GB Hacker
-
DeathStalker Hacker Group’s New PowerPepper Malware Evade Antivirus Detection to Bypass Windows
Researchers uncovered a new Malvertising campaign PowerPepper from DeathStalker threat actor group that is active since 2012, and actively...
-
CrowdSec, An Open-Source, Modernized & Collaborative Intrusion Prevention System (fail2ban)
CrowdSec is a security automation engine designed to protect servers, services, containers, or virtual machines exposed on the internet with a...
-
USBStealer – Password Hacking Tool For Windows Applications to Perform Windows Penetration Testing
USBStealer is a Windows Based Password Hacker Tool that helps to Extract the password from Windows-Based Applications such as Chrome Password,...
-
Most Important Network Penetration Testing Checklist
Network Penetration Testing determines vulnerabilities in the network posture by discovering Open ports, Troubleshooting live systems, services...
-
Google Discloses a zero-click Wi-Fi Exploit to Hack iPhone Devices
Google Project Zero has disclosed the details of an iOS exploit that allows an attacker to hack iPhones remotely over Wi-Fi and steal sensitive...
-
Critical Oracle WebLogic Vulnerability Flaw Actively Exploited by DarkIRC Malware
Juniper Threat Labs researchers observed active attacks on Oracle WebLogic software using CVE-2020-14882. This vulnerability, if successfully...
-
New malicious NPM packages Used by Attackers Install njRAT Remote Access Trojan
No, not the one that nibbles at your Thanksgiving leftovers. RAT, Remote Access Trojan, is a type of malware that enables attackers to take over...
-
North Korean Hackers Targeted COVID Vaccine Maker AstraZeneca
British pharmaceutical company AstraZeneca, one of the manufacturers leading the way towards developing a Covid-19 vaccine, has been targeted by...
-
Red Team Research Discovered 6 new zero-day Vulnerabilities in Schneider Electric StruxureWare
“A zero-day vulnerability is a software security flaw that is known to the software vendor but doesn’t have a patch in place to fix the flaw. It...
-
Signed Bandook Malware Attacks Against Multiple Industrial Sectors
Like a phoenix rises from the ashes, Bandook has risen after several years. Bandook, written in both Delphi and C++ was first seen in 2007 as a...
-
Hackers Steal 800,000€ from ATMs in Italy Using Black Box attack
A criminal organization has stolen money from a minimum of 35 ATMs and Post Office cash dispensers operated by Italian banks with a new Black...
-
Web Application Penetration Testing Checklist – A Detailed Cheat Sheet
Web Application Pentesting is a method of identifying, analyzing and Report the vulnerabilities which are existing in the Web application...