GBHackers On Security - Latest News and Information
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Technology Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
GBHackers On Security

GBHackers On Security

Publication
0 followers

Security news site covering daily hacking news and cyberattack updates.

Recent Posts

NetSupport Manager 0-Day Vulnerabilities Enable Remote Code Execution
News•Jan 26, 2026

NetSupport Manager 0-Day Vulnerabilities Enable Remote Code Execution

Security researchers uncovered two critical 0‑day flaws—CVE‑2025‑34164 and CVE‑2025‑34165—in NetSupport Manager versions up to 14.10.4.0. The bugs reside in an undocumented broadcast feature and can be chained to achieve unauthenticated remote code execution by corrupting heap memory and reading stack data. Exploitation bypasses ASLR, leaks vtable pointers, and grants attackers shell access on any machine reachable on TCP port 5405. NetSupport released a corrective update in version 14.12.0000 on July 29 2025.

By GBHackers On Security
New Phishing Attack Exploits Vercel to Host and Deliver Remote Access Malware
News•Jan 26, 2026

New Phishing Attack Exploits Vercel to Host and Deliver Remote Access Malware

A sophisticated phishing campaign has been leveraging Vercel's *.vercel.app subdomains since November 2025 to deliver remote‑access malware. The attackers disguise malicious pages as invoice portals or document viewers, then conditionally serve a signed GoTo Resolve installer after fingerprinting the victim’s browser....

By GBHackers On Security
TrustAsia Pulls 143 Certificates Following Critical LiteSSL ACME Vulnerability
News•Jan 23, 2026

TrustAsia Pulls 143 Certificates Following Critical LiteSSL ACME Vulnerability

TrustAsia revoked 143 SSL/TLS certificates after uncovering a critical vulnerability in its LiteSSL ACME service. The flaw allowed domain‑validation data to be reused across different ACME accounts, enabling unauthorized issuance of wildcard certificates. The issue stemmed from a logic error...

By GBHackers On Security
NVIDIA CUDA Toolkit Flaw Allows Command Injection, Arbitrary Code Execution
News•Jan 22, 2026

NVIDIA CUDA Toolkit Flaw Allows Command Injection, Arbitrary Code Execution

NVIDIA released a patch on January 20 2026 for four critical vulnerabilities in its CUDA Toolkit, affecting Nsight Systems and Nsight Visual Studio tools. The flaws enable local command injection and arbitrary code execution through inadequate input validation and insecure DLL loading,...

By GBHackers On Security
BIND 9 Flaw Lets Attackers Crash Servers With Malicious DNS Records
News•Jan 22, 2026

BIND 9 Flaw Lets Attackers Crash Servers With Malicious DNS Records

A critical vulnerability identified as CVE‑2025‑13878 affects BIND 9 DNS servers, allowing remote attackers to crash the named process using malformed BRID or HHIT records. The flaw impacts several stable branches—9.18.40‑9.18.43, 9.20.13‑9.20.17, and 9.21.12‑9.21.16—and carries a CVSS v3.1 score of 7.5,...

By GBHackers On Security
PNB MetLife Phishing Attack: Multi-Stage Scheme Steals Data, Triggers UPI Payments
News•Jan 22, 2026

PNB MetLife Phishing Attack: Multi-Stage Scheme Steals Data, Triggers UPI Payments

A sophisticated multi‑stage phishing campaign is targeting PNB MetLife insurance customers through mobile‑optimized fake payment‑gateway pages hosted on free EdgeOne Pages. The first stage harvests personal details and forces fraudulent UPI payments using dynamically generated QR codes and clipboard manipulation. A...

By GBHackers On Security
JA3 Fingerprinting Tool Exposes Attackers’ Infrastructure
News•Jan 22, 2026

JA3 Fingerprinting Tool Exposes Attackers’ Infrastructure

JA3 fingerprinting, once considered outdated, is re‑emerging as a potent tool for tracking malicious infrastructure. By hashing TLS ClientHello parameters, JA3 creates a stable identifier that persists across malware variants. Recent threat‑intel investigations linked specific JA3 hashes to Remcos RAT,...

