheme…
Evasive Panda dubbed BRONZE HIGHLAND and Daggerfly, a Chinese-speaking APT group operating since at least 2012, has been spotted conducting cyberespionage…
Threat actors target email addresses, as they provide a way to access personal and confidential information. Emails often hold valuable…
The frequency of malicious emails successfully circumventing Secure Email Gateways (SEGs) has doubled in the past year. This surge highlights the evolving sophistication of cyber threats and the challenges organizations face in…
Company Open Sources FHE Libraries to Build Privacy-Preserving Blockchain and AI Applications for the First Time. An investment has been…
A new menace has emerged targeting unsuspecting Facebook Messenger users. Dubbed the “Python Infostealer,” this malicious software is designed to…