GB Hacker
-
Flaws in Popular Antivirus Softwares Let Attackers to Escalate Privileges
Security researchers from CyberARK discovered security bugs with anti-malware software that allows attackers to escalate privileges on an...
-
A New Mirai based IoT RAT Spreading Through 2 0-day Vulnerabilities
Netlab observed a new IoT botnet exploits two Tenda router 0-day vulnerabilities to install a Remote Access Trojan (RAT). The botnet dubbed...
-
Complete CompTIA Certification Training Bundle 2020 – CompTIA Security +, Pentest+, CySA+ With Lifetime Access
CompTIA is a global provider of vendor-neutral IT certifications, Most, if not all, CompTIA Certification Training are Teach you the best IT...
-
New Ransomware that Threatens Companies to Pay Ransom Within 3 days Else they Leak Data
The threat actor group behind new ransomware dubbed “Egregor” targets companies to steal sensitive data and then encrypt all the files....
-
SilentFade – A Malware Family that Used Facebook ad Platform to Attack Users
Every malware needs a medium to spread the infection, SilentFade malware abuses the Facebook ads platform to attack users for ad fraud, sales of...
-
GitHub Launches Code Scanning Tool to Find Security Vulnerabilities – Available for All Users
GitHub launches a new code scanning tool that helps developers to detect vulnerability before the application reaches production. The tool was...
-
APT‑C‑23 Hacker Group Attacks Android Users That Records Calls & Take Pictures Silently
Security researchers discovered new spyware used by the APT-C-23 threat group to target Android users through fake Android app store. The...
-
Joker Malware Targets Android Users to steal SMS Messages and Contact Lists – 17 Apps Removed from Google Play
Joker is one of the most prominent malware families that continuously target the Android devices, it’s main activity is to stimulate clicks on...
-
Certified Malware Analyst – Exploit Development, Expert Malware Analysis & Reverse Engineering
Certified Malware Analyst: In 2020, sophisticated Cyber attacks keep on increasing by APT threats that target most of the enterprise-level...
-
Beware of the New Critical Zerologon Vulnerability in The Windows Server
Microsoft Patchs the new critical vulnerability in Zerologon, A feature of Netlogon allows the domain controller to authenticate computers and...
-
How to Become a Certified Cyber Threat Intelligent Analyst?
Nowadays, Cyber crimes are increasing. The demand for cyber thteat intelligence experts is high. The field of cyber Intelligence is growing and...
-
Top 8 Best Web Security and Hacking Software for Security Professionals in 2020
Hacking software is not only used by hackers for criminal activities but it’s equally used by white hat hackers and security professionals to...