GB Hacker
-
What Does PCI DSS 4.0 Mean for API?
Payment Card Industry Data Security Standard or PCI DSS 4.0 was released in May 2022 by the PCI Security Standards Council (PCI SSC). After...
-
LogShield: A New Framework that Detects the APT Attack Patterns
There have been several cases of GPT model-based detection for various attacks from system logs. However, there has been no dedicated...
-
Hackers Exploiting Create2 to Bypass Wallet Security Alerts
Recently, hackers have used the Ethereum network’s CREATE2 opcode to bypass wallet security alarms in certain wallets. Using Create2’s...
-
Intel is Being Sued Over the ‘Downfall’ CPU Vulnerability for $10K per Plaintiff
A class-action lawsuit had been filed against Intel due to a critical “Downfall” vulnerability in Intel CPUs, a defect that Intel was aware of...
-
Authorities Took Down Massive Phishing-as-a-service Provider
A notorious phishing service that supplied cybercriminals with phishing kits, scam pages, and stolen credentials has been disrupted by a joint...
-
Imperial Kitten Attacking Tech Firms with SQLi & Scanning Tools
Researchers detected IMPERIAL KITTEN, an adversary with ties to Iran, conducting strategic web compromise (SWC) operations with a focus on...
-
10 Best Unified Endpoint Management Tools – 2024
Managing a diverse range of devices, including desktops, mobile devices, and Internet of Things (IoT) devices, is an essential aspect of modern...
-
Serbian National Pleads Guilty For Operating a Darknet Website
After being apprehended by the US government, a Serbian citizen confessed to placing multiple orders on the Monopoly drugs market, which operates...
-
New Gootloader Malware Abuses RDP to Spread Rapidly
Hackers target Remote Desktop Protocol (RDP) via malware because it provides them with remote access to a victim’s computer or network, allowing...
-
Hackers Exploiting Confluence Flaw to Deploy Ransomware
Hackers actively target Confluence flaws because it is a widely used collaboration and documentation platform, making it a valuable target for...
-
Storage And Backup Cyber Resiliency – CISOs Guide 2024
CISOs rely on information about security from across the organization, particularly from the various IT departments. Unfortunately, the...
-
Ransomware Actors Exploiting Legitimate System Tools to Gain Access – FBI
Ransomware attacks are on the rise, causing organizations to lose millions of dollars, restricting them from accessing their data, and possibly...