GB Hacker
-
How Can DSPM Prevent High-Profile Breaches?
In early October 2023, a DNA testing company for ancestry discovery purposes, 23andMe, disclosed that it suffered a data breach . On the 5th...
-
How Sandboxes Help Security Analysts Expose Script-Based Attacks
Cybercriminals employ numerous tactics to infiltrate endpoints and scripts are among the most destructive. You can trigger an infection...
-
Poisoned AI Coding, Assistant Tools Opens Application to Hack Attack
AI (Artificial Intelligence) has significantly revolutionized software engineering with several advanced AI tools like ChatGPT and GitHub Copilot,...
-
Sophos Firewall Code Injection Flaw: Let Attackers Execute Remote Code
A critical security flaw has been discovered in the Sophos Firewall User Portal and Webadmin, allowing hackers to execute malicious code remotely....
-
Quishing: New Sophisticated Phishing Attacks on the Rise
Phishing, a persistent cyberthreat, has evolved with the times. Once a symbol of convenience, QR codes are now being weaponized by attackers...
-
Cloud Engineer Sentenced for Deleting Ex-employer’s Code Repos & Logs
San Francisco resident Miklos Daniel Brody, 38, took revenge on his former employer, a bank, by hacking valuable computer code and damaging the...
-
Toyota Ransomware Attack Exposes Customers Personal Data
Toyota Financial Services (TFS) notifies customers after a data breach that exposed personal and sensitive financial information. In a...
-
What is CloudSecOps? – A Complete Security Operations Guide – 2024
Cloud security is becoming a central part of any organization’s cybersecurity strategy. However, in most organizations, the teams managing cloud...
-
WordPress Plugin Flaw Exposes 90K+ Websites to Hack Attack
Over 90,000 websites are currently at risk due to a vulnerability found in the WordPress Backup Migration Plugin. This vulnerability has enabled...
-
Hackers Trick Users With Data Leak Message to Deploy Malware
Researchers discovered the spread of a malicious exe file that targets specific individuals and is disguised as information related to a personal...
-
Hackers Spy iPhone Users Using Malicious Keyboard Apps
A new method of keylogging using malicious keyboard apps has been discovered to affect iPhones, evading all Apple’s security detection procedures....
-
MrAnon Stealer Attacking Windows Users Via Weaponized PDF Files
Phishing emails targeting Windows users were discovered, tricking users into opening a malicious PDF file called “MrAnon Stealer” that spreads...