GB Hacker
-
Chrome Zero-Day Vulnerability That Exploited In The Wild
Google has fixed the sixth Chrome zero-day bug that was exploited in the wild this year. The flaw, identified as CVE-2023-6345, is classified as...
-
Iranian Mobile Banking Malware Steal Login Credentials & Steal OTP Codes
An Android malware campaign was previously discovered that distributed banking trojans targeting four major Iranian Banks: Bank Mellat, Bank...
-
BLUFFS: Six New Attacks that Break Secrecy of Bluetooth Sessions
Six novel Bluetooth attack methods have been discovered, which were named BLUFFS (Bluetooth Forward and Future Secrecy) attacks. These attacks...
-
Serial ‘SIM Swapper’ Sentenced to Eight Years in Prison
In a digital age marred by deceit, 25-year-old Amir Hossein Golshan stands as a testament to the dark underbelly of cyberspace. Hailing from...
-
Design Flaw in Domain-Wide Delegation Could Leave Google Workspace Vulnerable to Takeover – Hunters
BOSTON, MASS. and TEL AVIV, ISRAEL, November 28, 2023 – A severe design flaw in Google Workspace’s domain-wide delegation feature discovered by...
-
Hackers Behind High-Profile Ransomware Attacks on 71 Countries Arrested
Hackers launched ransomware attacks to extort money from the following two entities by encrypting their data and demanding a ransom payment for...
-
Google Drive Users Files Suddenly Disappeared, Tech Gaint Investigating
In a perplexing turn of events, a notable cohort of Google Drive users is grappling with the disappearance of files from their accounts....
-
Cybersecurity tool investments are rising in Asia-Pacific as Cyberattacks grow
Investments in cybersecurity tools have been on the rise in the Asia-Pacific region, owing to the increased prevalence of cyberattacks. It is...
-
A New Telekopye Bots That Tricks Users to Steal Payment Details
Phishing bots are a tool used by hackers to fool people into disclosing private information such as- Login credentials Financial...
-
MOVEit Hack : Over 185,000 AutoZone Users Personal Data Hacked
AutoZone Inc., a US retailer of automotive parts and accessories, warned customers that their data had been compromised as a result of the Clop...
-
North Korean Hackers Exploiting Zero-day Vulnerabilities & Supply Chains
The DPRK has been a great threat to organizations in recent times. Their attack methods have been discovered with several novel techniques...
-
Dell Command Configure Vulnerability Let Attackers Compromise Vulnerable Systems
It has been discovered that there is a high-severity vulnerability in Dell Command Configure that could potentially be exploited by malicious...