Category: GBHackers

Attackers Leveraging telnetd Exploit for Root Privileges After PoC Goes Public
24
Jan
2026

Attackers Leveraging telnetd Exploit for Root Privileges After PoC Goes Public

The threat actors have begun actively exploiting a critical authentication bypass vulnerability in GNU InetUtils telnetd immediately after proof-of-concept code…

Researchers Uncover Multi-Stage AiTM Attack Using SharePoint to Bypass Security Controls
24
Jan
2026

Researchers Uncover Multi-Stage AiTM Attack Using SharePoint to Bypass Security Controls

Microsoft Defender researchers have exposed a sophisticated adversary-in-the-middle (AiTM) phishing campaign targeting energy sector organizations, leveraging SharePoint file-sharing services to…

Microsoft Shared BitLocker Recovery Keys with FBI to Unlock Encrypted Laptop Data
24
Jan
2026

Microsoft Shared BitLocker Recovery Keys with FBI to Unlock Encrypted Laptop Data

Microsoft has confirmed that it provided BitLocker encryption recovery keys to the FBI following a valid search warrant, marking the…

Microsoft Open-Sources winapp, a New CLI Tool for Streamlined Windows App Development
24
Jan
2026

Microsoft Open-Sources winapp, a New CLI Tool for Streamlined Windows App Development

Microsoft has announced the public preview of the Windows App Development CLI (winapp), a new open-source command-line tool designed to…

Microsoft Teams to Begin Sharing Employee Location with Employers Based on Wi-Fi Networks
24
Jan
2026

Microsoft Teams to Begin Sharing Employee Location with Employers Based on Wi-Fi Networks

Microsoft has confirmed a controversial new feature coming to Teams that will automatically reveal employee work locations by detecting which…

Top 10 World's Best Data Security Companies in 2026
24
Jan
2026

Top 10 World’s Best Data Security Companies in 2026

Best Data Security Companies In 2026, data has become the most valuable asset for businesses and the most targeted. With…

Microsoft Introduces Brand Impersonation Protection Warning for Teams Calls
24
Jan
2026

Microsoft Introduces Brand Impersonation Protection Warning for Teams Calls

Microsoft is launching a new security feature designed to protect Teams users from fraudulent external callers impersonating trusted organizations. The…

MacSync macOS Infostealer Exploits ClickFix-style Attack to Trick Users with Single Terminal Command
23
Jan
2026

MacSync macOS Infostealer Exploits ClickFix-style Attack to Trick Users with Single Terminal Command

A sophisticated macOS infostealer campaign that leverages deceptive ClickFix-style social engineering to distribute MacSync, a Malware-as-a-Service (MaaS) credential-stealing tool targeting cryptocurrency…

76 Zero-Day Vulnerabilities Exposed at Pwn2Own Automotive 2026 by Hackers
23
Jan
2026

76 Zero-Day Vulnerabilities Exposed at Pwn2Own Automotive 2026 by Hackers

The final day of Pwn2Own Automotive 2026 brought the world’s elite security researchers to the finish line with a spectacular…

Threat Actors Exploit LNK Files to Deploy MoonPeak Malware on Windows Systems
23
Jan
2026

Threat Actors Exploit LNK Files to Deploy MoonPeak Malware on Windows Systems

A sophisticated three-stage malware attack campaign against Windows users in South Korea using specially crafted LNK (shortcut) files. The attack…

Node.js Sets New Standard for HackerOne Reports, Demands Signal of 1.0 or Higher
23
Jan
2026

Node.js Sets New Standard for HackerOne Reports, Demands Signal of 1.0 or Higher

Node.js has implemented a new quality control measure on its HackerOne bug bounty program, requiring researchers to maintain a minimum…

CISA Updates KEV Catalog with 4 Critical Vulnerabilities Following Ongoing Exploits
23
Jan
2026

CISA Updates KEV Catalog with 4 Critical Vulnerabilities Following Ongoing Exploits

The Cybersecurity and Infrastructure Security Agency (CISA) has expanded its Known Exploited Vulnerabilities (KEV) Catalogue with four critical security flaws…