GB Hacker
-
Shopify Data Breach – Two Rogue Employees Stole Customer Data
The Online e-commerce platform Shopify announced a data breach after two of their rogue employees of the support team engaged in accessing the...
-
The Importance of Cybersecurity in The Post-COVID-19 World
Many organizations woke up to the importance of cybersecurity when the COVID-19 pandemic struck and shone a harsh light on the state of...
-
Google Chrome Security Update Wide Range of Attacks – Update Now!
Google released Chrome 85.0.4183.121 for Windows, Mac, and Linux which comes with a fix for 10 security flaws. Successful exploitation of the...
-
Member of Dark Overlord Hacker Group Sentenced to Five Years in Prison for Stealing Medical and Financial Data
Nathan Wyatt, 39, United Kingdom national pleaded for his role in “The Dark Overlord” Hacking Group conspired to steal personal and medical...
-
Microsoft Bing Server Leaks Search Queries, Location Data, and Device Details
Security researchers from WizCase uncovered a massive data leak in the Microsoft Bing mobile app that exposes search queries, device details,...
-
The Cybersecurity Risks Related to Remote Workers Returning to Workplaces
In many countries, governments have decided to ease the Covid-19 induced lockdowns. As a result, companies are now lifting the work-from-home...
-
Offensive Security released Win-KeX Version 2.0 that Brings Kali Desktop Experience in Windows
Win-Kex was first introduced with Kali Linux 2020.3, it provides a Kali Desktop Experience for Windows Subsystem for Linux (WSL 2). Version 2.0...
-
A Bug With Firefox for Android Let Attackers Hijack without user Interaction on the Same WiFi Network
A bug with the SSDP engine in Firefox for Android would allow attackers to exploit targeted Android phones that are connected to the same Wi-Fi...
-
Shodan and Censys: Finding Hidden Parts On the Internet With Special Search Engines
Our digital lives connect massive things with the Internet. Starting with Smartphones, Wi-Fi routers, Surveillance Camera, Smart TV, SCADA...
-
Apple High Severity Bug Allows Attackers to Execute Arbitrary Code on iPhone, iPad, iPod
Apple release updates for iOS and iPadOS operating systems that fixes several security iPhone, iPad, and iPod devices. With the security update,...
-
Hackers Would Bypass Multi-Factor Authentication to Gain Full Access to Microsoft 365 Services
Security researchers from Proofpoint discovered critical security vulnerabilities with multi-factor authentication (MFA) implementations in the...
-
Wireshark 3.3.0 Released With New Features, Protocols & Capture File Support
Wireshark 3.3.0 was released with a fix for vulnerabilities that results in the BACapp dissector crash and fix for other bugs. Wireshark is...