Category: GBHackers

Python-Based PyRAT Emerges as Cross-Platform Threat With Advanced Remote Access Capabilities
29
Jan
2026

Python-Based PyRAT Emerges as Cross-Platform Threat With Advanced Remote Access Capabilities

In the evolving landscape of cyber threats, attackers increasingly leverage Python to develop sophisticated Remote Access Trojans (RATs) that evade…

Zoom and Microsoft Teams Lose French Government Trust After Security Review
29
Jan
2026

Zoom and Microsoft Teams Lose French Government Trust After Security Review

France’s government has made a decisive move to eliminate foreign videoconferencing platforms from its operations, rejecting Zoom and Microsoft Teams…

Weaponized VS Code Extension “ClawdBot Agent” Spreads ScreenConnect RAT
29
Jan
2026

Weaponized VS Code Extension “ClawdBot Agent” Spreads ScreenConnect RAT

A malicious Visual Studio Code extension posing as an AI coding assistant has been caught secretly installing a fully functional…

Researchers Uncover Semantic Chaining Attack That Defeats Grok 4, Gemini AI Safeguards
29
Jan
2026

Researchers Uncover Semantic Chaining Attack That Defeats Grok 4, Gemini AI Safeguards

Security researchers have identified a sophisticated jailbreak technique called Semantic Chaining that successfully bypasses safety filters in leading multimodal AI…

eScan Antivirus Update Server Breached to Deliver Malicious Software Updates
29
Jan
2026

eScan Antivirus Update Server Breached to Deliver Malicious Software Updates

MicroWorld Technologies’ eScan antivirus platform fell victim to a sophisticated supply chain attack on January 20, 2026, when threat actors…

Fake “Mac Cleaner” Campaign Uses Google Ads to Redirect Users to Malware
29
Jan
2026

Fake “Mac Cleaner” Campaign Uses Google Ads to Redirect Users to Malware

Cybercriminals are exploiting Google Search Ads to distribute malware through deceptive landing pages that impersonate Apple’s official website design. The…

Swarmer Tool Abuses Windows Registry to Evade Detection and Persist on Systems
29
Jan
2026

Swarmer Tool Abuses Windows Registry to Evade Detection and Persist on Systems

Swarmer, a sophisticated tool designed to manipulate Windows registry hives while bypassing endpoint detection systems. The tool exploits legacy Windows…

BlackIce Introduced as Container-Based Red Teaming Toolkit for AI Security Testing
29
Jan
2026

BlackIce Introduced as Container-Based Red Teaming Toolkit for AI Security Testing

Databricks introduced BlackIce at CAMLIS Red 2025, an open-source containerized toolkit that consolidates 14 widely-used AI security tools into a…

Open Directory Exposure Leaks BYOB Framework Across Windows, Linux, and macOS
29
Jan
2026

Open Directory Exposure Leaks BYOB Framework Across Windows, Linux, and macOS

An exposed command-and-control server hosting a complete deployment of the BYOB (Build Your Own Botnet) framework, a sophisticated post-exploitation tool…

WhatsApp Introduces New Strict Account Settings to Protect Users from Hackers
29
Jan
2026

WhatsApp Introduces New Strict Account Settings to Protect Users from Hackers

WhatsApp has unveiled Strict Account Settings, an advanced security feature designed to shield high-risk users from sophisticated cyber threats and…

Chinese National Sentenced to 46 Months for Laundering Millions Stolen from U.S. Investors
28
Jan
2026

Chinese National Sentenced to 46 Months for Laundering Millions Stolen from U.S. Investors

A Chinese national has been sentenced to nearly four years in U.S. federal prison for laundering tens of millions of…

Cybercriminals Exploit Canadians' Dependence on Digital Services in Widespread Attacks
28
Jan
2026

Cybercriminals Exploit Canadians’ Dependence on Digital Services in Widespread Attacks

Canadian citizens are facing a coordinated phishing campaign that leverages government impersonation and brand spoofing to harvest personal and financial…