GB Hacker
-
Zenbleed – AMD’s Zen2 Processor Flaw Allows Attackers to Steal Sensitive Data
The CPUs that are based on x86-64 architecture feature XMM registers (128-bit), recently extended to 256-bit (YMM) and 512-bit (ZMM) for greater...
-
Hackers Use SMS Alerts to Install SpyNote Malware
Reports indicate that a Smishing campaign was conducted against Japanese Android users under the name of a Japanese Power and Water Infrastructure...
-
‘SIM Swapper’ Pleads Guilty For Hacking Instagram User Accounts
A 24-year-old man named Amir Hossein Golshan from Downtown Los Angeles has pleaded guilty for hacking Instagram users’ accounts, using a technique...
-
12 Norway Government Ministries were Targeted in a Cyberattack
According to recent reports, twelve government ministries in Norway have been targeted by cyber-attacks. The most recent attack was aimed at...
-
Critical Zyxel Firewall Injection Flaw Exploited to Conduct DDoS Attacks
Increased botnet activity targeting vulnerability(CVE-2023-28771) in Zyxel devices has become a major concern to its users. This vulnerability...
-
Google is Blocking Employee Internet Access to Minimize Cyberattacks
Google is to start a pilot program to have employees work without internet access as a way to decrease the risk of cyberattacks. According to...
-
Hacked Microsoft Keys Let Attackers Access a Wide Range of Azure Applications
The China-linked threat actors who stole the US State Department and other Microsoft customer emails may have acquired access to apps other than...
-
North Korean Hacker Group Breached US IT Firm JumpCloud
The cloud-based IT management firm JumpCloud was compromised by North Korean Lazarus Group hackers who appear to be financially motivated to steal...
-
API Security Checklist: A Must Read Guide 2023
APIs are poisoned pills you can’t live without. In today’s world, they are the enemy you must coddle next to every night. That is why API security...
-
Hackers Deliver HotRat as Hidden Scripts in cracked software
The use of illegal software has been under circulation ever since there have been torrents and cracked software. Recent reports show that threat...
-
Microsoft Expands Security Logging and Offers 365 Clients Free Access
Microsoft expanded cloud logging accessibility and flexibility for customers’ deeper security visibility. This expansion coordinates results with...
-
Poisoned Facebook Ads Deliver Malware Using Fake ChatGPT, Bard & Other AI Services
Cyber criminals have recently started using Facebook to pretend to be well-known generative AI brands like ChatGPT, Google Bard, Midjourney, and...