GB Hacker
-
New Android Malware on the Google Play Store with Over 3 Million Downloads
A new Android malware called ‘Autolycos’ installed over 3 million times is surfing on the Google Play Store by secretly subscribing users to its...
-
North Korean Hackers Using H0lyGh0st Ransomware To Attack & Demand 1.2 to 5 Bitcoins
A ransomware operation called H0lyGh0st is being run by North Korean hackers for more than a year now, attacking small businesses across...
-
Ex CIA Programmer Convicted of Leaking ‘Vault 7’ Hacking Tools to WikiLeaks
It has been found that Joshua Schulte, a former programmer for the United States Central Security Agency (CIA), is guilty of leaking top secrets...
-
ChromeLoader – New Malware Using a browser Extension to Attack Organizations
New variants of ChromeLoader, a malware that steals information from websites, have been discovered by security researchers at Palo Alto...
-
VMware vCenter Server Flaw Let Attacker Exploit to Perform Elevate Privileges Attack
There has finally been a patch released by VMware for an affected version of vCenter Server’s IWA mechanism, eight months after a high-severity...
-
Cybercriminals Impersonate as Cybersecurity Firms in Callback Phishing Campaigns
Threat actors have begun impersonating prominent security companies in a new callback phishing campaign. The primary purpose of this campaign is...
-
Critical Fortinet Flaws Patched – Following Products Affected
Fortinet, a cybersecurity company headquartered in Sunnyvale, California develops and sells cybersecurity solutions, such as physical firewalls,...
-
Common API Security Risks and How to Mitigate Them
Though central to innovation in the app-driven digital ecosystem, APIs or Application Programming Interfaces expose more data and endpoints than...
-
Hackers Steal $540 Million From Axie Infinity Using a Fake Job Offer on LinkedIn
During the month of March 2022, one of Axie Infinity’s former employees became the victim of a fake job offer on LinkedIn and applied for the...
-
ZTNA – An Enterprise Game Changer For Securing Remote Access to IoT & BYOD
Internet networks have expanded far beyond the world of traditional desktop computers. Today, we rely on Google Nest to raise or lower the...
-
Beware!! LNK Worm – A Raspberry Robin Malware Attacking Windows Devices
Researchers from Cybereason Global Security Operations Center (SOC) Team, one of the world’s leading cybersecurity companies, have discovered a...
-
Vulnerability in Honda Cars Let Hackers Unlock & Start Remotely
In nearly all Honda models, hackers were able to open the doors and start the car remotely. A remote keyless entry system is often fitted to...