By GBHackers On Security
New ClickFix Campaign Exploits Fake Verification Pages to Hijack Facebook Sessions
News•Jan 22, 2026

New ClickFix Campaign Exploits Fake Verification Pages to Hijack Facebook Sessions

A new ClickFix campaign is hijacking Facebook accounts by luring users into fake verification and appeal pages that instruct them to extract live session tokens (c_user and xs) from their browsers. The operation spans 115 phishing pages hosted on abuse‑friendly...

By GBHackers On Security
Malicious PyPI Package Impersonates Sympy-Dev, Targeting Millions of Users
News•Jan 22, 2026

Malicious PyPI Package Impersonates Sympy-Dev, Targeting Millions of Users

A malicious PyPI package named sympy-dev impersonates the popular SymPy library, using typosquatting to lure developers into installing it. Four versions (1.2.3‑1.2.6) were released on Jan 17 2026 and amassed over 1,000 downloads within the first day. The package embeds a memory‑only...

By GBHackers On Security
ClearFake Malware Exploits Proxy Execution to Run Malicious PowerShell Commands via Trusted Windows Feature
News•Jan 22, 2026

ClearFake Malware Exploits Proxy Execution to Run Malicious PowerShell Commands via Trusted Windows Feature

ClearFake, a JavaScript‑based malware distribution framework, has upgraded its evasion tactics by abusing the legitimate Windows script SyncAppvPublishingServer.vbs to execute hidden PowerShell commands via proxy execution. The campaign retrieves multi‑stage payloads from smart contracts on the BNB Smart Chain testnet,...

By GBHackers On Security
ErrTraffic Exploits Visual Page Breaks to Fuel ClickFix Attacks, Rebranding Exploits as “GlitchFix”
News•Jan 21, 2026

ErrTraffic Exploits Visual Page Breaks to Fuel ClickFix Attacks, Rebranding Exploits as “GlitchFix”

ErrTraffic is a traffic‑distribution system that powers ClickFix social‑engineering attacks by deliberately corrupting website visuals—a technique dubbed “GlitchFix.” When a victim visits a compromised page, the script distorts text, CSS and cursor movement before presenting a fake update prompt that...

By GBHackers On Security
Magecart Hack Injects JavaScript to Steal Online Payment Data
News•Jan 21, 2026

Magecart Hack Injects JavaScript to Steal Online Payment Data

Security researchers have uncovered a new Magecart‑style campaign that injects obfuscated JavaScript from cc-analytics.com/app.js into e‑commerce checkout pages. The script captures credit‑card numbers and billing details, then exfiltrates them to attacker‑controlled servers at pstatics.com via XMLHttpRequest POSTs. Infrastructure analysis reveals...

By GBHackers On Security
Threat Actors Exploit LinkedIn for RAT Delivery in Enterprise Networks
News•Jan 21, 2026

Threat Actors Exploit LinkedIn for RAT Delivery in Enterprise Networks

A new phishing campaign is using LinkedIn private messages to deliver remote access trojans to enterprise networks. Attackers send self‑extracting WinRAR archives that contain a legitimate PDF reader, a malicious DLL, and a portable Python interpreter. The DLL is loaded...

By GBHackers On Security
Apache Airflow Flaws Expose Sensitive Workflow Data to Potential Attackers
News•Jan 20, 2026

Apache Airflow Flaws Expose Sensitive Workflow Data to Potential Attackers

Apache Airflow released version 3.1.6 to fix two credential‑exposure flaws (CVE‑2025‑68675 and CVE‑2025‑68438). The first flaw logged proxy URLs with embedded usernames and passwords, while the second allowed unmasked API keys and tokens in the Rendered Templates UI. Both issues affect...

By GBHackers On Security
OPNsense 25.7.11 Enhances Network Visibility With Host Discovery Feature
News•Jan 20, 2026

OPNsense 25.7.11 Enhances Network Visibility With Host Discovery Feature

OPNsense 25.7.11 introduces a native host discovery service that automatically resolves and stores MAC addresses for IPv4 and IPv6 hosts. The feature feeds live data to MAC‑based firewall aliases and captive‑portal client tracking, improving policy accuracy and device visibility. IPv6...

