Category: GBHackers

Fake Party Invites Lure Victims Into Installing Malicious Remote Access Tools
04
Feb
2026

Fake Party Invites Lure Victims Into Installing Malicious Remote Access Tools

A sophisticated social engineering campaign targeting Windows users across the UK, using fake event invitations to silently install ScreenConnect a…

Microsoft Takes Major Security Step by Disabling NTLM Authentication by Default
04
Feb
2026

Microsoft Takes Major Security Step by Disabling NTLM Authentication by Default

Microsoft is making a significant move to strengthen Windows security by phasing out NTLM (New Technology LAN Manager). This legacy…

ASUS Discontinues “File Shredder” Feature to Patch Critical Vulnerability
04
Feb
2026

ASUS Discontinues “File Shredder” Feature to Patch Critical Vulnerability

ASUS has discontinued the File Shredder feature in its Business Manager software following the discovery of a critical security vulnerability,…

PDFly Variant Uses Custom PyInstaller Tweaks to Obfuscate Payload, Thwarting Analysis
04
Feb
2026

PDFly Variant Uses Custom PyInstaller Tweaks to Obfuscate Payload, Thwarting Analysis

A new malware variant dubbed “PDFly” is abusing a heavily modified PyInstaller stub to hide its Python bytecode, forcing analysts…

Fake Compliance Emails Weaponize Word and PDF Attachments to Steal Sensitive Data
04
Feb
2026

Fake Compliance Emails Weaponize Word and PDF Attachments to Steal Sensitive Data

A newly observed phishing campaign is abusing fake “audit/compliance confirmation” emails to target macOS users and steal highly sensitive data….

Fake Dropbox Phishing Campaign Targets Users, Steals Login Credentials
04
Feb
2026

Fake Dropbox Phishing Campaign Targets Users, Steals Login Credentials

A sophisticated phishing campaign that uses a multi-stage approach to bypass email filtering and content-scanning systems. The attack exploits trusted…

Infostealer Attacks Hit macOS, Abusing Python and Trusted Platforms
04
Feb
2026

Infostealer Attacks Hit macOS, Abusing Python and Trusted Platforms

A sharp rise in campaigns targeting macOS users, while attackers also ramp up Python‑based stealers and abuse trusted platforms like…

GlassWorm Infiltrates VSX Extensions With 22,000+ Downloads to Target Developers
04
Feb
2026

GlassWorm Infiltrates VSX Extensions With 22,000+ Downloads to Target Developers

A new GlassWorm-linked supply chain attack abusing the Open VSX Registry, this time via a suspected compromise of a legitimate…

Notepad++ Attack Breakdown Reveals Sophisticated Malware and Actionable IoCs
03
Feb
2026

Notepad++ Attack Breakdown Reveals Sophisticated Malware and Actionable IoCs

A complex espionage campaign attributed to Chinese APT group Lotus Blossom, active since 2009. The investigation uncovered a sophisticated compromise…

Apache Syncope Vulnerability Allows Attackers to Hijack Active User Sessions
03
Feb
2026

Apache Syncope Vulnerability Allows Attackers to Hijack Active User Sessions

Apache Syncope, a popular open-source identity and access management platform, has disclosed a critical XML External Entity (XXE) vulnerability in…

Critical Flaws in KiloView Devices Enable Complete Admin Takeover
03
Feb
2026

Critical Flaws in KiloView Devices Enable Complete Admin Takeover

The Cybersecurity and Infrastructure Security Agency (CISA) has disclosed a critical vulnerability affecting multiple versions of KiloView Encoder Series devices,…

APT28 Exploits Active Microsoft Office Zero-Day to Deliver Malware
03
Feb
2026

APT28 Exploits Active Microsoft Office Zero-Day to Deliver Malware

The Russia-linked advanced persistent threat group APT28 has been observed actively exploiting a zero-day vulnerability in Microsoft Office to deliver…