Pentesters have a hard time bypassing anti-viruses nowadays Since Antiviruses are evolving as we speak. We at www.gbhackers.com decided to put …
SSL/TLS Certificate Revocation is Broken Time for More Reliable Revocation Checking Mechanism
We are moving fast to the encrypted world and the usage of TLS certificates increased dramatically.Security researcher Scott Helme discovered …
Google chrome takes down extension for mining cryptocurrency
Leading internet browser, Google Chrome, has taken down a Chrome browser extension which was reported to be secretly mining cryptocurrency …
Trackmageddon – Location Tracking Services (GPS) Vulnerabilities Allow to Access Unauthorized GPS Location Data
Security researchers discovered multiple vulnerabilities dubbed “Trackmageddon” which affects GPS services and online location tracking devices. The vulnerabilities with GPS …
TOP 10 Cyber Attacks and Critical Vulnerabilities of 2017
The year 2017 experienced many sophisticated cyber attacks which have been made a huge impact on the organization as well …
phpMyAdmin CSRF Vulnerability Allows An Attacker to Deleting Records From Database
A new Critical CSRF Vulnerability discovered in widely used phpMyAdmin open source admin tool allows an attacker perform harmful database …
fsociety a Complete Hacking Tools pack that a Hacker Needs – Penetration Testing Framework
fsociety is a penetration testing framework consists of all penetration testing tools that a hacker needs. It includes all the …
Chrome Extension Caught Silently Mining CryptoCurrency without Users Knowledge
Cryptocurrency Miners are in the raise starting from last year, more than 500 million computers are mining cryptoCurrency in their …
Fashion Retailer FOREVER 21 confirms Payment Card details stolen in the Security Breach
FOREVER 21 suffered data breach, users at certain stores are affected by the incident. Now FOREVER 21 released some additional …
Web Application Penetration Testing Checklist – A Detailed Cheat Sheet
What is Web Application Penetration Testing? Web Application Pen testing is a method of identifying, analyzing and Report the vulnerabilities …