Category: GBHackers

DPRK IT Workers Use Stolen LinkedIn Identities to Secure Remote Employment
10
Feb
2026

DPRK IT Workers Use Stolen LinkedIn Identities to Secure Remote Employment

A new wave of identity fraud has hit the remote job market, with North Korean (DPRK) operatives adopting a sophisticated…

New RecoverIt Tool Abuses Windows Service Failure Recovery to Execute Malicious Payloads
10
Feb
2026

New RecoverIt Tool Abuses Windows Service Failure Recovery to Execute Malicious Payloads

A new offensive security tool named “RecoverIt” has been released, offering red teamers a stealthy method for lateral movement and…

Hackers Abuse ClawHub Skills to Evade VirusTotal via Social Engineering
10
Feb
2026

Hackers Abuse ClawHub Skills to Evade VirusTotal via Social Engineering

A new evolution in ClawHub skill-based attacks that effectively sidesteps recent security measures. Rather than embedding base64-encoded payloads directly in…

ScarCruft Exploits Trusted Cloud Services and OLE Documents to Deliver Malware
10
Feb
2026

ScarCruft Exploits Trusted Cloud Services and OLE Documents to Deliver Malware

The North Korean-backed advanced persistent threat (APT) group known as ScarCruft has significantly evolved its attack techniques. In a departure…

Active Exploitation of SolarWinds Web Help Desk RCE Used to Drop Custom Malware
10
Feb
2026

Active Exploitation of SolarWinds Web Help Desk RCE Used to Drop Custom Malware

Threat actors are actively exploiting critical vulnerabilities in SolarWinds Web Help Desk (WHD) to deploy custom malware and establish persistent…

Node.js LTX Stealer Emerges as New Threat to Login Credentials
10
Feb
2026

Node.js LTX Stealer Emerges as New Threat to Login Credentials

A new, sophisticated malware campaign dubbed “LTX Stealer.” This malware represents a shift in attacker techniques, utilizing legitimate software frameworks…

European Commission Mitigates Cyberattack Aimed at Employee Mobile Information
10
Feb
2026

European Commission Mitigates Cyberattack Aimed at Employee Mobile Information

The European Commission successfully contained a cyberattack targeting its mobile device management infrastructure on January 30, 2026. The incident, which…

Hackers Abuse Apple & PayPal Invoice Emails in DKIM Replay Attack Campaign
10
Feb
2026

Hackers Abuse Apple & PayPal Invoice Emails in DKIM Replay Attack Campaign

A sophisticated way to bypass email security by weaponizing legitimate messages from trusted companies like Apple and PayPal. These attacks,…

Criminal IP Adds Real-Time Threat Intelligence to IBM QRadar
10
Feb
2026

Criminal IP Adds Real-Time Threat Intelligence to IBM QRadar

Torrance, United States / California, February 9th, 2026, CyberNewswire Criminal IP (criminalip.io), the AI-powered threat intelligence and attack surface intelligence…

APT Hackers Abuse Trusted Edge Services to Stealthily Deploy Malware
09
Feb
2026

APT Hackers Abuse Trusted Edge Services to Stealthily Deploy Malware

APT activity across APAC is rising rapidly as geopolitical tensions continue to grow, and defenders are seeing more advanced tradecraft…

Vortex Werewolf Targets Organizations With Tor-Enabled RDP, SMB, SFTP, and SSH Backdoors
09
Feb
2026

Vortex Werewolf Targets Organizations With Tor-Enabled RDP, SMB, SFTP, and SSH Backdoors

A threat cluster tracked as “Vortex Werewolf” (also known as SkyCloak) has been observed targeting Russian government and defense organizations….

Critical Fortinet FortiClient EMS Vulnerability Allows Remote Code Execution
09
Feb
2026

Critical Fortinet FortiClient EMS Vulnerability Allows Remote Code Execution

A critical security vulnerability has been discovered in Fortinet’s FortiClient EMS (Endpoint Management Server), potentially exposing organizations to remote code…