GB Hacker
-
Wireshark 4.2.0 Released: What’s New!
Wireshark, a leading network packet analyzer, has released version 4.2.0, which brings bug fixes, protocol updates, major API changes, codec...
-
ManageEngine Information Disclosure Flaw Exposes Encryption Keys
ManageEngine, one of the most widely used IT infrastructure management platforms that offers more than 60 Enterprise IT management tools, has been...
-
Reptar – A New CPU Vulnerability Affects Intel and AMD CPUs
A critical CPU vulnerability can pose a significant threat by allowing:- Unauthorized access to sensitive data Enabling malicious code...
-
TA402 Group using Weaponized XLL and RAR Files to Deliver Malware
Researchers have discovered a new phishing campaign that targets Middle Eastern and North African Government Entities to deliver a new initial...
-
Hackers Abuse Google Forms to Bypass Anti-spam Filters
Cybersecurity researchers at Talos have discovered that spammers are taking advantage of Google Forms quizzes to disseminate various types of...
-
What Does PCI DSS 4.0 Mean for API?
Payment Card Industry Data Security Standard or PCI DSS 4.0 was released in May 2022 by the PCI Security Standards Council (PCI SSC). After...
-
LogShield: A New Framework that Detects the APT Attack Patterns
There have been several cases of GPT model-based detection for various attacks from system logs. However, there has been no dedicated...
-
Hackers Exploiting Create2 to Bypass Wallet Security Alerts
Recently, hackers have used the Ethereum network’s CREATE2 opcode to bypass wallet security alarms in certain wallets. Using Create2’s...
-
Intel is Being Sued Over the ‘Downfall’ CPU Vulnerability for $10K per Plaintiff
A class-action lawsuit had been filed against Intel due to a critical “Downfall” vulnerability in Intel CPUs, a defect that Intel was aware of...
-
Authorities Took Down Massive Phishing-as-a-service Provider
A notorious phishing service that supplied cybercriminals with phishing kits, scam pages, and stolen credentials has been disrupted by a joint...
-
Imperial Kitten Attacking Tech Firms with SQLi & Scanning Tools
Researchers detected IMPERIAL KITTEN, an adversary with ties to Iran, conducting strategic web compromise (SWC) operations with a focus on...
-
10 Best Unified Endpoint Management Tools – 2024
Managing a diverse range of devices, including desktops, mobile devices, and Internet of Things (IoT) devices, is an essential aspect of modern...