Category: GBHackers

Black Basta Ransomware Integrates BYOVD Technique to Evade Defenses
09
Feb
2026

Black Basta Ransomware Integrates BYOVD Technique to Evade Defenses

A recent campaign by the Black Basta ransomware group has revealed a significant shift in attack tactics. This is a…

Cybersquatting Attacks Exploit Trusted Brands to Steal Customer Data and Spread Malware
09
Feb
2026

Cybersquatting Attacks Exploit Trusted Brands to Steal Customer Data and Spread Malware

The nightmare scenario for any modern business is simple but devastating: scammers clone your website, steal your domain identity, and…

Over 5 Million Misconfigured Git Web Servers Found Exposing Secrets Online
09
Feb
2026

Over 5 Million Misconfigured Git Web Servers Found Exposing Secrets Online

A massive widespread vulnerability in web server configurations has left millions of websites open to data theft and unauthorised takeover….

New Telegram Phishing Scam Hijacks Login Flow to Steal Fully Authorized User Sessions
09
Feb
2026

New Telegram Phishing Scam Hijacks Login Flow to Steal Fully Authorized User Sessions

A new and sophisticated Telegram phishing operation is active in the wild, targeting users globally by hijacking the platform’s legitimate…

New “Crypto Scanner” Tool Helps Developers Identify Quantum Risks Before Q-Day
09
Feb
2026

New “Crypto Scanner” Tool Helps Developers Identify Quantum Risks Before Q-Day

With the “Q-Day” horizon the point when quantum computers will be capable of breaking standard encryption projected for roughly 2033,…

Apple Pay Users Targeted by Phishing Attack Aimed at Stealing Payment Details
07
Feb
2026

Apple Pay Users Targeted by Phishing Attack Aimed at Stealing Payment Details

A sophisticated new phishing campaign is targeting Apple Pay users, leveraging high-quality email design and social engineering to bypass security…

State-Backed Hackers Target Military Officials and Journalists on Signal in Latest Cyberattack
07
Feb
2026

State-Backed Hackers Target Military Officials and Journalists on Signal in Latest Cyberattack

German intelligence and security agencies have issued a high-priority warning regarding a sophisticated cyber espionage campaign targeting military officials, diplomats,…

Hackers Exploit Free Firebase Accounts to Launch Phishing Campaigns
07
Feb
2026

Hackers Exploit Free Firebase Accounts to Launch Phishing Campaigns

A new wave of phishing campaigns where scammers are abusing Google’s legitimate infrastructure to bypass security filters. Attackers are now…

Hackers Exploit Cybersquatting Tactics to Spread Malware and Steal Sensitive Information
07
Feb
2026

Hackers Exploit Cybersquatting Tactics to Spread Malware and Steal Sensitive Information

Digital squatting has evolved from a simple trademark nuisance into a dangerous cybersecurity threat. In 2025, the World Intellectual Property…

Transparent Tribe Hacker Group Targets India’s Startup Ecosystem in Cyber Attack
06
Feb
2026

Transparent Tribe Hacker Group Targets India’s Startup Ecosystem in Cyber Attack

A worrying shift in the tactics of “Transparent Tribe,” a notorious threat group also known as APT36. Historically focused on…

Claude Opus 4.6 Launches Enhanced Security Capabilities to Validate 500+ Critical Vulnerabilities
06
Feb
2026

Claude Opus 4.6 Launches Enhanced Security Capabilities to Validate 500+ Critical Vulnerabilities

Anthropic has released Claude Opus 4.6, marking a significant leap in the defensive application of artificial intelligence. Released yesterday, the…

Bulletproof Hosting Providers Exploit Legitimate ISPs to Power Cybercrime Servers
06
Feb
2026

Bulletproof Hosting Providers Exploit Legitimate ISPs to Power Cybercrime Servers

A surprising link between legitimate IT software and major cybercriminal operations. While investigating attacks by the “WantToCry” ransomware gang, analysts…