GB Hacker
-
How to Boost Cybersecurity in Your E-commerce Business
Being a business owner has unquestionably many perks. However, there are plenty of hazards as well. Criminals often target businesses of all sizes...
-
Mediatek Security Flaws Affecting Smartphones, Tablets, Wi-Fi, and Other Chipsets
The July 2023 Product Security Bulletin from Taiwanese chipmaker MediaTek describes security flaws impacting MediaTek chipsets for smartphones,...
-
Over 300,000+ Fortinet Firewalls are Vulnerable to a Critical RCE Flaw
The latest research shows Fortigate firewalls are vulnerable to remote code execution attempts. 490,000 affected SSL VPN interfaces are exposed on...
-
Hackers Use HTML Smuggling Technique to Attack European Government Entities
Over recent months, CPR (Check Point Research) monitored a Chinese threat actor attacking European Foreign Affairs ministries and embassies. Check...
-
ChatGPT Creator Sued for $3 Billion Over Theft of Private Data
In a class action complaint filed on Wednesday, it is claimed that OpenAI and Microsoft stole “vast amounts of private information” from internet...
-
Hackers use Cloned pages of Popular Tools to Deliver Blackcat Ransomware
The cybersecurity researchers at Trend Micro recently identified that the Blackcat Ransomware (aka ALPHV) actors are using malvertising tricks to...
-
Snappy – A New Tool to Detect Fake WiFi Access Points
A new tool named “Snappy” developed by cybersecurity experts, can assist in identifying rogue WiFi access points that aim to steal data from users...
-
Submarine Cable Growing Popularity Intensifying Cyber Attacks
Submarine cables installed on the ocean floor facilitate the transmission of data and voice between land-based stations. International...
-
Chinese Spy Balloon Used American Tech to Collect Photos & other Information
Recently, the Wall Street Journal reported that in the early months of this year, a Chinese spy balloon utilized American technology to...
-
MITRE Releases Top 25 Most Dangerous Software Weaknesses
The top 25 most dangerous software weaknesses impacting software for the previous two calendar years have been published by MITRE as part of the...
-
Brave New Privacy Feature to Limit Website Access to Local Resources
Brave version of 1.54 for desktop and Android will include more powerful features for controlling which sites can access local network resources...
-
Charming Kitten APT Group Uses Innovative Spear-phishing Methods
Charming Kitten APT Group Uses Innovative Spear-phishing Methods. Volexity researchers recently noticed that threat actors are actively...