GB Hacker
-
Apple High Severity Bug Allows Attackers to Execute Arbitrary Code on iPhone, iPad, iPod
Apple release updates for iOS and iPadOS operating systems that fixes several security iPhone, iPad, and iPod devices. With the security update,...
-
Hackers Would Bypass Multi-Factor Authentication to Gain Full Access to Microsoft 365 Services
Security researchers from Proofpoint discovered critical security vulnerabilities with multi-factor authentication (MFA) implementations in the...
-
Wireshark 3.3.0 Released With New Features, Protocols & Capture File Support
Wireshark 3.3.0 was released with a fix for vulnerabilities that results in the BACapp dissector crash and fix for other bugs. Wireshark is...
-
CISA warns that Chinese Hackers Using Open-source Exploitation Tools to Target U.S. Agencies
CISA warns that Chinese nation-state actors using publicly available information sources and common, well-known tactics, techniques, and...
-
Thousands of Magento Stores Hacked in Largest-ever Skimming Campaign
Hackers compromised nearly two thousand Magento stores in the largest ever web skimming campaign that targets Magento stores. The previous...
-
ATM Penetration Testing – Advanced Testing Methods to Find The Vulnerabilities
ATM Penetration testing, Hackers have found different approaches to hack into the ATM machines. Programmers are not restricting themselves to...
-
World’s Largest Data Center provider Hit by Netwalker Ransomware
Recently, the world’s largest data center provider Equinix hit by Netwalker Ransomware, and currently, Equinix is investigating the whole...
-
Hackers Breached ETERBASE Cryptocurrency Exchange and Stole $ 5.4 Million
Recently, the representatives of the ETERBASE has reported on the official Telegram channel of the portal that they have become a victim of...
-
Zoom Adds Two-factor Authentication Available for all Users
Zoom announced Two-Factor Authentication (2FA) for all users that let admins and organizations prevent security breaches & data thefts. The...
-
Cynet Unveils Complete Cybersecurity with Integrated XDR, MDR and Response Automation
As cybersecurity leaders struggle with a mix of point solutions to defend against a wide range of vulnerabilities and endpoint attacks, they...