Category: GBHackers

FortiOS and FortiSwitchManager Flaw Allows Remote Code Execution
14
Jan
2026

FortiOS and FortiSwitchManager Flaw Allows Remote Code Execution

A high heap-based buffer overflow vulnerability in the cw_acd daemon component of Fortinet’s FortiOS and FortiSwitchManager has been disclosed, enabling…

Microsoft January 2026 Patch Tuesday Fixes 114 Flaws, Including 3 Zero-Days
14
Jan
2026

Microsoft January 2026 Patch Tuesday Fixes 114 Flaws, Including 3 Zero-Days

CVE-2026-20822 Windows Graphics Component Elevation of Privilege Vulnerability Elevation of Privilege CVE-2026-20876 Windows Virtualization-Based Security (VBS) Enclave Elevation of Privilege…

SAP January 2026 Security Patch Day Fixes Critical Injection and RCE Flaws
14
Jan
2026

SAP January 2026 Security Patch Day Fixes Critical Injection and RCE Flaws

SAP released 17 new security notes on January 13, 2026, addressing vulnerabilities affecting widely deployed enterprise systems. The patch day…

Threat Actors Exploit RMM Tools Through Weaponized PDF Files
14
Jan
2026

Threat Actors Exploit RMM Tools Through Weaponized PDF Files

Threat actors are exploiting legitimate Remote Monitoring and Management (RMM) tools as part of a sophisticated campaign distributing weaponized PDF…

Hexaware Partners with AccuKnox for Cloud Security Services
14
Jan
2026

Hexaware Partners with AccuKnox for Cloud Security Services

Menlo Park, USA, January 13th, 2026, CyberNewsWire AccuKnox has entered into a partnership with Hexaware Technologies to expand its Zero Trust…

A Cloud-Native Malware Threat Targeting Linux Systems
14
Jan
2026

A Cloud-Native Malware Threat Targeting Linux Systems

A sophisticated Linux malware framework, VoidLink, has been identified by Check Point Research, representing a significant escalation in threats targeting…

Android Banking Malware deVixor Actively Targeting Users with Ransomware Capabilities.
13
Jan
2026

Android Banking Malware deVixor Actively Targeting Users with Ransomware Capabilities.

A sophisticated Android banking trojan known as deVixor has emerged as a significant threat to mobile users, combining financial data…

Outsmarting Jailbreak Attacks on Large Language Models
13
Jan
2026

Outsmarting Jailbreak Attacks on Large Language Models

Researchers from Shanghai Jiao Tong University, the University of Illinois at Urbana-Champaign, and Zhejiang University have unveiled HoneyTrap, a groundbreaking…

PowerShell-Driven Multi-Stage Windows Malware Using Text Payloads
13
Jan
2026

PowerShell-Driven Multi-Stage Windows Malware Using Text Payloads

Security researchers have identified a sophisticated multi-stage malware campaign dubbed SHADOW#REACTOR that chains together obfuscated Visual Basic Script (VBS) execution,…

5 Facts You Should Know About Cybersecurity
13
Jan
2026

5 Facts You Should Know About Cybersecurity

Are you fascinated by the world of cybersecurity? If so, then keep on reading. We are going to be listing…

Top 5 Best Cyber Attack Prevention Methods 2026
13
Jan
2026

Top 5 Best Cyber Attack Prevention Methods 2026

Cyber attack prevention for Small businesses very has to get serious about their cybersecurity. Hackers are now actively Performing Targeted…

Why Do We Need Best Antivirus Software For Android?
13
Jan
2026

Why Do We Need Best Antivirus Software For Android?

Best Antivirus Software provides high-level data protection for your Android device since it is the main targeted platform around the…