GB Hacker
-
New Medusa Stealer Attacking Users to Steal Login Credentials
While the world celebrated Christmas, the cybercrime underworld feasted on a different kind of treat: the release of Meduza 2.2, a significantly...
-
Chinese Hackers Exploit New Zero-Day in Barracuda’s ESG to Deploy Backdoor
Barracuda Email Security Gateway (ESG) Appliance has been discovered with an Arbitrary code Execution vulnerability exploited by a China Nexus...
-
Operation Triangulation: 0-click Attack Chained With 4 Zero-Days to Hack iPhones
Hackers exploit Zero-Days because these vulnerabilities are unknown to software developers, making them valuable for launching attacks before...
-
Critical Apache OfBiz Zero-Day Let Attackers Bypass Authentication
A new vulnerability has been discovered in Apache OfBiz, an open-source Enterprise Resource Planning (ERP) system. Apache OfBiz is used as a...
-
10 Prominent Cybersecurity Acquisitions of 2023
The cybersecurity domain is undergoing rapid changes owing to the rise in frequency and complexity of cyber threats. As the digital world...
-
Ubisoft Investigates Cyber Attack: Possible Data Exfiltration by Hackers
Ubisoft, the renowned video game developer behind iconic franchises like Assassin’s Creed and Far Cry, narrowly escaped a potentially devastating...
-
Hackers Stolen Over $58 Million in Crypto Via Malicious Google and X Ads
Threat actors targeting crypto wallets for illicit transactions have been in practice for quite some time. Threat actors have been using...
-
Android Malware Actively Infecting Devices to Take Full Control
Android malware infects devices to take full control for various illicit purposes like:- Stealing sensitive information Generating...
-
Cisco to Acquire Cloud Networking and Security Startup Isovalent
In a strategic move destined to fortify its dominance in the ever-evolving realm of cloud security, Cisco has officially declared its intent to...
-
How Do You Protect Your APIs from Bot Attacks?
Organizations face an escalating threat of bot attacks in the rapidly evolving digital landscape. As revealed in our latest AppSec report ,...
-
Operation RusticWeb Using PowerShell Commands to Exfiltrate Confidential Documents
Hackers use PowerShell commands because they provide a powerful scripting environment on Windows systems, allowing them to stealthily execute...
-
Intellexa Spyware Adds Persistence with iOS or Android Device
In the shadowy realm of commercial spyware, the spotlight turns to the notorious Intellexa spyware and its Predator/Alien solution, as dissected...