Category: GBHackers

Cross-Platform Ransomware Now Targeting Windows, Linux, and ESXi Systems
16
Feb
2026

Cross-Platform Ransomware Now Targeting Windows, Linux, and ESXi Systems

LockBit’s new 5.0 version is actively attacking Windows, Linux, and ESXi systems, using a unified yet highly optimized ransomware framework…

Matryoshka Clickfix Variant Targets macOS Users, Deploys New Stealer Malware
16
Feb
2026

Matryoshka Clickfix Variant Targets macOS Users, Deploys New Stealer Malware

A new variant of the “ClickFix” social engineering campaign specifically targeting macOS users. Codenamed Matryoshka a reference to its multiple nested…

FileZen Flaw Allows Attackers to Execute Commands Remotely
16
Feb
2026

FileZen Flaw Allows Attackers to Execute Commands Remotely

A high-severity vulnerability in FileZen, a file transfer solution developed by Soliton Systems K.K., enables authenticated attackers to remotely execute…

CISA Issues Alert on ZLAN ICS Flaws Enabling Full Device Takeover
16
Feb
2026

CISA Issues Alert on ZLAN ICS Flaws Enabling Full Device Takeover

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical advisory regarding significant security flaws discovered in industrial networking…

Attackers Exploit Critical BeyondTrust Flaw to Seize Full Active Directory Control
16
Feb
2026

Attackers Exploit Critical BeyondTrust Flaw to Seize Full Active Directory Control

A critical vulnerability, CVE-2026-1731, affecting self-hosted BeyondTrust Remote Support and Privileged Remote Access deployments. This security flaw allows unauthenticated attackers…

Lotus Blossom Hackers Breach Official Notepad++ Hosting Infrastructure
16
Feb
2026

Lotus Blossom Hackers Breach Official Notepad++ Hosting Infrastructure

Between June and December 2025, a state-sponsored threat group known as Lotus Blossom quietly hijacked the official hosting infrastructure used…

REMnux v8 Linux Toolkit Released With AI-Powered Malware Analysis Capabilities
14
Feb
2026

REMnux v8 Linux Toolkit Released With AI-Powered Malware Analysis Capabilities

The landscape of malware analysis has taken a significant leap forward with the official release of REMnux v8. This popular…

CVE-2025-64712 in Unstructured.io Puts Amazon, Google, and Tech Giants at Risk of Remote Code Execution
13
Feb
2026

CVE-2025-64712 in Unstructured.io Puts Amazon, Google, and Tech Giants at Risk of Remote Code Execution

A newly disclosed critical flaw, CVE-2025-64712 (CVSS 9.8), in Unstructured.io’s “unstructured” ETL library could let attackers perform arbitrary file writes and potentially…

Phishing Campaigns Target Users with Fake Meeting Invites and Update Alerts via Zoom, Teams, and Google Meet
13
Feb
2026

Phishing Campaigns Target Users with Fake Meeting Invites and Update Alerts via Zoom, Teams, and Google Meet

An ongoing wave of phishing campaigns exploiting fake meeting invites from popular video conferencing platforms, including Zoom, Microsoft Teams, and…

Advanced Obfuscation and Rhysida Ransomware Ties Uncovered
13
Feb
2026

Advanced Obfuscation and Rhysida Ransomware Ties Uncovered

OysterLoader, also tracked as Broomstick and CleanUp, is a multi‑stage loader malware written in C++ and actively leveraged in campaigns…

Chrome Extensions Infect 500K Users to Hijack VKontakte Accounts
13
Feb
2026

Chrome Extensions Infect 500K Users to Hijack VKontakte Accounts

A long-running Chrome extension malware campaign has silently hijacked more than 500,000 VKontakte (VK) accounts, forcing users into attacker-controlled groups,…

Malicious Chrome AI Extensions Target 260,000 Users with Injected Iframes
13
Feb
2026

Malicious Chrome AI Extensions Target 260,000 Users with Injected Iframes

As AI tools like ChatGPT, Claude, Gemini, and Grok gain mainstream adoption, cybercriminals are weaponizing their popularity to distribute malicious…