GBHackers on Security
Press Release
ANY.RUN Upgrades Threat Intelligence to Identify Emerging Threats
ANY.RUN announced an upgrade to its Threat Intelligence Portal, enhancing its capabilities to identify and analyze emerging cyber threats. This upgrade underscores ANY.RUN's commitment...
Cisco
Cisco Nexus Vulnerability Let Hackers Execute Arbitrary Commands on Vulnerable Systems
A critical vulnerability has been discovered in Cisco's Nexus Dashboard Fabric Controller (NDFC), potentially allowing hackers to execute arbitrary commands on affected systems.This...
CVE/vulnerability
Hackers Now Exploit Ivanti Endpoint Manager Vulnerability to Launch Cyber Attacks
The Cybersecurity and Infrastructure Security Agency (CISA) has announced the addition of a new vulnerability to its Known Exploited Vulnerabilities Catalog.This vulnerability, CVE-2024-29824,...
Cyber Security News
Tor Browser 13.5.6 Released – What’s New!
The Tor Project has announced the release of Tor Browser 13.5.6, which is now available for download from its official website and distribution directory....
Press Release
Mario Duarte, Former Snowflake Cybersecurity Leader, Joins Aembit as CISO to Tackle Non-Human Identities
Aembit, the non-human IAM company, today announced the appointment of Mario Duarte as chief information security officer (CISO). Duarte, formerly head of security at...
Bluetooth
New Bluetooth Vulnerability Leak, Your Passcode to Hackers During Pairing
A recently discovered vulnerability in Bluetooth technology has raised significant security concerns.This flaw could allow hackers to intercept passcodes during the device pairing...
Cyber AI
GhostStrike – A Cyber Security Tool for Red Team to Evade Detection
The need for advanced tools that can effectively simulate real-world threats is paramount. Enter GhostStrike, a sophisticated cybersecurity tool explicitly designed for Red Team...
Cyber Security News
Google Workspace Announced New Password Policies, What is Changing
Google Workspace has announced new password policies that will impact how users and third-party apps access Google services.The changes, aimed at eliminating less...
Join our community of SUBSCRIBERS and be part of the conversation.
To subscribe, simply enter your email address on our website or click the subscribe button below. Don't worry, we respect your privacy and won't spam your inbox. Your information is safe with us.