GB Hacker
-
Wireless Penetration Testing Checklist – A Detailed Cheat Sheet
Wireless Penetration testing actively examines the process of Information security Measures which is Placed in WiFi Networks and also analyses...
-
10 Best Vulnerability Scanning Tools For Penetration Testing – 2020
A Vulnerability Scanning Tools is one of the essential tools in IT departments Since vulnerabilities pop up every day and thus leaving a...
-
Critical Vulnerabilities Discovered in World’s Largest Android TVs Manufacturer
Television is a mass medium for entertainment, advertising, news, and sports. In advent with the technology, inbuilt integration offered with...
-
xHunt Hackers Uses New Backdoor to Attack Exchange Servers
xHunt hackers uses New Backdoor to attack Exchange Servers and the xHunt Campaign has also targeted Kuwait organizations to compromise systems....
-
Attackers Using Image Inversion Technique to Bypass Office 365 Filtering Mechanism
A creative Office 365 phishing campaign was discovered by WMC Global Analysis researchers that a legitimate login page of a Microsoft Account,...
-
Gitpaste-12 Malware via GitHub and Pastebin Attacks Linux Servers and IoT Devices
Gitpaste-12 is a new worm that uses GitHub and Pastebin for housing component code and has atleast 12 different attack modules available. This...
-
Over 20 Million BigBasket Customers Data Exposed in DarkWeb
BigBasket(Innovative Retail Concepts Private Limited) is India’s largest online food and grocery store. It is funded by Alibaba Group, Mirae...
-
Hackers Attacking WebLogic Servers via CVE-2020–14882 Flaw to install Cobalt Strike Malware
Attackers are found to be exploiting Oracle WebLogic Servers via CVE-2020–14882 to install Cobalt Strike which will allow persistent remote...
-
Top 10 Best Linux Distro Operating Systems For Ethical Hacking & Penetration Testing – 2020
There are different OS for Hacking and Penetration Testing with Linux distro is dedicatedly developed for Security Researchers or Ethical...
-
QBot Trojan Attacks Victims with Malicious Election Interference Attachments
QBot malware, also referred to as Qakbot and Pinkslipbot, is a banking Trojan active since 2008. Attackers are using the QBot malware with...
-
Cisco AnyConnect VPN zero-day Vulnerability, Exploit Code Available
Cisco, the California based tech giant, has identified and disclosed a vulnerability via advisory CVE-2020-3556, regarding the InterProcess...
-
Fake COVID-19 Test Results Drop King Engine Ransomware
According to Cofense Intelligence researchers, a new version of Hentai OniChan Ransomware dubbed “King Engine” is being delivered during a...