GB Hacker
-
What are Brute Force Attacks, and How to Protect Your APIs Against them?
Brute force attacks have been one of the most common attack types. In Q1 2022, brute force made up 51% of all attacks! These attacks often pave...
-
Simplify Secure Enterprise Device Management With QR Codes
Corporate mobile devices have become essential to everyday tasks for employees, but this convenience also comes with security risks. The challenge...
-
GroundPeony Group Exploiting Zero-day Flaw to Attack Government Agencies
A cyber attack group – GroundPeony, targeting the Taiwanese government, was discovered in March 2023; it used several tactics, such as tampering...
-
Hackers Threaten Patients Following a Massive Cyberattack on a Hospital
One of the renowned hospitals in Israel became the victim of a data breach, and patients were blackmailed with a financial motive. According to an...
-
How Malware Sandboxes Strengthen Your Cybersecurity
Cyberattacks are becoming increasingly sophisticated, threatening organizations’ critical infrastructure and sensitive data more than ever. Core...
-
Researchers Uncovered the Developer of CypherRAT and CraxsRAT
Researchers have identified a new Malware-as-a-Service (MaaS) operator called ‘EVLF DEV’ as being behind the creation of CypherRAT and CraxsRAT....
-
Ivanti Sentry Flaw: Let Attackers Access Critical APIs Used for Configuration
An unauthenticated critical API access vulnerability was found in the Ivanti Sentry interface, which could allow a threat actor to gain access to...
-
Apache Ivy Injection Flaw Let Attackers Exfiltrate Sensitive Data
A blind XPath injection vulnerability was discovered in Apache Software Foundation Apache Ivy, which allows threat actors to exfiltrate data and...
-
DotRunpeX Malware Injector Widely Delivers Known Malware Families to Attack Windows
DotRunpeX is one of the new and stealthiest .NET injectors that employs the “Process Hollowing” method, through which this malware distributes a...
-
Interpol Arrested 14 cybercriminals and uncovered 20,674 suspicious cyber networks
The recent Africa Cyber Surge II operation conducted by INTERPOL and AFRIPOL has revealed a stark reality – the surge in digital insecurity and...
-
3,000+ Android Malware Using Unique Compression Methods to Avoid Detection
Android Smartphones play a vital role in our daily lives, as they help us stay connected and, not only that, they also help in performing several...
-
Cyber Criminals Exploiting Google Drive, OneDrive to Hide Malicious Traffic
Threat actors are actively modifying their TTPs to counter the advanced security mechanisms and tools to accomplish their illicit goals for...