GBHackers

Kali Linux 2024.3 Released With New Hacking Tools

Kali Linux 2024.3, the most recent iteration of Offensive Security’s highly rega...

Hacker Tricks ChatGPT to Get Details for Making Homemad...

A hacker known as Amadon has reportedly managed to bypass the safety protocols o...

Citrix Workspace App Vulnerable to Privilege Escalation...

Citrix released a security bulletin (CTX691485) detailing two critical vulnerabi...

Fortinet Confirms Data Breach Following Hacker’s Claim ...

Fortinet, a leading cybersecurity firm, has confirmed a data breach involving a ...

SquareX, Awarded Rising Star Category in CybersecAsia R...

SquareX has been named a winner of the prestigious Rising Star category in Cyber...

Mastercard to Acquire Threat Intel Firm Recorded Future...

In a strategic move to bolster its cybersecurity capabilities, Mastercard has an...

Critical Vulnerabilities in JPEG 2000 Library Let Attac...

Exploiting memory corruption vulnerabilities in server-side software often requi...

Hackers Exploiting Progress WhatsUp RCE Vulnerability I...

RCE attacks on WhatsUp Gold exploited the Active Monitor PowerShell Script to ex...

Aembit Raises $25 Million in Series A Funding for Non-H...

The investment will drive the company’s advancement of scalable workload access ...

New Loki Backdoor Attacking macOS Systems

Cody Thomas developed Apfell, an open-source macOS post-exploitation framework, ...

CosmicBeetle Exploiting Old Vulnerabilities To Attacks ...

CosmicBeetle, a threat actor specializing in ransomware, has recently replaced i...

Threat Actors Using New Malware Toolkit That Involves I...

The Iranian threat actor APT34, also known as GreenBug, has recently launched a ...

New Developer-As-A-Service In Hacking Forums Empowering...

SCATTERED SPIDER, a ransomware group, leverages cloud infrastructure and social ...

Hackers Mimic Google, Microsoft & Amazon Domains for Ph...

Phishing remains a significant concern for both individuals and organizations. R...

Criminal IP Teams Up with IPLocation.io to Deliver Unma...

Criminal IP, a distinguished leader in Cyber Threat Intelligence (CTI) search en...

Threat Actors Exploiting Legitimate Software For Stealt...

CAMO, or Commercial Applications, Malicious Operations, highlights attackers’ in...