Category: GBHackers

TeamPCP Turns Cloud Misconfigurations Into a Self-Propagating Cybercrime Platform
10
Feb
2026

TeamPCP Turns Cloud Misconfigurations Into a Self-Propagating Cybercrime Platform

TeamPCP, operating under aliases including PCPcat, ShellForce, and DeadCatx3, emerged in late 2025 as a cloud-native cybercrime operation that transforms…

SAP Security Patch Day Fixes Critical Code Injection Flaw in SAP CRM and S/4HANA
10
Feb
2026

SAP Security Patch Day Fixes Critical Code Injection Flaw in SAP CRM and S/4HANA

SAP said the February 10, 2026 Patch Day delivered fixes across multiple SAP products and urged customers to apply patches…

Hackers Weaponize 7-Zip Downloads to Turn Home PCs Into Proxy Nodes
10
Feb
2026

Hackers Weaponize 7-Zip Downloads to Turn Home PCs Into Proxy Nodes

A fake website impersonating the popular 7-Zip file archiver has been distributing malicious software that secretly converts infected computers into…

React2Shell Vulnerability Exploited in the Wild, Analysts Warn
10
Feb
2026

React2Shell Vulnerability Exploited in the Wild, Analysts Warn

React2Shell (CVE-2025-55182) is a critical, pre-auth remote code execution weakness in React Server Components that impacts multiple React versions used…

Socelars Malware Targets Windows Systems to Steal Sensitive Data
10
Feb
2026

Socelars Malware Targets Windows Systems to Steal Sensitive Data

Security researchers are tracking Socelars, an information-stealing Trojan aimed at Windows users that focuses on quietly harvesting browser-based access rather than…

UNC1069 Targets Financial Firms With New Tools and AI-Driven Social Engineering Attacks
10
Feb
2026

UNC1069 Targets Financial Firms With New Tools and AI-Driven Social Engineering Attacks

North Korean threat actor UNC1069 has escalated attacks against the cryptocurrency and decentralized finance (DeFi) sector using sophisticated AI-powered social…

VoidLink Linux C2 Uses LLM-Generated Malware with Kernel-Level Stealth
10
Feb
2026

VoidLink Linux C2 Uses LLM-Generated Malware with Kernel-Level Stealth

VoidLink represents a concerning evolution in malware development: a sophisticated Linux command-and-control framework that shows clear signs of being built with AI…

Windows Error Reporting Flaw Allows Attackers to Elevate Privileges
10
Feb
2026

Windows Error Reporting Flaw Allows Attackers to Elevate Privileges

A newly documented Windows vulnerability, CVE-2026-20817, impacts the Windows Error Reporting Service (WER) and enables local privilege escalation. The issue…

Attackers Weaponize Windows Shortcut Files to Deploy Global Group Ransomware
10
Feb
2026

Attackers Weaponize Windows Shortcut Files to Deploy Global Group Ransomware

A high-volume phishing campaign leveraging the Phorpiex botnet has been distributing GLOBAL GROUP ransomware through weaponized Windows shortcut files. The…

15,200 OpenClaw Control Panels Exposed Online with Full System Access
10
Feb
2026

15,200 OpenClaw Control Panels Exposed Online with Full System Access

A critical security oversight has left thousands of AI agents wide open to the public internet. 15,200 instances of the…

Fancy Bear Exploits Microsoft Zero-Day to Deploy Backdoors and Email Stealers
10
Feb
2026

Fancy Bear Exploits Microsoft Zero-Day to Deploy Backdoors and Email Stealers

Fancy Bear has launched a sophisticated campaign exploiting a critical zero-day vulnerability in Microsoft RTF files to target users across…

25 Million Users Affected as AI Chat Platform Leaks 300 Million Messages
10
Feb
2026

25 Million Users Affected as AI Chat Platform Leaks 300 Million Messages

“Chat & Ask AI,” a highly popular mobile application available on both Google Play and the Apple App Store, has…