By GBHackers On Security
TP-Link Router Flaw Enables Authentication Bypass Through Password Recovery Mechanism
News•Jan 20, 2026

TP-Link Router Flaw Enables Authentication Bypass Through Password Recovery Mechanism

TP‑Link disclosed a high‑severity authentication bypass (CVE‑2026‑0629) affecting its VIGI security‑camera line. The flaw exploits the password‑recovery feature, allowing any LAN‑connected attacker to reset admin credentials without verification. With a CVSS v4.0 score of 8.7, the vulnerability grants full control over...

By GBHackers On Security
Discord Exploited to Spread Clipboard Hijacker Stealing Cryptocurrency Funds
News•Jan 20, 2026

Discord Exploited to Spread Clipboard Hijacker Stealing Cryptocurrency Funds

Security firm CloudSEK’s STRIKE team uncovered a new cryptocurrency‑theft campaign that leverages Discord communities to distribute a clipboard‑hijacking trojan dubbed Pro.exe. The malware, attributed to the RedLineCyber group, monitors Windows clipboard for wallet addresses and silently replaces them with attacker‑controlled...

By GBHackers On Security
Cloudflare Zero-Day Flaw Allows Attackers to Bypass Security and Access Any Host
News•Jan 20, 2026

Cloudflare Zero-Day Flaw Allows Attackers to Bypass Security and Access Any Host

A critical zero‑day in Cloudflare’s Web Application Firewall allowed attackers to bypass all WAF rules by targeting the ACME certificate‑validation path. Researchers from FearsOff demonstrated that arbitrary requests to /.well-known/acme-challenge/ could reach origin servers, exposing sensitive endpoints in Spring Boot,...

By GBHackers On Security
Visual Studio Code Abused in Sophisticated Multistage Malware Attacks
News•Jan 19, 2026

Visual Studio Code Abused in Sophisticated Multistage Malware Attacks

A new campaign dubbed Evelyn Stealer leverages compromised Visual Studio Code extensions, such as the Bitcoin Black theme and Codo AI assistant, to deliver a multi‑stage malware chain. The first‑stage payload uses DLL hijacking of the Lightshot utility to execute PowerShell scripts that...

By GBHackers On Security
Cybercriminals Impersonate Malwarebytes to Steal User Credentials
News•Jan 19, 2026

Cybercriminals Impersonate Malwarebytes to Steal User Credentials

A short‑lived campaign from January 11‑15 2026 masqueraded as Malwarebytes installers to deliver infostealers. Attackers distributed ZIP archives named like “malwarebytes‑windows‑github‑io‑X.X.X.zip” that contain a legitimate EXE loader, a malicious CoreMessaging.dll, and a benign‑looking TXT pivot file. The DLL is sideloaded, granting code...

By GBHackers On Security
Attackers Rerouted Employee Pay Without Breaching IT Systems
News•Jan 19, 2026

Attackers Rerouted Employee Pay Without Breaching IT Systems

An attacker bypassed technical defenses by socially engineering help‑desk staff to reset passwords and re‑enroll MFA, gaining legitimate access to payroll accounts. Using the compromised credentials, the fraudster altered direct‑deposit details and diverted salaries from three employees without triggering alerts....

By GBHackers On Security
PDFSIDER Malware Actively Exploited to Evade Antivirus and EDR Defenses
News•Jan 19, 2026

PDFSIDER Malware Actively Exploited to Evade Antivirus and EDR Defenses

Researchers have uncovered PDFSIDER, a backdoor malware that exploits DLL side‑loading in the legitimate PDF24 Creator application to evade endpoint detection and response tools. The malicious payload is delivered via spear‑phishing ZIP archives, signed with valid certificates, and replaces the...

By GBHackers On Security
Argus: Python-Based Recon Toolkit Aims to Boost Security Intelligence
News•Jan 19, 2026

Argus: Python-Based Recon Toolkit Aims to Boost Security Intelligence

Argus v2.0, a Python‑based reconnaissance toolkit, launches with 135 specialized modules unified under a professional command‑line interface. The overhaul adds multi‑threaded execution, over 25 CLI commands, and four deployment options—including pip, Docker, script, and direct Python. It integrates major threat‑intelligence...

By GBHackers On Security
Researchers Hijack Hacker Domain Using Name Server Delegation
News•Jan 19, 2026

Researchers Hijack Hacker Domain Using Name Server Delegation

Infoblox researchers exploited a DNS misconfiguration called lame nameserver delegation to seize control of abandoned hacker domains. Within hours they intercepted over 57 million push‑notification logs from roughly 120 misconfigured domains, capturing traffic at 30 MB per second. The data exposed a...

