GBHackers

Pure Storage Data Breach Following Snowflake Hack: LDAP...

Pure Storage has confirmed that a third party temporarily gained unauthorized ac...

Charon Android Botnet Made a Comeback With New Weapons

The notorious Charon Android Botnet has resurfaced with enhanced capabilities, a...

Firefox 127 Released With patch for 15 Vulnerabilities

Mozilla has released Firefox 127, addressing 15 security vulnerabilities, some o...

Hackers Exploiting Linux SSH Services to Deploy Malware

SSH and RDP provide remote access to server machines (Linux and Windows respecti...

Critical Flaw In Apple Ecosystems Let Attackers Gain Un...

Hackers go for Apple due to its massive user base along with rich customers, inc...

JetBrains Warns of GitHub Plugin that Exposes Access To...

A critical vulnerability (CVE-2024-37051) in the JetBrains GitHub plugin for Int...

Hackers Used Homemade Mobile Antenna To Send Thousands ...

Officers have made two arrests in connection with using a “text message blaster,...

Hackers Weaponizing MSC Files In Targeted Attack Campaign

Hackers utilize MSC or Microsoft Management Console files in themed attack campa...

Arm Warns Of Mali GPU Kernel Driver Flaws Exploited In ...

The Mali GPU driver is a widely used Graphical Processing Unit for multiple devi...

Chinese Hackers using New Noodle RAT to Attack Linux Se...

Cybersecurity experts have identified a new type of malware called “Noodle RAT,”...

SSLoad Malware Employs MSI Installer To Kick-Start Deli...

Malware distributors use MSI installers as Windows OS already trusts them to run...

Remcos RAT Distributed As UUEncoding (UUE) File To Stea...

Researchers identified a campaign distributing Remcos RAT, a Remote Access Troja...

Beware of Fake KMSPico Activators that Deliver Vidar St...

Researchers detected an attack involving a fake KMSPico activator tool, which de...

Duckduckgo Launches Anonymous AI Chatbots

DuckDuckGo has unveiled a new feature, AI Chat, which offers users an anonymous ...

ALPHV Ransomware Deployment Started With RDP Access And...

Ransomware is used by hackers to abuse victims’ data, locking it until a ransom ...

PoC Exploit Released For Veeam Authentication Bypass Vu...

A proof-of-concept (PoC) exploit has been released for a critical authentication...