GBHackers

Hackers Attacking Foxit PDF Reader Users To steal Sensi...

Researchers identified a PDF exploit targeting Foxit Reader users that uses a de...

Dell Hack: Attacker Steals Customer Phone Numbers & Ser...

In a concerning development for Dell Technologies, a threat actor known as Menel...

GPT-4o Released: Faster Model Available for Free to All...

OpenAI, the top lab for researching artificial intelligence, just released GPT-4...

Hackers Abuse GoTo Meeting Tool to Deploy Remcos RAT

In a sophisticated cyberattack campaign, hackers are using the online meeting pl...

Apple iTunes for Windows Flaw Let Attackers Execute Mal...

iTunes has been found to have an arbitrary code execution vulnerability that mig...

Hackers Abuse DNS Tunneling For Covert Communication & ...

As a sneaky scheme, hackers use DNS tunneling to bypass traditional security mea...

Threat Actor Selling INC Ransomware Code for $300,000

A notorious threat actor has decided to sell the INC Ransomware code for an unbe...

Zscaler Concludes Investigation: Only Test Servers Comp...

In a recent development, Zscaler Inc., a prominent cybersecurity firm, has concl...

New Botnet Sending Millions of Weaponized Emails with L...

The New Jersey Cybersecurity & Communications Integration Cell (NJCCIC) has dete...

MITRE Releases EMB3D Cybersecurity Threat Model for Emb...

In collaboration with Red Balloon Security, Narf Industries, and Niyo Little Thu...

Ohio Lottery Hacked: 500,000+ Customers Data Exposed

A major cybersecurity breach happened at the Ohio Lottery, letting people into i...

Apache OFBiz RCE Flaw Let Attackers Execute Malicious C...

Many businesses use enterprise resource planning (ERP) systems like Apache OFBiz...

Passwordless Authentication Standard FIDO2 Flaw Let Att...

FIDO2 (Fast Identity Online) is a passwordless authentication method developed b...

Microsoft Edge Zero-Day Vulnerability Exploited in the ...

A zero-day vulnerability in Microsoft Edge, which has been tagged as CVE-2024-46...

Nmap 7.95 released – What’s New!

Nmap’s version 7.95 emerges as a testament to the relentless efforts of its deve...

Critical Cacti Vulnerability Let Attackers Execute Remo...

Cacti, the widely utilized network monitoring tool, has recently issued a critic...