Skip to content

MΔlware Junction

Cyber Security Blogs

  • Home
  • Data Breaches
  • Vulnerabilities
  • Malware Families
  • IoC
  • Tutorials
    • Malware Analysis
    • Reverse Engineering
  • About Us
  • Home
  • Giant Tiger data breach, leaking 2.8 million records online.
  • Page 2

Giant Tiger data breach, leaking 2.8 million records online.
Data Breaches

Giant Tiger data breach, leaking 2.8 million records online.

AdminApril 13, 2024May 14, 2024

In March 2024, Giant Tiger, a prominent Canadian retail chain, disclosed a significant data breach. Following this disclosure, a hacker…

Zero-Day Unauthenticated Remote Code Execution Vulnerability in GlobalProtect (CVE-2024-3400)
Vulnerabilities

Zero-Day Unauthenticated Remote Code Execution Vulnerability in GlobalProtect (CVE-2024-3400)

AdminApril 13, 2024April 15, 2024

On April 10, 2024, Volexity uncovered the zero-day exploitation of a vulnerability in Palo Alto Networks PAN-OS GlobalProtect feature at…

Posts navigation

Newer posts

Follow Us:

  • LinkedIn
  • Telegram
  • X

Recent Posts

  • What Are Rootkits? Types, Threats & Protection
  • New Malware Alert: TCESB Actively Exploiting ESET Security Scanner
  • A Deep Dive into Ransomware: Understanding Its Types and the Most Famous Attacks
  • Malware Explained: What It Is, How It Spreads, and the Different Types
  • BlankBot: A newly identified Android banking Trojan equipped with advanced features such as screen recording, keylogging, and remote control capabilities.

Recent Comments

  1. RandomNameKeync on Continuing Social Engineering Campaign Associated with Black Basta Ransomware Operators
  2. RandomNameKeync on What Are Rootkits? Types, Threats & Protection
  3. qozyfeFoext on What Are Rootkits? Types, Threats & Protection
  4. RandomNameKeync on Panamorfi: New Distributed Denial of Service (DDoS) campaign
  5. WalterHop on A Deep Dive into Ransomware: Understanding Its Types and the Most Famous Attacks

Archives

  • April 2025
  • August 2024
  • May 2024
  • April 2024

Categories

  • Attack
  • Data Breaches
  • Malware Families
  • Tutorials
  • Vulnerabilities

    Copyright © 2026 MΔlware Junction | Quick News by Ascendoor | Powered by WordPress.