Tag: GBHackers – Latest Cyber Security News | Hacker News

ChatGPT Can Be Used to Create Dangerous Polymorphic Malware

The cybersecurity experts at CyberArk have provided information on the mechanism by which the ChatGPT AI chatbot can produce a new strain of polymorphic malware. Polymorphic malware could be easily made using ChatGPT. With relatively little effort or expenditure on…

10 Best Free Firewall Software – 2023

In this article, we have done a depth analysis and listed your top 10 best Free Firewall software that provided extended security to protect your system from bad actors. Generally, every computer is connected to the internet and is susceptible…

Hackers Actively Exploiting Critical ManageEngine Vulnerability

Rapid7 is taking action in response to several instances of compromise caused by the exploitation of CVE-2022-47966, which is a pre-authentication remote code execution (RCE) vulnerability.  This vulnerability affects nearly 24 on-premise ManageEngine products, and it is a serious threat…

T-Mobile Hacked – Over 37 Million Customer Data Exposed

T-Mobile US, Inc. discovered that a malicious attacker was illegally accessing data through a single Application Programming Interface (“API”). The research revealed that the threat actors accessed information for about 37 million active postpaid and prepaid customer accounts using this API,…

Wireless Penetration Testing Checklist – A Detailed Cheat Sheet

Wireless Penetration testing actively examines the process of Information security Measures which is Placed in WiFi Networks and also analyses the Weakness, technical flows, and Critical wireless Vulnerabilities. The most important countermeasures we should focus on are Threat  Assessment, Data…

Most Important Network Penetration Testing Checklist

Network Penetration Testing determines vulnerabilities in the network posture by discovering Open ports, Troubleshooting live systems, services and grabbing system banners. The pen-testing helps administrator to close unused ports, additional services, Hide or Customize banners, Troubleshooting services and to calibrate firewall…

Protecting Your Cloud Environments With Zero Trust

When moving to a cloud infrastructure, businesses should be looking toward a Zero Trust strategy. This security model protects the cloud from the inside out using the principle of least privilege to grant secure access to any company resource. Eliminating…

Hackers Selling Telegram Insider Server Access on Dark Web Forums

SafetyDetectives’ cybersecurity researchers came across a dark web marketplace that claims to provide consumers with access to Telegram’s internal server for the price of $20,000. The seller claims that the price is non-negotiable and includes uninterrupted access to Telegram servers through…

Hackers Use Text-to-SQL Attacks to Break into Your Databases

Recently, a group of researchers successfully demonstrated a new type of attack that utilizes Text-to-SQL models in order to generate malicious code. The most astonishing thing about this malicious code is, it’s enough potential to obtain sensitive information and launch…

Top 10 Best Penetration Testing Companies & Services – 2023

Penetration Testing Companies are pillars when it comes to information security, nothing is more important than ensuring your systems and data are safe from unauthorized access, Many organizations have a flawed security culture, with employees motivated to protect their own…