GB Hacker
-
CybeReady Named a Representative Provider in 2022 Gartner® Innovation Insight on Security Behavior
CybeReady, provider of the world’s fastest security awareness solution, is honored to be named as a Representative Provider in the 2022 Innovation...
-
Researchers Claim That RSA Algorithm Can Be Broken by Quantum Computers
It was recently reported that Chinese researchers had made a breakthrough in the field of quantum computing. A quantum computer with around the...
-
Volvo Cars Suffered A New Data Breach? Data Published On Hacking Forum
According to a post on a well-known hacker forum, Volvo Cars has experienced a new data breach, with stolen information allegedly being made...
-
Can Open Source Security Prevent Zero-Day Attacks?
A zero-day (or zero-day) vulnerability is a software security risk that is not known to the software vendor or user. A zero-day attack is an...
-
Over 60,000 Online Exchange Servers Unpatched for RCE Vulnerability ProxyNotShell
One of the two security flaws targeted by ProxyNotShell exploits, CVE-2022-41082 RCE vulnerability, has not been patched on more than 60,000...
-
Lockbit Ransomware Group Apologized For the Attack On Hospital for Sick Children
Following the hospital’s breach in the middle of December, the LockBit ransomware group has expressed regret and given it a free decryption key....
-
RedThief Hacker Group Targeting Students in The U.K. to Steal Financial Data
In an activity dubbed RedThief (aka RedZei), Chinese-speaking scammers have been targeting Chinese international students in the UK for more than...
-
Triple Extortion Ransomware: How to Protect Your Organization?
Ransomware strikes businesses every 11 seconds. The ransomware attack volume is already at record levels, but we’re hearing it’s only getting...
-
EarSpy – A New Attack on Android Devices Use Motion Sensors to Steal Sensitive Data
There has been a new eavesdropping attack developed by a team of security experts for Android devices which has been dubbed “EarSpy.” With the...
-
GuLoader Malware Uses Advanced Anti-Analysis Techniques to Evade Detection
An advanced malware downloader named GuLoader has recently been exposed by cybersecurity researchers at CrowdStrike. This advanced downloader has...
-
Hackers Deploy New Information Stealer Malware onto Python Developers’ Machines
Researchers at Phylum recently discovered that hackers had been injecting information stealer malware into Python developers’ machines in order to...
-
Critical Linux Kernel Vulnerability Let Attackers Execute Arbitrary Code Remotely
SMB servers that have ksmbd enabled are vulnerable to hacking due to a major Linux kernel vulnerability (CVSS score of 10). KSMBD is a Linux...