Category: GBHackers

Threat Actors Exploit Office Assistant to Deliver Malicious Mltab Browser Plugin
06
Jan
2026

Threat Actors Exploit Office Assistant to Deliver Malicious Mltab Browser Plugin

A sophisticated malware campaign has been discovered exploiting Office Assistant, a widely used AI-powered productivity software in China, to distribute…

Copilot, Recall, and Other AI Tools Can Be Removed from Windows 11 with New Tool
06
Jan
2026

Copilot, Recall, and Other AI Tools Can Be Removed from Windows 11 with New Tool

A new community tool is giving Windows 11 users far more control over Microsoft’s growing stack of AI features. An…

CloudEyE MaaS Downloader and Cryptor Infects Over 100,000 Users Globally
06
Jan
2026

CloudEyE MaaS Downloader and Cryptor Infects Over 100,000 Users Globally

ESET Research has uncovered a significant surge in CloudEye malware detections, with a 30-fold increase in the second half of…

Multiple Flaws in QNAP Tools Allow Attackers to Steal Sensitive Data
05
Jan
2026

Multiple Flaws in QNAP Tools Allow Attackers to Steal Sensitive Data

QNAP has released a security advisory addressing multiple vulnerabilities in its License Center application. If left unpatched, these flaws could…

Eaton Vulnerabilities Allow Attackers to Execute Arbitrary Code on Host Systems
05
Jan
2026

Eaton Vulnerabilities Allow Attackers to Execute Arbitrary Code on Host Systems

Eaton has issued a critical security advisory warning users about multiple high-severity vulnerabilities in its UPS Companion software that could…

Threat Actors Abuse Trusted Business Infrastructure to Host Infostealers
05
Jan
2026

Threat Actors Abuse Trusted Business Infrastructure to Host Infostealers

In a disturbing evolution of the cybercrime landscape, a self-sustaining cycle of infection has emerged in which victims of malware…

PyArmor Obfuscation as a Method to Hinder Static and Signature-Based Analysis
05
Jan
2026

PyArmor Obfuscation as a Method to Hinder Static and Signature-Based Analysis

Malware authors continue to adopt legitimate software protection tools to shield their malicious code from security researchers. A prime example…

Crimson Collective Claims Alleged Breach of Brightspeed Fiber Network
05
Jan
2026

Crimson Collective Claims Alleged Breach of Brightspeed Fiber Network

A threat actor group operating under the name “Crimson Collective” has publicly claimed responsibility for a significant data breach targeting…

AI-Powered Red Team Toolkit Integrating Metasploit, Nmap, and More
05
Jan
2026

AI-Powered Red Team Toolkit Integrating Metasploit, Nmap, and More

A new open-source tool is bridging the gap between artificial intelligence and offensive security operations.  GHOSTCREW is an advanced AI red…

Post-Escalation Tool Designed to Achieve Red Team Objectives
05
Jan
2026

Post-Escalation Tool Designed to Achieve Red Team Objectives

ProfileHound emerges as a specialized post-exploitation instrument for offensive security professionals seeking to identify high-value targets within Active Directory environments….

Kimwolf Botnet Exploits 2 Million Devices to Build a Global Proxy Infrastructure
05
Jan
2026

Kimwolf Botnet Exploits 2 Million Devices to Build a Global Proxy Infrastructure

A massive new botnet dubbed “Kimwolf” has infected over 2 million devices globally, transforming innocent users’ home internet connections into…

Attackers Leverage FortiWeb Vulnerabilities to Deploy Sliver C2 for Long-Term Access
05
Jan
2026

Attackers Leverage FortiWeb Vulnerabilities to Deploy Sliver C2 for Long-Term Access

Threat researchers have uncovered a sophisticated attack campaign targeting FortiWeb web application firewalls across multiple continents, with adversaries deploying the…