GB Hacker
-
Windows Computer Hit with AgentTesla Malware to Steal Data
AgentTesla is a notorious malware that functions as a keylogger and information stealer. By logging keystrokes and capturing screenshots...
-
Mirai-Based NoaBot Launches a DDoS Attack on Linux Devices
Hackers use the Mirai botnet to launch large-scale Distributed Denial of Service (DDoS) attacks by exploiting vulnerable Internet of Things (IoT)...
-
Adobe Substance 3D Stager Let Attacker Execute Arbitrary Code
Adobe has released a security update that fixes “Important-severity” vulnerabilities in its Substance 3D Stager product. The successful...
-
Apple AirDrop Hacked by China to Gain Access to Private Information
AirDrop was introduced in iOS 7, which allows Apple users to transmit files between iOS and macOS systems. Moreover, this does not require an...
-
Water Curupira Hackers Launch Pikabot Malware Attack on Windows Machine
Pikabot is a loader malware that is active in spam campaigns and has been used by the threat group Water Curupira, which has been paused from June...
-
Hackers Using Weaponized PDF Files to Deliver Qakbot Malware
Qakbot is a sophisticated banking trojan and malware that primarily targets financial institutions. This sophisticated malware steals sensitive...
-
Cacti Blind SQL Injection Flaw Enables Remote Code Execution
Cacti, the performance and fault management framework, has been discovered with a blind SQL injection vulnerability, which could reveal Cacti...
-
Multiple QNAP High-Severity Flaws Let Attackers Execute Remote Code
QNAP has released multiple security advisories for addressing several high, medium, and low-severity vulnerabilities in multiple products,...
-
Accenture Buys 6point6 to Expand Cyber Portfolio
Accenture, a global professional services company, has made a strategic move in the U.K. market by acquiring 6point6, a leading technology...
-
Incorporating Mobile Threat Defense into Your Device Management Ecosystem
In recent years, we have seen a significant shift in the global workforce. With the proliferation of high-speed internet and advanced...
-
Surge in Open Source Malware Stealing Login Credentials & Sensitive Data
Over the decade, Python has been dominating the programming languages and consistently growing with open-source love. Numerous popular...
-
UAC-0050 Group Using Remcos RAT to Attack Government Agencies
Remcos RAT (Remote Control and Surveillance) is a type of Remote Access Trojan used for unauthorized access and control of a computer system....