GBHackers

Hackers Claiming Shell Data Breach On Popular Hacking F...

In a shocking revelation, a threat actor has allegedly leaked sensitive data bel...

Okta Warns Credential Stuffing Attacks Targeting Custom...

Okta, a leading identity and access management company, has warned about credent...

Spring Cloud Data Flow Let Attackers Compromise The Server

A critical vulnerability has been discovered in Spring Cloud Data Flow, a micros...

CryptoChameleon Kit With Group of Tools Propagate Phish...

CryptoChameleon, a phishing tool detected in February 2024, was developed by som...

Kiteshield Packer is Being Abused by Linux Cyber Threat...

Researchers analyzed a batch of suspicious ELF files with low antivirus detectio...

Phishing with Cloudflare Workers: Transparent Phishing ...

Phishing campaigns are abusing Cloudflare workers in two ways, where one injects...

INE Security Enables CISOs to Secure Board Support for ...

If there is a single theme circulating among Chief Information Security Officers...

CatDDoS Exploiting 80+ Vulnerabilities, Attacking 300+ ...

Malicious traffic floods targeted systems, servers, or networks in Distributed D...

PoC Exploit Released For macOS Privilege Escalation Vul...

A new vulnerability has been discovered in macOS Sonoma that is associated with ...

DDNS Service In Fortinet Or QNAP Embedded Devices Expos...

Hackers employ DNS for various purposes like redirecting traffic to enable man-i...

Researchers Exploited Nexus Repository Using Directory ...

Hackers target and exploit GitHub repositories for a multitude of reasons and il...

Kesakode: A Remote Hash Lookup Service To Identify Malw...

Today marks a significant milestone for Malcat users with the release of version...

GNOME Remote Desktop Vulnerability Let Attackers Read L...

GNOME desktop manager was equipped with a new feature which allowed remote users...

Hackers Created Rogue VMs in Recent MITRE’s Cyber Attack

State-sponsored hackers recently exploited vulnerabilities in MITRE’s Networked ...

Google Patches Chrome Zero-Day: Type Confusion in V8 Ja...

Google has released a patch for a zero-day exploit in its Chrome browser. The vu...

Hackers Exploit WordPress Plugin to Steal Credit Card Data

Hackers have exploited an obscure WordPress plugin to inject malware into websit...