Category: GBHackers

Google Integrates Gemini Into Gmail, Rolling Out New Capabilities
12
Jan
2026

Google Integrates Gemini Into Gmail, Rolling Out New Capabilities

Google has announced a major upgrade to Gmail, bringing its advanced Gemini AI directly into the email platform. The integration…

India Remains Top Target for Mobile Attacks as Threats Surge 38%
12
Jan
2026

India Remains Top Target for Mobile Attacks as Threats Surge 38%

New Delhi, January 12, 2026 – India has emerged as the world’s top target for mobile attacks yet again, recording…

Instagram Confirms No System Breach After External Password Reset Problem
12
Jan
2026

Instagram Confirms No System Breach After External Password Reset Problem

Instagram has dismissed security breach concerns, clarifying that recent unexpected password reset emails were caused by an external party exploiting…

Web3 Dev Environments Hit by Fake Interview Software Scam
12
Jan
2026

Web3 Dev Environments Hit by Fake Interview Software Scam

Web3 and cryptocurrency developers are facing a new wave of targeted attacks driven not by cold outreach, but by carefully…

Critical zlib Flaw Let Attackers Can Trigger a Buffer Overflow via untgz
12
Jan
2026

Critical zlib Flaw Let Attackers Can Trigger a Buffer Overflow via untgz

A severe buffer overflow vulnerability has been discovered in the zlib untgz utility, affecting version 1.3.1.2, allowing attackers to trigger…

Critical React Router Flaws Could Let Attackers Access or Modify Server Files
12
Jan
2026

Critical React Router Flaws Could Let Attackers Access or Modify Server Files

A critical vulnerability has been discovered in React Router and Remix that could allow attackers to access or modify sensitive files on…

Critical Apache Struts 2 Flaw Could Let Attackers Steal Sensitive Data
12
Jan
2026

Critical Apache Struts 2 Flaw Could Let Attackers Steal Sensitive Data

A newly disclosed vulnerability in Apache Struts 2’s XWork component could expose sensitive data and open the door to denial‑of‑service…

Cybercriminal Crypto Transactions Surge to 2025 High
12
Jan
2026

Cybercriminal Crypto Transactions Surge to 2025 High

Illicit cryptocurrency transactions reached unprecedented levels in 2025 as nation-states weaponized digital assets to evade sanctions, transforming the cybercrime landscape…

Stealth Intrusions Aimed at Financial Data Exfiltration
12
Jan
2026

Stealth Intrusions Aimed at Financial Data Exfiltration

A sophisticated second-stage malware payload known as ValleyRAT_S2 has emerged as a critical threat to organizations across Chinese-speaking regions, including…

Hacking Group “Everest” Allegedly Claims Nissan Motor Breach
12
Jan
2026

Hacking Group “Everest” Allegedly Claims Nissan Motor Breach

The Everest hacking group has allegedly claimed responsibility for a major cyberattack on Nissan Motor Co., Ltd., one of Japan’s…

Fake Employee Performance Reports Deliver Guloader Malware
12
Jan
2026

Fake Employee Performance Reports Deliver Guloader Malware

Organizations are being warned about a new phishing campaign that weaponizes fake employee performance reports to deploy the Guloader malware…

Critical InputPlumber Flaw Enables UI Input Injection and Denial-of-Service
12
Jan
2026

Critical InputPlumber Flaw Enables UI Input Injection and Denial-of-Service

Security researchers have discovered critical vulnerabilities in InputPlumber, a Linux input device utility used in SteamOS, that could allow attackers…