By GBHackers On Security
Threat Actors Abuse Browser Extensions to Deliver Fake Warning Messages
News•Jan 19, 2026

Threat Actors Abuse Browser Extensions to Deliver Fake Warning Messages

Huntress researchers uncovered a malicious Chrome extension, NexShield, that masquerades as the legitimate uBlock Origin Lite ad blocker. The extension installs a delayed denial‑of‑service loop, then displays a fake crash warning that tricks users into running a PowerShell command which...

By GBHackers On Security
How Security Teams Use IP Location and DNS History In Cybercrime Investigation
News•Jan 18, 2026

How Security Teams Use IP Location and DNS History In Cybercrime Investigation

Security teams start cybercrime investigations with a single alert—often a suspicious IP or login—and quickly need context beyond raw logs. By enriching that alert with IP location data and DNS history, analysts can identify geographic anomalies, hosting providers, and past...

By GBHackers On Security
Critical XSS Vulnerabilities in Meta Conversion API Enable Zero-Click Account Takeover
News•Jan 17, 2026

Critical XSS Vulnerabilities in Meta Conversion API Enable Zero-Click Account Takeover

Security researchers identified two critical cross‑site scripting flaws in Meta’s Conversions API Gateway that enable zero‑click Facebook account takeover. The client‑side XSS stems from improper postMessage origin validation, while a stored XSS arises from unsafe string concatenation in the backend...

By GBHackers On Security
Best Security Awareness Training Platforms For 2026
News•Jan 17, 2026

Best Security Awareness Training Platforms For 2026

The 2026 roundup identifies the ten leading security awareness training platforms, highlighting AI‑driven phishing simulations, micro‑learning, gamification, and comprehensive compliance reporting. Solutions such as KnowBe4, Proofpoint, and Cofense demonstrate measurable risk reductions, with industry benchmarks showing up to an 80%...

By GBHackers On Security
Promptware Kill Chain – Five-Step Kill Chain Model For Analyzing Cyberthreats
News•Jan 15, 2026

Promptware Kill Chain – Five-Step Kill Chain Model For Analyzing Cyberthreats

The Promptware Kill Chain introduces a five‑step framework that treats malicious prompts and poisoned content as a distinct class of AI malware. It maps the lifecycle of attacks on large language model applications from initial access through privilege escalation, persistence,...

By GBHackers On Security
GoLogin vs MultiLogin vs VMLogin – What’s the Anti-Detect Browsers Difference?
News•Jan 15, 2026

GoLogin vs MultiLogin vs VMLogin – What’s the Anti-Detect Browsers Difference?

Anti-detect browsers let users conceal fingerprints and manage multiple online identities. The article compares three leading solutions—GoLogin, MultiLogin, and VMLogin—detailing their core features, user bases, and pricing models. GoLogin distinguishes itself with cloud‑based profile storage, multilingual support, and a seven‑day...

By GBHackers On Security
Spring CLI Vulnerability Allows Attackers to Execute Commands on User Systems
News•Jan 14, 2026

Spring CLI Vulnerability Allows Attackers to Execute Commands on User Systems

A command‑injection flaw (CVE‑2026‑22718) has been discovered in the Spring CLI VS Code extension, affecting all versions up to 0.9.0. The vulnerability allows an attacker with local access to execute arbitrary commands, earning a medium severity rating and a CVSS score...

By GBHackers On Security
Multiple Elastic Vulnerabilities Could Lead to File Theft and DoS
News•Jan 14, 2026

Multiple Elastic Vulnerabilities Could Lead to File Theft and DoS

Elastic has issued urgent patches for four critical Kibana vulnerabilities spanning versions 7.x through 9.2.3. The most severe, CVE‑2026‑0532, combines SSRF and file disclosure, allowing authenticated attackers to exfiltrate credentials. Three medium‑severity flaws can cause denial‑of‑service through resource exhaustion in...

By GBHackers On Security
PowerShell-Driven Multi-Stage Windows Malware Using Text Payloads
News•Jan 13, 2026

PowerShell-Driven Multi-Stage Windows Malware Using Text Payloads

Researchers have uncovered the SHADOW#REACTOR campaign, a multi‑stage Windows malware chain that starts with an obfuscated VBS script and escalates through a PowerShell stager, text‑only payloads, and a .NET Reactor‑protected loader. The loader reflectively injects a Remcos RAT payload entirely...

