GB Hacker
-
Docker Desktop Vulnerabilities Let Attackers Execute Remote Code
Docker has addressed critical vulnerabilities in Docker Desktop that could allow attackers to execute remote code. These vulnerabilities,...
-
Hackers Mimic Google, Microsoft & Amazon Domains for Phishing Attacks
Phishing remains a significant concern for both individuals and organizations. Recent findings from ThreatLabz have highlighted the alarming...
-
Adobe Security Update, Multiple Vulnerabilities Patched
Adobe has issued a crucial security update for its Acrobat and Reader software on Windows and macOS platforms. This update, identified as...
-
Threat Actors Allegedly Claiming Leak of Capgemini Data
Threat actors have allegedly leaked sensitive data from Capgemini, a global leader in consulting, technology services, and digital transformation....
-
Google Patches Actively Exploited Android 0-day Privilege Escalation Vulnerability
Google has released a patch addressing a critical zero-day vulnerability that has been actively exploited. This vulnerability, CVE-2024-32896, is...
-
Iranian Threat Group Attack US Organization via Ransomware
Iranian cyber actors have been identified as the perpetrators behind ransomware attacks targeting U.S. organizations across multiple sectors....
-
New Styx Stealer Attacking Users to Steal Login Passwords
A new cybersecurity threat, known as Styx Stealer, has emerged. It targets users by stealing sensitive data such as saved passwords, cookies, and...
-
Autodesk AutoCAD Vulnerability Let Attackers Execute Arbitrary Code
Autodesk has disclosed a critical vulnerability in its AutoCAD software, which could allow malicious actors to execute arbitrary code. This...
-
Researchers Found a New Technique to Defend Cache Side Channel Attacks
Researchers from the University of Rochester have unveiled a novel technique to defend against cache side-channel attacks, a prevalent threat in...
-
Iranian APT42 Group Launch A Massive Phishing Campaign To Attack U.S. Presidential Election
APT42 is an APT group that is believed to be backed by the Iranian government, and this group primarily focuses on cyber espionage. Besides...
-
Critical Vulnerabilities in IBM QRadar Allow Attackers to Execute Arbitrary Code Remotely
IBM recently disclosed critical vulnerabilities affecting its QRadar Suite Software and IBM Cloud Pak for Security. These vulnerabilities, if...
-
Zoom Fixes Critical Vulnerabilities Allowing Privilege Escalation
Zoom Video Communications has recently disclosed several critical vulnerabilities affecting its Workplace Apps, SDKs, and Rooms Clients....