GB Hacker
-
HardBit Ransomware Steal Sensitive Data From Victims Before Encrypting
As of October 2022, The HardBit ransomware attack was first detected as a threat extorting cryptocurrency payments to decrypt data from...
-
Samsung Announced Feature to Protect Users From Zero-click Exploits
Samsung recently unveiled a cutting-edge addition to their feature suite, known as Message Guard. This new feature is specifically designed to...
-
Twitter Limits Two-Factor Authentication Using SMS Only For Blue Subscribers
Twitter has recently made an announcement regarding its two-factor authentication (2FA) service. The company has disclosed that the privilege of...
-
CEO Fraud Busted – Hacker Group Stole €38M in a Few Days
A Franco-Israeli criminal network engaged in extensive CEO fraud has been destroyed as a result of a combined investigation assisted by Europol....
-
1000 Best Google Dorks List (Google Hacking Guide) – 2023
Google Dorks List “Google Hacking” is mainly referred to pulling sensitive information from Google using advanced search terms that help users to...
-
Hyundai, Kia Flaw Lets Attackers Steal Car With a USB Cable
Car manufacturers Kia and Hyundai have recently taken measures to address concerns over vehicle security following the viral popularity of TikTok...
-
How Log Monitoring Prevents Web Attacks?
Security logging and monitoring failures feature in the OWASP Top 10 list, moving up to #9 from #10 in the 2017 list. Why so? Because logging and...
-
10,890 WordPress Sites Hacked for a Massive AdSense Fraud Campaign
The cybersecurity researchers at Sucuri recently discovered a critical backdoor that has managed to infiltrate thousands of websites over the past...
-
Google Launches Privacy Sandbox Beta for Android Users
Google has become an inevitable thing in our day-to-day life. Especially, mobile apps are being developed every day to make life better with...
-
Hackers Could Use ChatGPT to Generate Convincing Scam Messages in Seconds
Using technology powered by AI (Artificial Intelligence), scammers can now take advantage of potential victims looking for love online by...
-
Apple WebKit Zero-Day Vulnerability Exploited to Hack iPhones, iPads, and Macs
As a result of a new zero-day vulnerability found in Apple products that can be exploited in hacking attacks, Apple has recently released an...
-
Multiple 0-Day Attacks in The PyPI Packages Aimed to Steal Developer Credentials
Recently, the FortiGuard Labs team made a groundbreaking discovery of several new zero-day attacks in the PyPI packages. The source of these...