GB Hacker
-
Most Important Cyber Attack Techniques that often used by Hackers
The cyber attack occurs on a daily basis, and these can range from attacks on tech giants to individuals falling foul to the many scams which...
-
Virtual Private Network: What is it and Why is it So Important To Protect Your Privacy?
Computers and the Internet have become one of the main means of transmitting and processing information. Most of the information on the Internet...
-
Your Guide to Endpoint Security
With tens of millions of cyber attacks occurring every single day, cyber-security has quite simply never been so important. Today’s world is...
-
Sonicwall Hacked with Highly Sophisticated Hackers By Exploiting Zero-Day Vulnerabilities
Recently, the cybersecurity researchers reported that SonicWall, the popular internet security provider of firewall and VPN products, on late...
-
Tesla Sues Former Employee for Stealing Sensitive Data
Tesla, Inc., an American electric car manufacturing company based in Palo Alto, California has sued a former employee and software engineer...
-
Most Important Android Application Penetration Testing Checklist
Android is the biggest organized base of any mobile platform and developing fast—every day. Besides, Android is rising as the most extended...
-
Cybercriminals Target Employees of Companies Worldwide to Exploit Network Access and Privilege Escalation
The FBI has published a Private Industry Notification (PIN) observing Cybercriminals are focusing to target employees of companies worldwide who...
-
Microsoft Research Reveals SolarWinds Hackers Stealthily Evaded Detection
A month after the discovery of the Solorigate hack, investors continue to unearth new facts about the attack, which goes on to show the...
-
FreakOut Malware that Exploits Critical Vulnerabilities in Linux Devices
Check Point Research (CPR) encountered that ongoing attacks involve a new malware variant, called ‘FreakOut.’ The purpose behind these attacks...
-
How to Create an Effective Cybersecurity Solution Stack that can Secure Banking and Financial Operations in These Transformative Times
Banking and financial institutions sit on large amounts of personal identification information and financial portfolios of their customers. This...
-
New Malware Discovered in SolarWinds Attack that Used 7-Zip Code to Hide
An additional piece of malware used in the SolarWinds attacks has been uncovered by researchers at Symantec, a division of Broadcom. Raindrop...
-
Livecoin has Announced Shutdown of Services after Being Hacked
Livecoin Exchange announces closure following an alleged breach in December. The trading platform declares it will close and repay users any...