Category: GBHackers

5 Best Free VPN Services 2026 (Updated)
13
Jan
2026

5 Best Free VPN Services 2026 (Updated)

If you are torrenting without the use of a VPN, you are inviting trouble for yourself. That being said, there…

ServiceNow Vulnerability Enables Privilege Escalation Without Authentication
13
Jan
2026

ServiceNow Vulnerability Enables Privilege Escalation Without Authentication

A critical privilege escalation vulnerability has been identified in ServiceNow’s AI Platform, posing significant risks to enterprise users worldwide. Tracked…

Hackers Remotely Took Control of an Apex Legends Player’s Inputs
13
Jan
2026

Hackers Remotely Took Control of an Apex Legends Player’s Inputs

A critical security vulnerability has emerged in Respawn Entertainment’s popular battle royale title, allowing threat actors to remotely manipulate player…

3 Best Android Apps to Help Students to Study Well
13
Jan
2026

3 Best Android Apps to Help Students to Study Well

For college students, it’s always difficult to keep all their lessons and homework well-organized as well as manage their time….

Multiple Hikvision Flaws Allow Device Disruption via Crafted Network Packets
13
Jan
2026

Multiple Hikvision Flaws Allow Device Disruption via Crafted Network Packets

Hikvision has disclosed two high buffer overflow vulnerabilities affecting its security devices that could allow network-based attackers to cause device…

DPRK Hackers Earn $600M Posing as Remote Workers
13
Jan
2026

DPRK Hackers Earn $600M Posing as Remote Workers

The landscape of corporate espionage has undergone a fundamental transformation. For decades, security teams focused their efforts on identifying disgruntled…

Hackers Exploit Browser-in-the-Browser Trick to Hijack Facebook Accounts
13
Jan
2026

Hackers Exploit Browser-in-the-Browser Trick to Hijack Facebook Accounts

Facebook’s massive 3 billion active users make it an attractive target for sophisticated phishing campaigns. As attackers grow more inventive,…

Important Consideration To Prevent Insider Cyber Security Threats
13
Jan
2026

Important Consideration To Prevent Insider Cyber Security Threats

Insider threats are very real and make up the majority of cybersecurity attacks on enterprises. Yet, many businesses still spend…

AsyncRAT and the Misuse of Cloudflare Free-Tier Infrastructure: Detection and Analysis
13
Jan
2026

AsyncRAT and the Misuse of Cloudflare Free-Tier Infrastructure: Detection and Analysis

Cybersecurity researchers have uncovered a sophisticated AsyncRAT campaign exploiting Cloudflare’s free-tier services and TryCloudflare tunneling domains to evade detection while…

CISA Alerts on Actively Exploited Gogs Path Traversal Flaw
13
Jan
2026

CISA Alerts on Actively Exploited Gogs Path Traversal Flaw

The Cybersecurity and Infrastructure Security Agency (CISA) has added a critical vulnerability in Gogs, a self-hosted Git service, to its…

PoC Released for Atarim Plugin Auth Bypass Vulnerability
12
Jan
2026

PoC Released for Atarim Plugin Auth Bypass Vulnerability

A security researcher has published proof-of-concept code for a critical authentication bypass vulnerability in the Atarim WordPress plugin that could…

Criminal Networks Get a Boost from New Pig-Butchering-as-a-Service Toolkits
12
Jan
2026

Criminal Networks Get a Boost from New Pig-Butchering-as-a-Service Toolkits

The scam industry has undergone massive transformations over the past decade. The cliché image of the once-iconic Nigerian prince duping…