Category: GBHackers

New OAuth Attack Lets Hackers Bypass Microsoft Entra Authentication and Steal Keys
08
Jan
2026

New OAuth Attack Lets Hackers Bypass Microsoft Entra Authentication and Steal Keys

In a year-end tradition that has become all too familiar for cybersecurity defenders, researchers have uncovered a novel attack vector…

Cybercriminals Exploit VMware ESXi Vulnerabilities Using Zero-Day Toolset
08
Jan
2026

Cybercriminals Exploit VMware ESXi Vulnerabilities Using Zero-Day Toolset

Huntress security researchers have uncovered a sophisticated VMware ESXi exploitation campaign using a zero-day toolkit that remained undetected for over…

Global GoBruteforcer Botnet Campaign Threatens 50,000 Linux Servers
08
Jan
2026

Global GoBruteforcer Botnet Campaign Threatens 50,000 Linux Servers

A sophisticated modular botnet known as GoBruteforcer is actively targeting Linux servers worldwide, with researchers estimating that more than 50,000…

Researchers Poison Stolen Data to Sabotage AI Model Accuracy
08
Jan
2026

Researchers Poison Stolen Data to Sabotage AI Model Accuracy

A groundbreaking cybersecurity research team has developed a novel defensive technique that renders stolen artificial intelligence databases virtually useless to…

ownCloud Warns Users to Enable MFA After Credential Theft Incident
08
Jan
2026

ownCloud Warns Users to Enable MFA After Credential Theft Incident

ownCloud has issued an urgent security advisory urging users to enable Multi-Factor Authentication (MFA) following a credential theft incident reported…

Linux Battery Utility Vulnerability Allows Authentication Bypass and System Tampering
08
Jan
2026

Linux Battery Utility Vulnerability Allows Authentication Bypass and System Tampering

Linux laptop users are being urged to update after a flaw in a popular battery optimisation tool was found to…

Three Malicious NPM Packages Target Developers’ Login Credentials
08
Jan
2026

Three Malicious NPM Packages Target Developers’ Login Credentials

Security researchers at Zscaler ThreatLabz have uncovered three malicious npm packages designed to install a sophisticated remote access trojan (RAT)…

BlueDelta Hackers Target Microsoft OWA, Google, and Sophos VPN to Steal Credentials
08
Jan
2026

BlueDelta Hackers Target Microsoft OWA, Google, and Sophos VPN to Steal Credentials

A sophisticated credential-harvesting operation conducted by BlueDelta, a Russian state-sponsored threat group linked to the GRU’s Main Directorate, targeted critical…

GitLab Patches Multiple Flaws Allowing Arbitrary Code Execution 
08
Jan
2026

GitLab Patches Multiple Flaws Allowing Arbitrary Code Execution 

Linux administrators are being urged to update promptly after disclosures of multiple vulnerabilities in GitLab, including flaws that could enable cross-site…

Chinese Hackers Launch Ongoing Attacks on Taiwan's Critical Infrastructure
08
Jan
2026

Chinese Hackers Launch Ongoing Attacks on Taiwan’s Critical Infrastructure

China’s state-sponsored cyber operations against Taiwan have intensified dramatically, with threat actors launching an average of 2.63 million intrusion attempts…

LockBit 5.0 Unveils Advanced Encryption and Enhanced Anti-Analysis Techniques
08
Jan
2026

LockBit 5.0 Unveils Advanced Encryption and Enhanced Anti-Analysis Techniques

LockBit has solidified its position as the most prolific ransomware-as-a-service (RaaS) operation globally, accounting for approximately 21% of all documented…

ToddyCat Malware Exploits ProxyLogon to Compromise Microsoft Exchange Servers
08
Jan
2026

ToddyCat Malware Exploits ProxyLogon to Compromise Microsoft Exchange Servers

ToddyCat, a sophisticated cyber-espionage threat group also known as Websiic and Storm-0247, has emerged as a significant risk to organizations…