GB Hacker
-
Google Rolls Out “Find My Device” Network for Android Users
Google has announced the global rollout of its revamped Find My Device network. This innovative feature is set to transform how Android...
-
Cloudflare Acquires Baselime to Enhance Serverless Performance
Cloudflare has announced its acquisition of Baselime, a pioneering observability platform designed to simplify the complexities of serverless...
-
Microsoft Two-Step Phishing Campaign Attack LinkedIn Users
The professional and personal online spheres are merging as social media platforms like Facebook, LinkedIn, and WhatsApp are now commonly used for...
-
AI Package Hallucination – Hackers Abusing ChatGPT, Gemini to Spread Malware
The research investigates the persistence and scale of AI package hallucination, a technique where LLMs recommend non-existent malicious packages....
-
Feds Patching Years-Old SS7 Vulnerability in Phone Networks
The FCC’s Public Safety and Homeland Security Bureau is seeking input on how communication service providers are securing SS7 and Diameter...
-
Hackers Claiming Breach of Five Eyes Intelligence Group (FVEY) Documents
A group of hackers has announced the release of sensitive documents purportedly belonging to the Five Eyes Intelligence Group (FVEY), a prominent...
-
Aembit Selected as Finalist for RSA Conference 2024 Innovation Sandbox Contest
The Leading Company for Securing Access Between Workloads Recognized for the Aembit Workload IAM Platform Aembit , the Workload Identity and...
-
New XZ Utils Backdoor Free Scanner to Detect Malicious Executables
A critical vulnerability has been discovered in XZ Utils , a widely used data compression tool across Unix-like operating systems, including...
-
Microsoft’s Exchange Server Hack: Key Rotation Flaw Triggers Breach
Storm-0558, a cyberespionage group affiliated with the People’s Republic of China, has reportedly compromised Microsoft Exchange mailboxes of 22...
-
Gesture Jacking – New Attack That Deceives Website Visitors
The Web Platform is incredibly powerful, but regrettably, malicious websites will do all in their capacity to misuse it. To prevent such...
-
Beware of New Mighty Stealer That Takes Webcam Pictures & Capture Cookies
A new menace has emerged that targets personal information with alarming precision. Dubbed the “Mighty Stealer,” this malicious software is...
-
Veracode Announces Acquisition of Longbow Security
Veracode, a leading provider in the cybersecurity space, has officially announced its acquisition of Longbow Security. This strategic move...