GB Hacker
-
Rust Infostealer Malware Attacks macOS Sonoma Ahead of Public Release
Based on recent reports, it was discovered that there has been info stealer malware that affects both Windows and macOS platforms. The malware can...
-
Hacker-Attacking Developers Using Weaponized MS Visual Studio
Recent reports suggest that threat actors have been spreading malicious versions of Microsoft Visual Studio, a highly familiar Integrated...
-
6 Best Practices To Protect Your Company From Data Loss
Data is a critical asset in today’s digital business landscape. The loss of crucial information can result in severe financial damages and harm to...
-
Zenbleed – AMD’s Zen2 Processor Flaw Allows Attackers to Steal Sensitive Data
The CPUs that are based on x86-64 architecture feature XMM registers (128-bit), recently extended to 256-bit (YMM) and 512-bit (ZMM) for greater...
-
Hackers Use SMS Alerts to Install SpyNote Malware
Reports indicate that a Smishing campaign was conducted against Japanese Android users under the name of a Japanese Power and Water Infrastructure...
-
‘SIM Swapper’ Pleads Guilty For Hacking Instagram User Accounts
A 24-year-old man named Amir Hossein Golshan from Downtown Los Angeles has pleaded guilty for hacking Instagram users’ accounts, using a technique...
-
12 Norway Government Ministries were Targeted in a Cyberattack
According to recent reports, twelve government ministries in Norway have been targeted by cyber-attacks. The most recent attack was aimed at...
-
Critical Zyxel Firewall Injection Flaw Exploited to Conduct DDoS Attacks
Increased botnet activity targeting vulnerability(CVE-2023-28771) in Zyxel devices has become a major concern to its users. This vulnerability...
-
Google is Blocking Employee Internet Access to Minimize Cyberattacks
Google is to start a pilot program to have employees work without internet access as a way to decrease the risk of cyberattacks. According to...
-
Hacked Microsoft Keys Let Attackers Access a Wide Range of Azure Applications
The China-linked threat actors who stole the US State Department and other Microsoft customer emails may have acquired access to apps other than...
-
North Korean Hacker Group Breached US IT Firm JumpCloud
The cloud-based IT management firm JumpCloud was compromised by North Korean Lazarus Group hackers who appear to be financially motivated to steal...
-
API Security Checklist: A Must Read Guide 2023
APIs are poisoned pills you can’t live without. In today’s world, they are the enemy you must coddle next to every night. That is why API security...