GBHackers

Logicalis Enhances Global Security Services with The La...

Logicalis, the global technology service provider delivering next-generation dig...

Tycoon 2FA Attacking Microsoft 365 AND Google Users To ...

Tycoon 2FA, a recently emerged Phishing-as-a-Service (PhaaS) platform, targets M...

Scattered Spider Attacking Finance & Insurance Industri...

Hackers very frequently target the finance and insurance sectors due to the larg...

Criminal IP and Quad9 Collaborate to Exchange Domain an...

Criminal IP, a renowned Cyber Threat Intelligence (CTI) search engine developed ...

Hackers Moving To AI But Lacking Behind The Defenders I...

Hackers were actively exploiting the generative AI for cyber attacks; not only t...

HackCar – Attack AND Defense Playground For Automotive ...

Modern cars have microcontrollers that use the Controller Area Network (CAN) to ...

PoC Released for Critical PuTTY Private Key Recovery Vu...

Security researchers have published a Proof-of-Concept (PoC) exploit for a criti...

Warning! Google Chrome Zero-day Vulnerability Exploited...

Google released a critical security update for its Chrome web browser to address...

Stack Overflow Users Delete Posts in Protest Over OpenA...

Several Stack Overflow users have begun deleting their contributions from the pl...

Dell Hacked – Attackers Stolen 49 Million Customers Per...

Dell Technologies recently disclosed a data breach involving a company portal th...

North Korean Hackers Abusing Facebook & MS Management C...

The North Korean hacking group known as Kimsuky has been reported to employ soph...

HijackLoader Malware Attack Windows Via Weaponized PNG ...

In a recent cybersecurity breakthrough, researchers have unveiled significant up...

New LLMjacking Used Stolen Cloud Credentials to Attack ...

Researchers have identified a new form of cyberattack termed “LLMjacking,” which...

DDoS Attack Size Increased by 233.33%, UDP-Based are Po...

The latest Nexusguard DDoS Trend Report for 2024 has unveiled a significant esca...

Researchers Hacked Apple Infrastructure Using SQL Injec...

Researchers found several points of entry for potential attackers, one of which ...

Polish Government Under Sophisticated Cyber Attack From...

The Polish computer emergency response team CERT.pl has issued a warning about a...