GB Hacker
-
Phishing-as-a-Service Strox Lets Hackers Phish any Brand by Submitting its Logo
The ever-evolving world of cybercrime has given birth to a disturbing phenomenon – Phishing-as-a-Service (PhaaS), and one name that sends...
-
ToddyCat APT Hackers Exploiting Vulnerable Microsoft Exchange Servers
ToddyCat, a highly skilled advanced persistent threat (APT) actor notorious for launching targeted attacks in Europe and Asia, has recently...
-
Adobe, Cisco IOS, Skype, WordPad, and HTTP/2 Rapid Reset Flaws Actively Exploited
The US cybersecurity organization CISA has updated its Known Exploited Vulnerabilities catalog to include five new security flaws that are...
-
Stayin’ Alive Hacking Teleco & Government Organizations to Deploy Backdoor
Threat actors target telecoms and government ministries because they house valuable data and infrastructure. Telecoms hold sensitive...
-
Multiple Citrix NetScaler Flaw Leads to DoS Attack and Data Exposure
Critical vulnerabilities in Citrix NetScaler ADC and NetScaler Gateway have exposed sensitive information and a denial of service attack. A...
-
North Korean Hackers Continue to Refine Their Arsenal of Tactics & Techniques
The Democratic People’s Republic of Korea continues to advance its offensive cyber program, showcasing its unwavering commitment to using cyber...
-
Air Europa Breached: Customers’ Credit Card Details Exposed
On Tuesday, Air Europa, a Spanish airline, experienced a security breach where cybercriminals gained unauthorized access to the credit card...
-
3 Zero-days and 100+ vulnerabilities Fixed in Microsoft Security Update
Microsoft has published its October security patches in which over 100 vulnerabilities were fixed in multiple Microsoft products, including...
-
Shufflecake – Hidden Linux Filesystems to Store Sensitive Data
Protecting personal data is a growing concern, with local storage as the last line of defense. Even here, precautions are needed against...
-
D-Link Wi-Fi Range Extender Vulnerability Let Attackers Inject Remote Code
A command injection vulnerability has been discovered in the D-Link DAP-X1860 range extender, allowing threat actors to execute remote code on...
-
MacOS “DirtyNIB” Vulnerability: Let Attackers Execute Malicious Code
A new zero-day vulnerability has been discovered in Apple’s macOS systems, which allows threat actors to execute code on behalf of a legitimate...
-
Maintainers of a Popular Open Source Tool Warns of Critical Curl Vulnerability
Two new vulnerabilities have been discovered in the widely used Curl tool. These two vulnerabilities are identified as CVE-2023-38545 and...