GBHackers

Critical Flaw In Confluence Server Let Attackers Execut...

The widely used team workspace corporate wiki Confluence has been discovered to ...

OmniVision Technologies Cyber Attack, Hackers Stolen Pe...

OmniVision Technologies, Inc. (OVT) recently disclosed a significant security br...

Cloud-Based Malware Attack Abusing Google Drive & Dropbox

A phishing email with a malicious zip attachment initiates the attack. The zip c...

Hackers Claiming Access to Qatar National Bank Database

A group of hackers has claimed to have accessed the database of Qatar National B...

Stealerium Malware Targeting Wi-Fi Networks, Outlook to...

A new strain of malware known as Stealerium has been identified. It targets Wi-F...

Criminal IP: Enhancing Security Solutions through AWS M...

AI SPERA, a leader in Cyber Threat Intelligence (CTI) solutions, announced today...

Turla Hackers Leveraging Microsoft Build Engine To Deli...

Hackers exploit the Microsoft Build Engine because it can execute code and build...

Ikaruz Red Team Leveraging LockBit Builder To Launch Ra...

Hackers exploit ransomware as it enables them to extort money from victims by en...

PoC Exploit Released for QNAP QTS zero-day RCE Flaw

Researchers have shown a proof-of-concept (PoC) attack for a zero-day remote cod...

Critical Memory Corruption In Cloud Logging Infrastruct...

Fluent Bit, a widely used open-source data collector and processor, has been fou...

Grandoreiro Malware Hijacks Outlook Client to Send Phis...

X-Force identified a phishing campaign targeting Latin American users since Marc...

Multiple Vulnerabilities in Honeywell VirtualUOC Let At...

Team82 has uncovered multiple critical vulnerabilities in Honeywell’s ControlEdg...

North Korean Hackers Hijacked Military Officials Person...

North Korean hacking groups are suspected of hijacking the personal email accoun...

Microsoft Unveild New Windows 11 Features To Strengthen...

Microsoft has been prioritizing security in Windows, as they introduced Secured-...

Critical Memory Corruption In Cloud Logging Infrastruct...

A new critical vulnerability has been discovered in Fluent Bit’s built-in HTTP s...

DoppelGänger Attack: Malware Routed Via News Websites A...

A Russian influence campaign, DoppelGänger, leverages fake news websites (typosq...