GB Hacker
-
Multiple QNAP Flaws Let attackers to Access and Read Sensitive Data
NAS device maker QNAP released software updates for its network-attached storage (NAS) products on Friday. While this updated software package...
-
Caramel Skimmer – Credit Card Stealing Service Sells 2,000 USD For Lifetime Subscription
It seems that credit card theft services are getting increasingly popular, and among them, one of the new in the market that is gaining massive...
-
Attackers Inject Fileless Malware Directly into Windows Event Logs
Cybersecurity analysts have discovered an unknown malware campaign combining two methods never before employed by the cybercriminals to infect...
-
VHD Ransomware Linked to North Korea’s Cyber-Army Targets Financial Institutions
Experts from Trellix discovered that VHD Ransomware was linked to North Korea’s cyber army. The cyber-army of North Korea has been divided into...
-
Google to Implement Passwordless Logins in Android and the Chrome Web Browser
Apple, Google, and Microsoft announced plans to expand support for a common passwordless sign-in standard created by the FIDO Alliance and the...
-
Critical Cisco NFVIS Software Flaw Let Attacker Injects Commands at The Root Level
Cisco has released an update to the Enterprise NFV Infrastructure Software (NFVIS) that addresses several security flaws found by researchers....
-
AvosLocker Ransomware Uses Driver Files to Disable Anti-Virus Solutions
Recent research from Trend Micro has revealed a new variant of the highly malicious AvosLocker ransomware. By exploiting unpatched security...
-
Computer Malfunction Leads to Death of Over 27,000 Chickens
At Hose Lodge Farm in Colston Bassett, Nottinghamshire, England, due to the “Computer Malfunction” in the broiler shed ventilation system caused...
-
What are the Most Common Types of SSL Errors and How to Fix Them?
What happens when warnings like ‘Your Connection is not Private,’ ‘The Site’s Security Certificate is Not Trusted,’ etc., appear on your...
-
Chinese Hacker Group Targeting Telecommunication Service Providers
Moshen Dragon is the name that has been assigned to a new cluster of malicious cyber activity that is being detected by researchers recently....
-
Elon Musk Said Twitter DMs Should Have End to End Encryption
Elon Musk, the CEO of SpaceX and Tesla and the new owner of microblogging and social networking giant Twitter intends to add E2EE (end-to-end...
-
Indian Government Asked Requiring Organizations to Report Cybersecurity Incidents within Six Hours
The Computer Emergency Response Team of India (CERT-in), an organization that deals with emergency rescue efforts, published new guidelines...