Category: GBHackers

Threat Actors Exploit Google Cloud Services to Steal Microsoft 365 Credentials
08
Jan
2026

Threat Actors Exploit Google Cloud Services to Steal Microsoft 365 Credentials

A sophisticated phishing campaign is exploiting Google Cloud infrastructure to bypass email security filters and steal Microsoft 365 credentials, demonstrating…

TOTOLINK EX200 Extender Flaw Allows Attackers Full System Access
08
Jan
2026

TOTOLINK EX200 Extender Flaw Allows Attackers Full System Access

A critical security flaw has been discovered in the TOTOLINK EX200 Wi-Fi extender that allows attackers to gain complete control…

Chinese Hackers Use NFC-Enabled Android Malware to Steal Payment Information
08
Jan
2026

Chinese Hackers Use NFC-Enabled Android Malware to Steal Payment Information

Chinese threat actors are conducting an aggressive campaign that distributes NFC-enabled Android malware capable of intercepting and remotely relaying payment…

CrazyHunter Ransomware Targets Healthcare Sector Using Sophisticated Evasion Tactics
08
Jan
2026

CrazyHunter Ransomware Targets Healthcare Sector Using Sophisticated Evasion Tactics

A sophisticated new ransomware variant, CrazyHunter, has emerged as a critical threat to the healthcare sector, employing advanced anti-malware evasion…

Windows Packer pkr_mtsi Powers Widespread Malvertising Campaigns with Multiple Malware
08
Jan
2026

Windows Packer pkr_mtsi Powers Widespread Malvertising Campaigns with Multiple Malware

A custom Windows packer dubbed pkr_mtsi is fueling large-scale malvertising and SEO‑poisoning campaigns that deliver a broad range of information‑stealing and remote‑access…

Critical n8n Vulnerability Allows Authenticated Remote Code Execution
08
Jan
2026

Critical n8n Vulnerability Allows Authenticated Remote Code Execution

A critical security vulnerability has been discovered in n8n, the popular workflow automation tool, potentially allowing authenticated attackers to execute…

Hackers Using Malicious QR Codes for Phishing via HTML Table
07
Jan
2026

Hackers Using Malicious QR Codes for Phishing via HTML Table

Threat actors are continuing to refine “quishing” phishing delivered through QR codes by shifting from traditional image-based payloads to “imageless”…

Hackers Exploit Routing Misconfigurations to Successfully Spoof Organizations
07
Jan
2026

Hackers Exploit Routing Misconfigurations to Successfully Spoof Organizations

Cybercriminals are exploiting complex routing scenarios and misconfigured email authentication protections to successfully spoof organizational domains, enabling them to deliver…

Malicious Chrome Extension Leaks ChatGPT and DeepSeek Chats of 900,000 Users
07
Jan
2026

Malicious Chrome Extension Leaks ChatGPT and DeepSeek Chats of 900,000 Users

Over 900,000 Chrome users have been compromised by two malicious extensions that secretly exfiltrate ChatGPT and DeepSeek conversations to attacker-controlled…

Sedgwick Acknowledges Data Breach After TridentLocker Ransomware Claim
07
Jan
2026

Sedgwick Acknowledges Data Breach After TridentLocker Ransomware Claim

Sedgwick has confirmed a cybersecurity incident at its government-focused subsidiary after the TridentLocker ransomware gang claimed responsibility for stealing 3.4…

Hackers Create Fake DocuSign Login Page to Steal User Credentials
07
Jan
2026

Hackers Create Fake DocuSign Login Page to Steal User Credentials

Phishing attacks continue to dominate the cybercrime landscape as threat actors refine their social engineering tactics to evade detection systems….

Court Demands OpenAI Hand Over 20M Anonymized ChatGPT Chats in AI Copyright Dispute
07
Jan
2026

Court Demands OpenAI Hand Over 20M Anonymized ChatGPT Chats in AI Copyright Dispute

A federal judge has ordered OpenAI to turn over 20 million anonymized ChatGPT conversation logs in a major copyright lawsuit,…