GB Hacker
-
Threat Intelligence with Sandbox Analysis: Security Analyst Guide – 2024
Threat intelligence (TI) is critical to organizations’ cybersecurity infrastructure, allowing them to keep track of the evolving threat landscape...
-
AMIDES – Open-source Detection System to Uncover SIEM Blind Points
Cyberattacks pose a significant risk, and prevention alone isn’t enough, so timely detection is crucial. That’s why most organizations use SIEM...
-
Gang of 5 Employees Stole The Customer Data at Late Night in Office
It read like a screenplay. Five software programmers meet late at night at their residences to chat on their phones as they work. They hacked into...
-
Dark Effects of Bot Attacks that Drive 73% of Internet Traffic
The world’s third-largest economy, following the United States and China, can now be attributed to cybercrime, as stated by the World Economic...
-
Kubernetes Security on AWS: A Practical Guide
Kubernetes security is safeguarding your Kubernetes clusters, the applications they host, and the infrastructure they rely on from threats....
-
Beware! Hackers Can Now Exploit a Security Flaw in Zoom Client
The popular video messaging platform Zoom has discovered multiple vulnerabilities affecting Zoom Clients. These vulnerabilities might allow an...
-
Wireshark 4.2.0 Released: What’s New!
Wireshark, a leading network packet analyzer, has released version 4.2.0, which brings bug fixes, protocol updates, major API changes, codec...
-
ManageEngine Information Disclosure Flaw Exposes Encryption Keys
ManageEngine, one of the most widely used IT infrastructure management platforms that offers more than 60 Enterprise IT management tools, has been...
-
Reptar – A New CPU Vulnerability Affects Intel and AMD CPUs
A critical CPU vulnerability can pose a significant threat by allowing:- Unauthorized access to sensitive data Enabling malicious code...
-
TA402 Group using Weaponized XLL and RAR Files to Deliver Malware
Researchers have discovered a new phishing campaign that targets Middle Eastern and North African Government Entities to deliver a new initial...
-
Hackers Abuse Google Forms to Bypass Anti-spam Filters
Cybersecurity researchers at Talos have discovered that spammers are taking advantage of Google Forms quizzes to disseminate various types of...
-
What Does PCI DSS 4.0 Mean for API?
Payment Card Industry Data Security Standard or PCI DSS 4.0 was released in May 2022 by the PCI Security Standards Council (PCI SSC). After...