Kategori: GBHackers
Siber Güvenlik ve Altyapı Güvenliği Ajansı (CISA), farklı ülkelerden NSA, FBI ve FYEY (Beş Göz) tarafından ortak yazılan bir rapor…
Business Email Compromise’ın kısaltması olan BEC, karmaşık bir siber suç biçimidir. Siber tehditler, hayatımızın neredeyse her yönünün dijitalleştiği bir dünyada…
Ölü İnek Kültü (cDc), 1980’lerin sonunda kurulan en eski ve en etkili bilgisayar korsanlığı gruplarından biridir. Bu grup bir zamanlar…
Gizemli Ekip Bangladeş olarak bilinen kötü şöhretli Hacktivistler grubu, PHPMyAdmin ve WordPress’in savunmasız sürümlerini kullanır. Açık kaynaklı yardımcı programlar aracılığıyla…
An unreported phishing campaign that disseminated a Python version of the NodeStealer has been found. NodeStealer gave threat actors the ability…
A critical remote code execution (RCE) vulnerability identified as CVE-2023-3519 has been the subject of several attacks, which have already compromised and…
Legitimate SSM agents can turn malicious when attackers with high-privilege access use it to carry out ongoing malicious activities on…
A website pretending to be Flipper Devices offers a free FlipperZero in exchange for completing an offer, but it merely…
HackerOne is a renowned cybersecurity company that offers bounty and penetration testing platforms to ethical hackers for the following activities:-…
The National Security Agency (NSA) has released best practices for configuring and hardening Cisco Firepower Threat Defense (FTD) which can…
LLMs are commonly trained on vast internet text data, often containing offensive content. To mitigate this, developers use “alignment” methods…
Threat actors targeting macOS have increased lately as there were several cases of macOS information stealer malware found in the…