Category: GBHackers – Latest Cyber Security News | Hacker News

Top 10 Best Linux Distributions In 2023

The Linux Distros is generally acknowledged as the third of the holy triplet of PC programs, simultaneously with Windows and macOS. Here we have provided you with a top 10 best Linux distros list 2023 for all professionals. Hence Linux…

Google’s New End-To-End Encryption for Gmail on the Web

On Friday, Google released a beta version of Client-side encryption (CSE) for Gmail. This newest service is only useful to organisations that can produce their own decryption keys because CSE is designed for organisational use. Google has now made “end-to-end…

Top 10 Best Malware Removal Tool 2023

Malware removal tool helps to remove the dangerous malware from your personal computer to protect from hackers and prevent future attacks. Today the most essential thing is to have security on your PC or laptop, as you never know when…

FortiOS SSL-VPN Bug Let Attackers Execute Arbitrary Code Remotely

A critical vulnerability in FortiOS SSL-VPN let attackers perform unauthenticated arbitrary code execution remotely, and this flaw has been tracked as CVE-2022-42475. This vulnerability resides in FortiOS sslvpnd and it could potentially be exploited by unauthenticated attackers to perform code…

Kali Linux 2022.4 Released – What’s New!!

Offensive Security released a new version of its Penetration testing distro Kali Linux 2022.4, with several new features, hacking Tools, Kali NetHunter pro versions, and desktop updates. Each year, Kali Linux versions have been regularly released with new features by the offensive…

Securing Kubernetes Deployments on AWS – Guide

Kubernetes Deployment on AWS Kubernetes is open-source software for deploying and managing containerized applications at scale. Kubernetes can manage clusters on Amazon EC2 instances, run containers on those instances, and perform deployment, maintenance, and scaling processes. Kubernetes lets you run…

A New Linux Flaw Lets Attackers Gain Full Root Privilege

The Threat Research Unit at Qualys’ has revealed how a new Linux flaw tracked as (CVE-2022-3328),  may be combined with two other, seemingly insignificant flaws to gain full root rights on a compromised system. The Linux snap-confine function, a SUID-root…

Hundreds of Amazon RDS Instances Leaking User’s Personal Data

Recently, the Mitiga Research Team found that hundreds of databases each month were exposed, with significant Personally Identifiable Information (PII) leakage. An analysis found that the reputable Amazon Relational Database Service is leaking PII through exposed Relational Database Service (RDS)…

Hundreds of Amazon RDS Instances Leaking User’s Personal Data

Recently, the Mitiga Research Team found that hundreds of databases each month were exposed, with significant Personally Identifiable Information (PII) leakage. An analysis found that the reputable Amazon Relational Database Service is leaking PII through exposed Relational Database Service (RDS)…