Category: GBHackers

Handala Hackers Breach Telegram Accounts Linked to Israeli Officials
02
Jan
2026

Handala Hackers Breach Telegram Accounts Linked to Israeli Officials

In December 2025, the Iran-linked hacking group known as Handala escalated its influence operations against Israel’s political establishment by publishing…

Careto Hacker Group Resurfaces After a Decade, Unleashing New Attack Techniques
02
Jan
2026

Careto Hacker Group Resurfaces After a Decade, Unleashing New Attack Techniques

The legendary Careto threat actor, also known as “The Mask,” has resurfaced after a decade-long disappearance, employing sophisticated new attack…

Apache NuttX Flaw Allows Attackers to Crash Embedded Systems
02
Jan
2026

Apache NuttX Flaw Allows Attackers to Crash Embedded Systems

The Apache Software Foundation has released a security advisory addressing a memory corruption vulnerability in the Apache NuttX Real-Time Operating…

APT36 Targets Indian Government Systems Using Malicious Windows LNK Files
01
Jan
2026

APT36 Targets Indian Government Systems Using Malicious Windows LNK Files

A sophisticated cyber-espionage operation attributed to APT36, also known as Transparent Tribe, has been identified targeting Indian governmental, academic, and…

Critical Apache StreamPipes Flaw Allows Attackers to Take Over Admin Accounts
01
Jan
2026

Critical Apache StreamPipes Flaw Allows Attackers to Take Over Admin Accounts

Apache StreamPipes has released an urgent security advisory addressing CVE-2025-47411, a critical privilege escalation vulnerability affecting versions 0.69.0 through 0.97.0….

Two U.S. Cybersecurity Professionals Plead Guilty to Acting as ALPHV/BlackCat Affiliates
01
Jan
2026

Two U.S. Cybersecurity Professionals Plead Guilty to Acting as ALPHV/BlackCat Affiliates

A federal district court in the Southern District of Florida accepted guilty pleas from two cybersecurity professionals who turned their…

Malicious Manipulation of LLMs for Scalable Vulnerability Exploitation
31
Dec
2025

Malicious Manipulation of LLMs for Scalable Vulnerability Exploitation

A groundbreaking study from researchers at the University of Luxembourg reveals a critical security paradigm shift: large language models (LLMs)…

DarkSpectre Malware Campaign Hits Chrome, Edge, and Firefox Users
31
Dec
2025

DarkSpectre Malware Campaign Hits Chrome, Edge, and Firefox Users

A sophisticated Chinese threat actor dubbed DarkSpectre has compromised 8.8 million users across Chrome, Edge, and Firefox through three distinct…

NeuroSploit v2 Launches as AI-Powered Penetration Testing Framework
31
Dec
2025

NeuroSploit v2 Launches as AI-Powered Penetration Testing Framework

NeuroSploit v2 is an advanced AI-powered penetration testing framework designed to automate and enhance offensive security operations. Leveraging cutting-edge large…

New Cybercrime Tool “ErrTraffic” Enables Automated ClickFix Attacks
31
Dec
2025

New Cybercrime Tool “ErrTraffic” Enables Automated ClickFix Attacks

The cybercriminal underground has entered a new phase of industrialization. Hudson Rock researchers have uncovered ErrTraffic v2, a sophisticated ClickFix-as-a-Service…

GlassWorm Malware Turns VS Code Extensions into an Attack Vector Against macOS
31
Dec
2025

GlassWorm Malware Turns VS Code Extensions into an Attack Vector Against macOS

GlassWorm has returned with a dangerous new evolution. The notorious self-propagating malware, which first surfaced in October as an invisible…

New Open-Source C2 Framework AdaptixC2 Debuts With Improved Stability and Speed
31
Dec
2025

New Open-Source C2 Framework AdaptixC2 Debuts With Improved Stability and Speed

The open-source community has received a major update with the release of AdaptixC2 Version 1.0. This new version brings significant…