GB Hacker
-
Cyber Attack Surge by 28%:Education Sector at High Risk
In Q1 2024, Check Point Research (CPR) witnessed a notable increase in the average number of cyber attacks per organization per week, reaching...
-
Cyber Espionage: Turla APT Hackers Attack European Organization With Backdoor
Cybersecurity experts have uncovered a failed attempt by the notorious Russia-based Turla Advanced Persistent Threat (APT) group to infiltrate...
-
New SharePoint Technique Lets Hackers Bypass Security Measures
Two new techniques uncovered in SharePoint enable malicious actors to bypass traditional security measures and exfiltrate sensitive data without...
-
Google Rolls Out “Find My Device” Network for Android Users
Google has announced the global rollout of its revamped Find My Device network. This innovative feature is set to transform how Android...
-
Cloudflare Acquires Baselime to Enhance Serverless Performance
Cloudflare has announced its acquisition of Baselime, a pioneering observability platform designed to simplify the complexities of serverless...
-
Microsoft Two-Step Phishing Campaign Attack LinkedIn Users
The professional and personal online spheres are merging as social media platforms like Facebook, LinkedIn, and WhatsApp are now commonly used for...
-
AI Package Hallucination – Hackers Abusing ChatGPT, Gemini to Spread Malware
The research investigates the persistence and scale of AI package hallucination, a technique where LLMs recommend non-existent malicious packages....
-
Feds Patching Years-Old SS7 Vulnerability in Phone Networks
The FCC’s Public Safety and Homeland Security Bureau is seeking input on how communication service providers are securing SS7 and Diameter...
-
Hackers Claiming Breach of Five Eyes Intelligence Group (FVEY) Documents
A group of hackers has announced the release of sensitive documents purportedly belonging to the Five Eyes Intelligence Group (FVEY), a prominent...
-
Aembit Selected as Finalist for RSA Conference 2024 Innovation Sandbox Contest
The Leading Company for Securing Access Between Workloads Recognized for the Aembit Workload IAM Platform Aembit , the Workload Identity and...
-
New XZ Utils Backdoor Free Scanner to Detect Malicious Executables
A critical vulnerability has been discovered in XZ Utils , a widely used data compression tool across Unix-like operating systems, including...
-
Microsoft’s Exchange Server Hack: Key Rotation Flaw Triggers Breach
Storm-0558, a cyberespionage group affiliated with the People’s Republic of China, has reportedly compromised Microsoft Exchange mailboxes of 22...