GBHackers

Beware Of Weaponized Zip Files That Deliver WINELOADER ...

APT29, a Russian threat group, targeted German political parties with a new back...

Malicious PyPI Package Attacking Discord Users To Steal...

Hackers often target PyPI packages to exploit vulnerabilities and inject malicio...

Akira Ransomware Attacks Over 250 Organizations and Col...

The Akira ransomware variant has severely impacted more than 250 organizations w...

Alert! Windows LPE Zero-day Exploit Advertised on Hacke...

A new zero-day Local Privilege Escalation (LPE) exploit has been put up for sale...

Armis Acquires AI-based Vulnerability Detection Firm Si...

Armis, a leading cybersecurity company, has acquired Silk Security, an AI-powere...

What is Encryption in Malware? – Understand From Basics...

Malware commonly encrypts its traffic (stolen data sent to a command-and-control...

Phishing-as-a-Service Platform LabHost Seized by Author...

Authorities have dismantled LabHost, a notorious cybercrime platform that facili...

Cisco Hypershield: AI-Powered Hyper-Distributed Securit...

Cisco has unveiled its latest innovation, Cisco Hypershield, marking a milestone...

LeSlipFrancais Data Breach: Customers’ Personal Informa...

LeSlipFrancais, the renowned French underwear brand, has confirmed a data breach...

SoumniBot Exploiting Android Manifest Flaws to Evade De...

A new banker, SoumniBot, has recently been identified. It targets Korean users a...

Russian APT44 – The Most Notorious Cyber Sabotage Group...

As Russia’s invasion of Ukraine enters its third year, the formidable Sandworm (...

FIN7 Hackers Attacking IT Employees Of Automotive Industry

IT employees in the automotive industry are often targeted by hackers because th...

Palo Alto ZeroDay Exploited in The Wild Following PoC R...

Palo Alto Networks has disclosed a critical vulnerability within its PAN-OS oper...

Xiid SealedTunnel: Unfazed by Yet Another Critical Fire...

In the wake of the recent disclosure of a critical vulnerability (CVE-2024-3400)...

INC Ransom Group Exfiltrates Data Before Encrypting & T...

Hackers exfiltrate data first before encrypting it to increase their bargaining ...

Operation MidnightEclipse: Hackers Actively Exploiting ...

The Palo Alto Networks PAN-OS software has a critical command injection vulnerab...