GBHackers

Hackers Using Supershell Malware To Attack Linux SSH Se...

Researchers identified an attack campaign targeting poorly secured Linux SSH ser...

Threat Actors Forcing victims Into Entering Login Crede...

Recent intelligence indicates a new technique employed by stealers to trick vict...

SambaSpy Using Weaponized PDF Files to Attack Windows U...

SambaSpy Attacking Windows Users With Weaponized PDF FilesResearchers discovered...

Tor Claims Network is Safe Following Enforcement Infilt...

The anonymity of the Tor network has been scrutinized in a recent investigation ...

Threat Actor Allegedly Claims Breach of Federal Bank Cu...

A threat actor on a well-known dark web forum has allegedly claimed responsibili...

Entro Security Labs Releases Non-Human Identities Resea...

Analysis of millions of real-world NHI secrets by Entro Security Labs reveals wi...

Critical Vulnerabilities Impact Million of D-Link Route...

Millions of D-Link routers are at risk due to several critical vulnerabilities. ...

Windows MSHTML Zero-Day Vulnerability Exploited In The ...

Adobe released eight security updates in September 2024, addressing 28 vulnerabi...

Azure API Management Vulnerability Let Attackers Escala...

A vulnerability in Azure API Management (APIM) has been identified. It allows at...

Medusa Ransomware Exploiting Fortinet Flaw For Sophisti...

Medusa, a relatively new ransomware group, has gained notoriety for its dual-pro...

Spring Framework Vulnerability Let Attackers obtain Any...

A newly discovered vulnerability in the Spring Framework has been identified, po...

CISA Urges Agencies to Upgrade or Remove End-of-Life Iv...

The Cybersecurity and Infrastructure Security Agency (CISA) has called upon fede...

Crimson Palace Returns With New Hacking Tolls And Tactics

Cluster Bravo, despite its brief initial activity, subsequently targeted 11 orga...

Beware Of Weaponized Excel Document That Delivers Filel...

A recent advanced malware campaign leverages a phishing attack to deliver a seem...

Hackers Exploiting Apache OFBiz RCE Vulnerability in th...

A critical vulnerability in the Apache OFBiz framework has been actively exploit...

Docker Desktop Vulnerabilities Let Attackers Execute Re...

Docker has addressed critical vulnerabilities in Docker Desktop that could allow...