GBHackers

Coyote Banking Trojan Attacking Windows Users To Steal ...

Hackers use Banking Trojans to steal sensitive financial information. These Troj...

Hackers Using ClickFix Social Engineering Tactics to De...

Cybersecurity researchers at McAfee Labs have uncovered a sophisticated new meth...

Advance Auto Parts Cyber Attack: Over 2 Million Users D...

RALEIGH, NC—Advance Stores Company, Incorporated, a prominent commercial entity ...

mSpy Data Breach: Millions of Customers’ Data Exposed

mSpy, a widely used phone spyware application, has suffered a significant data b...

Top 10 Active Directory Management Tools – 2024

Active Directory Management Tools are essential for IT administrators to manage ...

Japanese Space Agency Spotted zero-day via Microsoft 36...

The Japan Aerospace Exploration Agency (JAXA) has revealed details of a cybersec...

Hackers Created 700+ Fake Domains to Sell Olympic Games...

As the world eagerly anticipates the Olympic Games Paris 2024, a cybersecurity t...

X-Files Stealer Attacking Windows Users to Steal Passwords

Cybersecurity experts have identified a new malware strain, dubbed “XFiles Steal...

U.S. Disrupts AI-Powered Russian State-Sponsored Hacker...

In collaboration with international partners, the U.S. Federal Bureau of Investi...

Threat Actors Claiming Breach of KFC Database

A group of threat actors has claimed responsibility for breaching the database o...

Scammers Offering Fraud-as-a-service to Other Scammers ...

Scammers no longer need to possess technical expertise or devise intricate fraud...

Chinese APT40 Is Ready To Exploit New Vulnerabilities W...

Multiple international cybersecurity agencies jointly warn of a PRC state-sponso...

Passkeys Available for Passkeys high-risk Users in the ...

Google has announced the integration of passkeys into its Advanced Protection Pr...

New Eldorado Ransomware Attacking Windows And Linux Sys...

Ransomware-as-a-service (RaaS) has evolved into sophisticated enterprise-like mo...

Turla Hackers Weaponizing LNK-Files To Deploy Fileless ...

Hackers often weaponize LNK files because they can carry malware into systems un...

HCL Domino Vulnerability Let Attackers obtain Sensitive...

A critical security vulnerability has been discovered in HCL Domino, a popular e...