GB Hacker
-
Multiple Critical Flaws in Cisco Security Manager Let Attackers to Execute Remote Code
Cisco, this week, published an advisory, CVE-2020-27130, stating that a vulnerability was identified and resolved in Cisco Security Manager that...
-
Chrome 87 Released with Improved Performance and Security Updates
Google has released Chrome 87 on November 17th, 2020, to the Stable desktop channel, and it includes numerous performance improvements, security...
-
Surprising Differences Between TLS and SSL Protocol
TLS is simply a successor of SSL 3.0, TLS is a protocol which provides Data encryption and Integrity between communication channels. SSL 3.0 is...
-
Firefox 83.0 Released – Improved Page Load Performance, HTTPS-Only Mode & 0-Day Fix – Update Now!!
Mozilla released Firefox 83.0 with new impartments on page load performance, fixed the Zero-day bug, introduces HTTPS-Only Mode., and various...
-
Ransomware Operators Partner With Hackers to Attack High profile Organizations
Let’s first get the old news out of the way. Ransomware is a hornet’s nest. Well, now to the latest news. Ransomware operators are now...
-
Most Important Endpoint Security & Threat Intelligence Tools List for Hackers and Security Professionals
Threat Intelligence & Endpoint Security Tools are more often used by security industries to test the vulnerabilities in network and...
-
New TroubleGrabber Malware Steals Credentials and System Information
TroubleGrabber, the latest in a line of credential stealers, spreads via Discord attachments and uses Discord webhooks to hand over stolen data...
-
ModPipe Malware Steals Sensitive Information from Oracle POS Software used by Hundreds of Thousands of Hotels
A new Point-of-Sale (PoS) named ModPipe malware is targeting devices utilized by many thousands of organizations within the hospitality sector,...
-
Wireless Penetration Testing Checklist – A Detailed Cheat Sheet
Wireless Penetration testing actively examines the process of Information security Measures which is Placed in WiFi Networks and also analyses...
-
10 Best Vulnerability Scanning Tools For Penetration Testing – 2020
A Vulnerability Scanning Tools is one of the essential tools in IT departments Since vulnerabilities pop up every day and thus leaving a...
-
Critical Vulnerabilities Discovered in World’s Largest Android TVs Manufacturer
Television is a mass medium for entertainment, advertising, news, and sports. In advent with the technology, inbuilt integration offered with...
-
xHunt Hackers Uses New Backdoor to Attack Exchange Servers
xHunt hackers uses New Backdoor to attack Exchange Servers and the xHunt Campaign has also targeted Kuwait organizations to compromise systems....