Unit 42 researchers at Paloalto discovered a cryptocurrency mining botnet named “PGMiner”. It is a Linux based cryptocurrency botnet that exploits a...
Google Chrome, Firefox, Microsoft Edge, and Yandex have become the most recent targets of an ongoing malware campaign, called Adrozek, as disclosed by Microsoft. The...
Bangladesh and Vietnam based hackers were caught by Facebook recently for hacking into its users’ accounts and taking control of the pages....
The security firm Intezer revealed COVID-19 phishing lures that were used to deliver the Go version of Zebrocy. Zebrocy is mainly used against...
No, not the one that nibbles at your Thanksgiving leftovers. RAT, Remote Access Trojan, is a type of malware that enables attackers...
We, at GBhackers usually report instances where the bad guys have had the upper hand in cyber-security, but today we are glad...
Minecraft is a sandbox video game developed by Mojang. The first version of Minecraft was released earlier in 2009, but the game remains incredibly popular to...
Security analysts have found a new malware that infects mobile devices and subscribes the victims to premium subscription provided by telecom companies,...
Cisco, this week, published an advisory, CVE-2020-27130, stating that a vulnerability was identified and resolved in Cisco Security Manager that could allow...
TroubleGrabber, the latest in a line of credential stealers, spreads via Discord attachments and uses Discord webhooks to hand over stolen data...
A new Point-of-Sale (PoS) named ModPipe malware is targeting devices utilized by many thousands of organizations within the hospitality sector, researchers have...
Television is a mass medium for entertainment, advertising, news, and sports. In advent with the technology, inbuilt integration offered with apps like Netflix,...
A creative Office 365 phishing campaign was discovered by WMC Global Analysis researchers that a legitimate login page of a Microsoft Account,...
Maze ransomware, one of the most dangerous and potent strains of Windows ransomware that have hit companies and organizations around the world...
IT giant Oracle, on 1st November 2020, issued a Security Alert Advisory, CVE-2020-14750, regarding a remote code execution vulnerability on Oracle WebLogic...
“JM Bullion” company is one of the largest and most premier online retailers of precious metals like gold, silver, copper, platinum, and...
The ‘Firestarter’ malware is used by an APT threat group called “DoNot”. DoNot uses Firebase Cloud Messaging (FCM), a cross-platform cloud solution for...
A database of over 350 million customer records exposed from unsecured Elasticsearch cluster belonging to voice over-internet-protocol company Broadvoice. The database was...
The Cybersecurity research firm Cisco Talos has recently detected an activity that are linked with the cryptocurrency botnet. The experts claimed that...
Hackers compromised the Asian food delivery service Chowbus and stole customer information such as customer names, email addresses, phone numbers, and mailing...
Joker is one of the most prominent malware families that continuously target the Android devices, it’s main activity is to stimulate clicks...