GB Hacker
-
Dark Utilities – A C2aaS Platform Leveraged By Hackers To Implant Malware
Dark Utilities is a new service that has been discovered recently by security researchers at Cisco Talos. In order to set up a C2 center for...
-
VirusTotal Reveals List of Most Mimicked Legitimate Apps in Malware Attacks
The cybersecurity analysts at VirusTotal recently discovered that an increasing number of threats are being used to mask legitimate applications...
-
ZTNA: 4 Letters That Can Change the Dynamic of Your Business Landscape
The cybersecurity landscape has evolved since the shift to remote work began a few years ago. Gone are the days of setting up firewalls to...
-
Multiple Vulnerabilities on VMware Let Attackers Gain Admin Privileges
VMware recently issued an advisory warning for the administrators that multiple products on the VMware Cloud Platform are affected by multiple...
-
Taiwanese Websites Hit by DDoS Attacks Ahead of Nancy Pelosi’s Visit
Taiwan’s Presidential website and several websites run by the government of Taiwan were disrupted by distributed denial-of-service (DDoS)...
-
Over 3,200 Mobile Apps are Exposing Twitter API Keys that Enable Account Take Overs
Cybersecurity Company CloudSEK examined a broad range of apps for possible data leaks and discovered 3,207 apps leaking Twitter API keys, that...
-
Largest DDoS Attack Ever – 659.6 Million Packets Per Second
In the past few weeks, an organization in Eastern Europe has been the victim of the biggest DDoS attack that the continent has ever experienced....
-
24-Year-Old Australian Hacker Arrested For Creating and Selling Spyware
A 24-year-old man was arrested and charged with creating and selling spyware, triggering a global law enforcement operation. As a result, the...
-
Android Apps on Google Play Store to Distribute Banking Malware as Document Scanners
Users’ devices have been compromised by banking malware via a malicious campaign uncovered by Trend Micro exploiting the Google Play Store’s...
-
Hackers Use New Tactics as Microsoft Blocked Macros by Default
As Microsoft Office began blocking malicious macros by default in many of its programs, hackers began to change their tactics after they had...
-
How To Select Your Pentest Vendor: Guide
Systematic Penetration Testing is the only way to be a step ahead of hackers, so it is worth spending money on. But there are thousands of...
-
5 Benefits of a Cloud Firewall
Firewalls have been a staple of almost every organization’s security since its inception in the late 80s. A firewall is a network security...