Category: GBHackers

Hackers Exploit Browser-in-the-Browser Trick to Hijack Facebook Accounts
13
Jan
2026

Hackers Exploit Browser-in-the-Browser Trick to Hijack Facebook Accounts

Facebook’s massive 3 billion active users make it an attractive target for sophisticated phishing campaigns. As attackers grow more inventive,…

Important Consideration To Prevent Insider Cyber Security Threats
13
Jan
2026

Important Consideration To Prevent Insider Cyber Security Threats

Insider threats are very real and make up the majority of cybersecurity attacks on enterprises. Yet, many businesses still spend…

AsyncRAT and the Misuse of Cloudflare Free-Tier Infrastructure: Detection and Analysis
13
Jan
2026

AsyncRAT and the Misuse of Cloudflare Free-Tier Infrastructure: Detection and Analysis

Cybersecurity researchers have uncovered a sophisticated AsyncRAT campaign exploiting Cloudflare’s free-tier services and TryCloudflare tunneling domains to evade detection while…

CISA Alerts on Actively Exploited Gogs Path Traversal Flaw
13
Jan
2026

CISA Alerts on Actively Exploited Gogs Path Traversal Flaw

The Cybersecurity and Infrastructure Security Agency (CISA) has added a critical vulnerability in Gogs, a self-hosted Git service, to its…

PoC Released for Atarim Plugin Auth Bypass Vulnerability
12
Jan
2026

PoC Released for Atarim Plugin Auth Bypass Vulnerability

A security researcher has published proof-of-concept code for a critical authentication bypass vulnerability in the Atarim WordPress plugin that could…

Criminal Networks Get a Boost from New Pig-Butchering-as-a-Service Toolkits
12
Jan
2026

Criminal Networks Get a Boost from New Pig-Butchering-as-a-Service Toolkits

The scam industry has undergone massive transformations over the past decade. The cliché image of the once-iconic Nigerian prince duping…

Google Integrates Gemini Into Gmail, Rolling Out New Capabilities
12
Jan
2026

Google Integrates Gemini Into Gmail, Rolling Out New Capabilities

Google has announced a major upgrade to Gmail, bringing its advanced Gemini AI directly into the email platform. The integration…

India Remains Top Target for Mobile Attacks as Threats Surge 38%
12
Jan
2026

India Remains Top Target for Mobile Attacks as Threats Surge 38%

New Delhi, January 12, 2026 – India has emerged as the world’s top target for mobile attacks yet again, recording…

Instagram Confirms No System Breach After External Password Reset Problem
12
Jan
2026

Instagram Confirms No System Breach After External Password Reset Problem

Instagram has dismissed security breach concerns, clarifying that recent unexpected password reset emails were caused by an external party exploiting…

Web3 Dev Environments Hit by Fake Interview Software Scam
12
Jan
2026

Web3 Dev Environments Hit by Fake Interview Software Scam

Web3 and cryptocurrency developers are facing a new wave of targeted attacks driven not by cold outreach, but by carefully…

Critical zlib Flaw Let Attackers Can Trigger a Buffer Overflow via untgz
12
Jan
2026

Critical zlib Flaw Let Attackers Can Trigger a Buffer Overflow via untgz

A severe buffer overflow vulnerability has been discovered in the zlib untgz utility, affecting version 1.3.1.2, allowing attackers to trigger…

Critical React Router Flaws Could Let Attackers Access or Modify Server Files
12
Jan
2026

Critical React Router Flaws Could Let Attackers Access or Modify Server Files

A critical vulnerability has been discovered in React Router and Remix that could allow attackers to access or modify sensitive files on…