By GBHackers On Security
HoneyTrap: Outsmarting Jailbreak Attacks on Large Language Models
News•Jan 13, 2026

HoneyTrap: Outsmarting Jailbreak Attacks on Large Language Models

Researchers from Shanghai Jiao Tong University, UIUC and Zhejiang University introduced HoneyTrap, a deceptive‑defense framework that counters multi‑turn jailbreak attacks on large language models. The system employs four specialized defensive agents to mislead attackers, prolong interactions, and drain computational resources...

By GBHackers On Security
Android Banking Malware deVixor Actively Targeting Users with Ransomware Capabilities.
News•Jan 13, 2026

Android Banking Malware deVixor Actively Targeting Users with Ransomware Capabilities.

Android banking trojan deVixor, active since October 2025, is distributing through counterfeit automotive‑sale websites targeting Iranian users. The malware harvests SMS OTPs, banking credentials, and cryptocurrency exchange data, and can remotely lock devices with a ransomware command demanding 50 TRX. Its...

By GBHackers On Security
Threat Actors Exploit RMM Tools Through Weaponized PDF Files
News•Jan 13, 2026

Threat Actors Exploit RMM Tools Through Weaponized PDF Files

Threat actors are leveraging weaponized PDF attachments to install legitimate Remote Monitoring and Management (RMM) tools such as Syncro, SuperOps, NinjaOne, and ScreenConnect. The campaign, uncovered by ASEC, began with deceptive PDFs that display error messages or images, prompting users...

By GBHackers On Security
SAP January 2026 Security Patch Day Fixes Critical Injection and RCE Flaws
News•Jan 13, 2026

SAP January 2026 Security Patch Day Fixes Critical Injection and RCE Flaws

On January 13, 2026 SAP issued its monthly Security Patch Day, releasing 17 security notes that address 15 vulnerabilities across its product portfolio. Four critical‑severity flaws—CVE‑2026‑0501 (SQL injection in S/4HANA General Ledger), CVE‑2026‑0500 (remote code execution in Wily Introscope), and...

By GBHackers On Security
DPRK Hackers Earn $600M Posing as Remote Workers
News•Jan 13, 2026

DPRK Hackers Earn $600M Posing as Remote Workers

North Korean state‑sponsored hackers are masquerading as remote IT workers, generating up to $600 million annually for the regime. They infiltrate Western firms by securing legitimate remote positions or creating fake front‑company job postings, then use living‑off‑the‑land techniques to embed persistent...

By GBHackers On Security
Top 5 Best Free VPN for 2026 to Protect Your Anonymity on the Internet
News•Jan 13, 2026

Top 5 Best Free VPN for 2026 to Protect Your Anonymity on the Internet

The article lists the top five free VPN services projected for 2026, emphasizing their ability to safeguard anonymity during activities like torrenting. It highlights common pitfalls of free VPNs, such as data leaks, bandwidth limits, and ad injection. Each recommended...

By GBHackers On Security
Top 5 Best Cyber Attack Prevention Methods for Small Businesses With Breach & Attack Simulation
News•Jan 13, 2026

Top 5 Best Cyber Attack Prevention Methods for Small Businesses With Breach & Attack Simulation

Hackers now target small businesses, accounting for 43% of attacks, making cyber‑attack prevention a critical priority. Affordable cloud‑based antimalware and firewall services, along with Breach and Attack Simulation (BAS) platforms like Cymulate, give SMBs enterprise‑level protection. The article outlines five...

By GBHackers On Security
Malicious Chrome Extension Steals Wallet Credentials, Enables Automated Trading Abuse
News•Jan 13, 2026

Malicious Chrome Extension Steals Wallet Credentials, Enables Automated Trading Abuse

Socket’s Threat Research Team uncovered a malicious Chrome extension, MEXC API Automator, that silently creates MEXC exchange API keys with withdrawal permissions. The extension exfiltrates the keys to a hard‑coded Telegram bot, enabling attackers to programmatically trade and drain wallets....

By GBHackers On Security

Page 3 of 4

← Prev1234Next →