GBHackers

Operation Spincaster Disrupts Approval Phishing Techniq...

Chainalysis has launched Operation Spincaster, an initiative to disrupt approval...

CrowdStrike Update Triggers Widespread Windows BSOD Cra...

A recent update from cybersecurity firm CrowdStrike has caused significant disru...

Hackers Claiming Dettol Data Breach: 453,646 users Impa...

A significant data breach has been reported by a threat actor known as ‘Hana,’ w...

New TE.0 HTTP Request Smuggling Flaw Impacts Google Clo...

HTTP Request Smuggling is a flaw in web security that is derived from variations...

Cybercriminals Exploit Attack on Donald Trump for Crypt...

Researchers at Bitdefender Labs remain ever-vigilant, informing users about the ...

Hackers Exploiting Legitimate RMM Tools With BugSleep M...

Since October 2023, MuddyWater, which is an Iranian threat group linked to MOIS,...

macOS Users Beware Of Weaponized Meeting App From North...

Meeting apps are often targeted and turned into weapons by hackers as they are l...

TAG-100 Actors Using Open-Source Tools To Attack Gov & ...

Hackers exploit open-source tools to execute attacks because they are readily av...

Octo Tempest Know for Attacking VMWare ESXi Servers Add...

Threat actors often attack VMware ESXi servers since they accommodate many virtu...

Resonance Security Launches Harmony to Monitor and Dete...

Quick take: Resonance, a full-spectrum cybersecurity firm building security solu...

Beware! of New Phishing Tactics Mimic as HR Attacking E...

Phishing attacks are becoming increasingly sophisticated, and the latest strateg...

Resonance Launches Harmony to Monitor and Detect Threat...

Quick take: Resonance, a full-spectrum cybersecurity firm building security solu...

Volcano Demon Group Attacking Organizations With LukaLo...

The Volcano Demon group has been discovered spreading a new ransomware called Lu...

New ShadowRoot Ransomware Attacking Business Via Weapon...

X-Labs identified basic ransomware targeting Turkish businesses, delivered via P...

Hacktivist Groups Preparing for DDoS Attacks Targeting ...

Cyble Research & Intelligence Labs (CRIL) researchers have identified a cyber th...

New Poco RAT Weaponizing 7zip Files Using Google Drive

The hackers weaponize 7zip files to pass through security measures and deliver m...