GB Hacker
-
GitHub Launches Code Scanning Tool to Find Security Vulnerabilities – Available for All Users
GitHub launches a new code scanning tool that helps developers to detect vulnerability before the application reaches production. The tool was...
-
APT‑C‑23 Hacker Group Attacks Android Users That Records Calls & Take Pictures Silently
Security researchers discovered new spyware used by the APT-C-23 threat group to target Android users through fake Android app store. The...
-
Joker Malware Targets Android Users to steal SMS Messages and Contact Lists – 17 Apps Removed from Google Play
Joker is one of the most prominent malware families that continuously target the Android devices, it’s main activity is to stimulate clicks on...
-
Certified Malware Analyst – Exploit Development, Expert Malware Analysis & Reverse Engineering
Certified Malware Analyst: In 2020, sophisticated Cyber attacks keep on increasing by APT threats that target most of the enterprise-level...
-
Beware of the New Critical Zerologon Vulnerability in The Windows Server
Microsoft Patchs the new critical vulnerability in Zerologon, A feature of Netlogon allows the domain controller to authenticate computers and...
-
How to Become a Certified Cyber Threat Intelligent Analyst?
Nowadays, Cyber crimes are increasing. The demand for cyber thteat intelligence experts is high. The field of cyber Intelligence is growing and...
-
Top 8 Best Web Security and Hacking Software for Security Professionals in 2020
Hacking software is not only used by hackers for criminal activities but it’s equally used by white hat hackers and security professionals to...
-
Wireshark 3.2.7 Released With Fix for Security Vulnerabilities & New Features
Wireshark 3.2.7 was released with a fix for security vulnerabilities and an updated version of Npcap & Qt. Wireshark is known as the world’s...
-
5G Technology and How It Will Change Cybersecurity
5G also called the fifth generation of wireless cellular networks, will offer new opportunities to all walks of life, including health, supply...
-
Instagram Hacked – Critical Vulnerability Let Attackers Take Complete Control over Account
A critical security vulnerability with the Instagram app lets attackers take over the victim’s Instagram account and can change their phone as a...
-
Shopify Data Breach – Two Rogue Employees Stole Customer Data
The Online e-commerce platform Shopify announced a data breach after two of their rogue employees of the support team engaged in accessing the...
-
The Importance of Cybersecurity in The Post-COVID-19 World
Many organizations woke up to the importance of cybersecurity when the COVID-19 pandemic struck and shone a harsh light on the state of...