Category: GBHackers

BeyondTrust RCE Vulnerability Under Active Exploitation – Urgent Patch Released
13
Feb
2026

BeyondTrust RCE Vulnerability Under Active Exploitation – Urgent Patch Released

BeyondTrust has urgently released security updates to address a critical remote code execution (RCE) vulnerability affecting its widely used Remote…

HPE Aruba Flaw Exposes Networking Devices to Privilege Escalation and DoS Attacks
12
Feb
2026

HPE Aruba Flaw Exposes Networking Devices to Privilege Escalation and DoS Attacks

HPE Aruba Networking has issued a critical security advisory addressing multiple vulnerabilities in its Private 5G Core Platform that could…

$44 Evilmouse Malware Grants Attackers Full Control of Systems Upon Connection
12
Feb
2026

$44 Evilmouse Malware Grants Attackers Full Control of Systems Upon Connection

A new hardware-based threat has emerged that disguises malicious code execution capabilities inside an ordinary computer mouse. Dubbed “EvilMouse,” this…

DragonForce Ransomware Group Targets 363 Companies, Expands Cartel-Like Operations Since 2023
12
Feb
2026

DragonForce Ransomware Group Targets 363 Companies, Expands Cartel-Like Operations Since 2023

DragonForce is a ransomware group that has rapidly evolved into a cartel-style operation, extending its reach across the cybercrime ecosystem…

287 Malicious Chrome Extensions Steal Browsing Data from 37.4 Million Users
12
Feb
2026

287 Malicious Chrome Extensions Steal Browsing Data from 37.4 Million Users

A new security investigation has uncovered 287 Chrome extensions that appear to secretly send users’ browsing data to remote servers, impacting an…

ORB Networks Leverages Compromised IoT Devices and SOHO Routers to Mask Cyberattacks
12
Feb
2026

ORB Networks Leverages Compromised IoT Devices and SOHO Routers to Mask Cyberattacks

Operational Relay Box (ORB) networks are covert, mesh-based infrastructures used by advanced threat actors to hide the true origin of…

SSH Worm Exploit Detected by DShield Sensor Using Credential Stuffing and Multi-Stage Malware
12
Feb
2026

SSH Worm Exploit Detected by DShield Sensor Using Credential Stuffing and Multi-Stage Malware

A DShield honeypot sensor recently recorded a complete compromise sequence involving a self-replicating SSH worm that exploits weak passwords to…

Feiniu NAS Devices Hit in Massive Netdragon Botnet Attack Exploiting Unpatched Vulnerabilities
12
Feb
2026

Feiniu NAS Devices Hit in Massive Netdragon Botnet Attack Exploiting Unpatched Vulnerabilities

Feiniu fnOS network-attached storage (NAS) devices have been pulled into a large Netdragon botnet after attackers exploited still-unpatched vulnerabilities, turning…

Rogue VM Linked to Muddled Libra in VMware vSphere Attack, Exposing Critical TTPs
12
Feb
2026

Rogue VM Linked to Muddled Libra in VMware vSphere Attack, Exposing Critical TTPs

The cybercrime group Muddled Libra (aka Scattered Spider, UNC3944). The contents of this rogue VM and activity from the attack…

Lazarus Group's 'Graphalgo' Fake Recruiter Campaign Targets GitHub, npm, and PyPI to Spread Malware
12
Feb
2026

Lazarus Group’s ‘Graphalgo’ Fake Recruiter Campaign Targets GitHub, npm, and PyPI to Spread Malware

Lazarus Group’s latest software supply chain operation is using fake recruiter lures and popular open‑source ecosystems to deliver malware to…

WordPress Backup Plugin Vulnerability Exposes 800,000 Sites to Remote Code Execution Attacks
12
Feb
2026

WordPress Backup Plugin Vulnerability Exposes 800,000 Sites to Remote Code Execution Attacks

A critical vulnerability in the popular WPvivid Backup & Migration plugin is putting more than 800,000 WordPress websites at risk…

Chrome Security Update Released to Address Code Execution Vulnerabilities
12
Feb
2026

Chrome Security Update Released to Address Code Execution Vulnerabilities

Google has released Chrome 145 to the stable channel for Windows, Mac, and Linux systems, addressing 11 security vulnerabilities that…