Category: GBHackers

APT36 Targets Indian Government Systems Using Malicious Windows LNK Files
01
Jan
2026

APT36 Targets Indian Government Systems Using Malicious Windows LNK Files

A sophisticated cyber-espionage operation attributed to APT36, also known as Transparent Tribe, has been identified targeting Indian governmental, academic, and…

Critical Apache StreamPipes Flaw Allows Attackers to Take Over Admin Accounts
01
Jan
2026

Critical Apache StreamPipes Flaw Allows Attackers to Take Over Admin Accounts

Apache StreamPipes has released an urgent security advisory addressing CVE-2025-47411, a critical privilege escalation vulnerability affecting versions 0.69.0 through 0.97.0….

Two U.S. Cybersecurity Professionals Plead Guilty to Acting as ALPHV/BlackCat Affiliates
01
Jan
2026

Two U.S. Cybersecurity Professionals Plead Guilty to Acting as ALPHV/BlackCat Affiliates

A federal district court in the Southern District of Florida accepted guilty pleas from two cybersecurity professionals who turned their…

Malicious Manipulation of LLMs for Scalable Vulnerability Exploitation
31
Dec
2025

Malicious Manipulation of LLMs for Scalable Vulnerability Exploitation

A groundbreaking study from researchers at the University of Luxembourg reveals a critical security paradigm shift: large language models (LLMs)…

DarkSpectre Malware Campaign Hits Chrome, Edge, and Firefox Users
31
Dec
2025

DarkSpectre Malware Campaign Hits Chrome, Edge, and Firefox Users

A sophisticated Chinese threat actor dubbed DarkSpectre has compromised 8.8 million users across Chrome, Edge, and Firefox through three distinct…

NeuroSploit v2 Launches as AI-Powered Penetration Testing Framework
31
Dec
2025

NeuroSploit v2 Launches as AI-Powered Penetration Testing Framework

NeuroSploit v2 is an advanced AI-powered penetration testing framework designed to automate and enhance offensive security operations. Leveraging cutting-edge large…

New Cybercrime Tool “ErrTraffic” Enables Automated ClickFix Attacks
31
Dec
2025

New Cybercrime Tool “ErrTraffic” Enables Automated ClickFix Attacks

The cybercriminal underground has entered a new phase of industrialization. Hudson Rock researchers have uncovered ErrTraffic v2, a sophisticated ClickFix-as-a-Service…

GlassWorm Malware Turns VS Code Extensions into an Attack Vector Against macOS
31
Dec
2025

GlassWorm Malware Turns VS Code Extensions into an Attack Vector Against macOS

GlassWorm has returned with a dangerous new evolution. The notorious self-propagating malware, which first surfaced in October as an invisible…

New Open-Source C2 Framework AdaptixC2 Debuts With Improved Stability and Speed
31
Dec
2025

New Open-Source C2 Framework AdaptixC2 Debuts With Improved Stability and Speed

The open-source community has received a major update with the release of AdaptixC2 Version 1.0. This new version brings significant…

New AI-Enhanced Crypter Promoted as Capable of Evading Windows Defender
31
Dec
2025

New AI-Enhanced Crypter Promoted as Capable of Evading Windows Defender

Cybersecurity researchers have spotted a new high-sophistication malware loader being advertised on dark web forums, marketed as a commercial solution…

Chinese Hackers Deploy Rootkit to Stealthily Mask ToneShell Malware
31
Dec
2025

Chinese Hackers Deploy Rootkit to Stealthily Mask ToneShell Malware

A sophisticated cyberespionage campaign leveraging kernel-mode rootkit technology has been discovered targeting government organizations across Southeast and East Asia, with…

Hackers Abuse Copilot Studio’s New Connected Agents Feature to Plant Backdoors
31
Dec
2025

Hackers Abuse Copilot Studio’s New Connected Agents Feature to Plant Backdoors

Microsoft’s latest innovation may have opened the door to sophisticated cyberattacks. At Build 2025, the company introduced “Connected Agents,” a…