GBHackers

Hacktivist Groups Operating Together! Connection Ober T...

Cybersecurity experts have uncovered a significant connection between hacktivist...

Israeli Army Hacked Beirut Airport to Threaten Civilians

The Israeli army reportedly hacked into the control tower of Beirut’s Rafic Hari...

Hackers Abuse HTML Smuggling Technique To Deliver Sophi...

Phishing attackers employed an HTML smuggling technique to deliver a malicious p...

LummaC2 Stealer Leverages Customized Control Flow Indir...

The LummaC2 obfuscator employs a novel control flow protection scheme designed s...

Hackers Attacking AI Agents To Hijacking Customer Sessions

Conversational AI platforms, powered by chatbots, are witnessing a surge in mali...

Malicious App On Google Play Steals Cryptocurrency From...

Cybercriminals have shifted their focus to mobile devices, targeting users with ...

Hackers Abusing Third-Party Email Infrastructure to Sen...

Hackers are increasingly exploiting third-party email infrastructures to send sp...

G2 Names INE 2024 Enterprise and Small Business Leader

INE, a global leader in networking and cybersecurity training and certifications...

Hacking Kia Cars Remotely with a License Plate

Cybersecurity researchers have uncovered a significant vulnerability in Kia vehi...

RansomHub Ransomware Using Multiple Techniques To Disab...

The RansomHub ransomware group tracked as Water Bakunawa, employs targeted spear...

Octo2 Android Malware Attacking To Steal Banking Creden...

The original threat actor behind the Octo malware family has released a new vari...

New Mallox Ransomware Linux Variant Attacking Enterpris...

Kryptina RaaS, a free and open-source RaaS platform for Linux, initially struggl...

Beware Of Fake Verify You Are A Human Request That Deli...

Researchers observed two distinct instances where users were inadvertently led t...

Google Warns Of North Korean IT Workers Have Infiltrate...

North Korean IT workers, disguised as non-North Koreans, infiltrate various indu...

TWELVE Threat Attacks Windows To Encrypt Then Deleting ...

The threat actor, formed in 2023, specializes in ransomware attacks targeting Ru...

Researchers Backdoored Azure Automation Account Package...

Runtime environments offer a flexible way to customize Automation Account Runboo...