Category: GBHackers

Microsoft Exchange Online to End Support for SMTP AUTH Basic Authentication
28
Jan
2026

Microsoft Exchange Online to End Support for SMTP AUTH Basic Authentication

Microsoft has announced a revised deprecation timeline for SMTP AUTH Basic Authentication in Exchange Online, giving organizations an extended runway…

TP-Link Archer Router Flaw Exposes Users to Remote Attacks and Full Device Control
28
Jan
2026

TP-Link Archer Router Flaw Exposes Users to Remote Attacks and Full Device Control

A high command injection vulnerability has been discovered in TP-Link’s Archer MR600 v5 router, enabling authenticated attackers to execute arbitrary…

Critical IDIS IP Camera Vulnerability Allows Full Computer Compromise with One-Click Exploit
28
Jan
2026

Critical IDIS IP Camera Vulnerability Allows Full Computer Compromise with One-Click Exploit

A critical vulnerability in IDIS Cloud Manager (ICM) Viewer exposes organizations using IDIS IP cameras to one-click remote code execution…

Cybercriminals Leverage AI-Generated Malicious Job Offers to Spread PureRAT Malware
28
Jan
2026

Cybercriminals Leverage AI-Generated Malicious Job Offers to Spread PureRAT Malware

A Vietnamese threat actor is using AI-authored code to power a phishing campaign that delivers the PureRAT malware and related…

Gemini MCP Tool 0-Day Vulnerability Exposes Systems to Remote Code Execution
28
Jan
2026

Gemini MCP Tool 0-Day Vulnerability Exposes Systems to Remote Code Execution

A critical zero-day vulnerability has been disclosed in the Gemini MCP Tool, enabling unauthenticated remote attackers to execute arbitrary code…

eSkimming Attacks Surge with Evolving Tactics and Ongoing Recovery Challenges
28
Jan
2026

eSkimming Attacks Surge with Evolving Tactics and Ongoing Recovery Challenges

A new longitudinal study of Magecart-style eSkimming attacks overturns the assumption that discovery equals recovery. Instead of being a one-time…

Cal.com Broken Access Controls Lead to Account Takeover and Data Exposure
28
Jan
2026

Cal.com Broken Access Controls Lead to Account Takeover and Data Exposure

Cal.com, an open-source scheduling platform and developer-friendly alternative to Calendly, recently patched a set of critical vulnerabilities that exposed user…

Meta Faces Legal Action Over Claims of Accessing All WhatsApp User Messages
27
Jan
2026

Meta Faces Legal Action Over Claims of Accessing All WhatsApp User Messages

A class-action lawsuit filed in San Francisco federal court accuses Meta Platforms of systematically misleading billions of WhatsApp users about…

New Deepfake Phishing Attack Targets Bitcoin Users via Zoom and Teams
27
Jan
2026

New Deepfake Phishing Attack Targets Bitcoin Users via Zoom and Teams

A sophisticated deepfake-enabled phishing campaign is actively targeting Bitcoin users through fake Zoom and Microsoft Teams calls. The attackers are…

Hackers Exploit SEO Poisoning to Target Users Seeking Legitimate Tools
27
Jan
2026

Hackers Exploit SEO Poisoning to Target Users Seeking Legitimate Tools

Search engine optimization (SEO) poisoning techniques to trick users into downloading malicious software disguised as legitimate tools. This attack campaign…

Attackers Exploit React2Shell Vulnerability to Target IT Sector Systems
27
Jan
2026

Attackers Exploit React2Shell Vulnerability to Target IT Sector Systems

Active exploitation of a critical vulnerability in React Server Components, tracked as CVE‑2025‑55182 (React2Shell), targeting companies across multiple industry sectors…

Over 6,000 SmarterMail Servers Exposed to Actively Exploited RCE Vulnerability
27
Jan
2026

Over 6,000 SmarterMail Servers Exposed to Actively Exploited RCE Vulnerability

Approximately 6,000 vulnerable SmarterTools SmarterMail installations globally are all exposed to an actively exploited remote code execution vulnerability. The vulnerability,…