GB Hacker
-
North Korean Hackers Exploiting Zero-day Vulnerabilities & Supply Chains
The DPRK has been a great threat to organizations in recent times. Their attack methods have been discovered with several novel techniques...
-
Dell Command Configure Vulnerability Let Attackers Compromise Vulnerable Systems
It has been discovered that there is a high-severity vulnerability in Dell Command Configure that could potentially be exploited by malicious...
-
ZTNA vs VPN: What is the Difference? Will ZTNA Replace VPN?
In the late 1990s, VPN technology revolutionized remote work. However, the traditional VPN model has become outdated and unworkable as the world...
-
MySQL Security Best Practices Guide – 2024
MySQL stands out for its reliability and efficiency among the various database systems available. However, as with any technology that holds...
-
Exposed Kubernetes Secrets Allow Hackers to Access Sensitive Environments
Kubernetes is an open-source container orchestration platform that automates the deployment, scaling, and management of containerized...
-
117 Vulnerabilities Discovered in Microsoft 365 Apps
Microsoft 365 Apps is a suite of productivity tools that includes the following apps and services offered by Microsoft through a subscription...
-
Million-Dollar Crypto Scam that Leaves Investors Empty-handed
In the fast-paced world of cryptocurrency , the ever-looming threat of Rug Pulls has once again taken center stage. Check Point’s Threat...
-
North Korean Hackers Posed as Job Recruiters and Seekers
Two ongoing efforts, Contagious Interview and Wagemole, have been identified to target job-seeking activities connected to North Korean Hackers...
-
New Phishing Attack Hijacks Email Thread to Inject Malicious URL
Researchers discovered a new campaign delivering DarkGate and PikaBot that employs strategies similar to those employed in QakBot phishing...
-
Former Infosec COO Pleads Guilty for Hacking Hospitals
Former COO of the Atlanta-based cybersecurity company Securolytics, Vikas Singla, launched a series of cyberattacks on the non-profit healthcare...
-
Hackers Abusing WhatsApp Messages to Install Android Malware
Embarking on a journey into the realm of cyber threats, Microsoft recently uncovered a series of mobile banking trojan campaigns meticulously...
-
Yamaha Ransomware Attack: Employees Personal Information Exposed
A ransomware attack targeted Yamaha Motor Co., Ltd., resulting in a partial disclosure of the personal information maintained by the company....