GB Hacker
-
New Top 10 Best Antivirus for Android in 2021 -100 % Mobile Protection
Choosing the Best Antivirus for Android is the most important concern to protect your Andriod device from sophisticated cyber threats. An...
-
US Treasury officials’ Email Accounts Hacked by the Threat Actors Behind SolarWinds Attack
Last week we had reported that SolarWinds was subject to a massive cyberattack and it had left the data of many organizations and government...
-
New SUPERNOVA Backdoor Found in SolarWinds Cyberattack Analysis
An analysis reports the detection of a backdoor possibly developed by the unidentified hacking team involved in the attack; known as Supernova,...
-
Critical Dell Wyse Bugs Let Attackers to Execute Code and Access Files and Credentials
The giant Dell Wyse is affected by two Critical Vulnerabilities CVE-2020-29491 and CVE-2020-29492 which targets thin client devices. The...
-
NSA Warns of Cloud Attacks on Authentication Mechanisms
The US National Security Agency (NSA) published a security advisory, warning about two techniques abused by threat actors for escalating attacks...
-
Supply-chain Attack Targeting Certification Authority in Southeast Asia
ESET Researchers revealed a supply-chain attack occurred on the website of the Vietnam Government Certification Authority (VGCA): ca.gov.vn....
-
Microsoft Breached in Suspected Russian Hack Using SolarWinds
Yesterday we had reported that SolarWinds appeared to have been hacked by Russian attackers. Today we have another victim related to this...
-
What is XSS (Cross Site Scripting) ? – A Detailed Understanding the Type of XSS
XSS is a very commonly exploited vulnerability type which is very widely spread and easily detectable and also it is one of the important...
-
How to Ensure Mobile App Security: Key Risks & Top Practises
Building an app today doesn’t end with finding the right technologies and implementing features in a user-friendly user interface. Today,...
-
Russian Hackers Breached US govt, FireEye in a Supply Chain Attack
When the National Security Council meets at the White House on a Saturday, you know that the hack is very serious. The US Treasury and Commerce...
-
PgMiner Botnet Attacks PostgreSQL Databases to Install a Cryptocurrency Miner
Unit 42 researchers at Paloalto discovered a cryptocurrency mining botnet named “PGMiner”. It is a Linux based cryptocurrency botnet that...
-
Flaws with PoS Terminals Let Attackers Execute Arbitrary Code
Researchers describe the intense vulnerabilities in the two biggest Point of Sales (PoS) vendors, Verifone, and Ingenico. The affected devices...