Category: GBHackers

Instagram Investigates Reported Vulnerability Allowing Access to Private Content
26
Jan
2026

Instagram Investigates Reported Vulnerability Allowing Access to Private Content

A server-side vulnerability in Instagram that allegedly allowed completely unauthenticated access to private account posts. This raises concerns about Meta’s…

PoC Released for GNU InetUtils telnetd RCE as 800K+ Exposed Instances Remain Online
26
Jan
2026

PoC Released for GNU InetUtils telnetd RCE as 800K+ Exposed Instances Remain Online

A proof-of-concept exploit for CVE-2026-24061, a critical remote code execution vulnerability in the GNU Inetutils telnetd, has surfaced, with security…

Lazarus Hackers Target European Drone Manufacturers in Active Campaign
26
Jan
2026

Lazarus Hackers Target European Drone Manufacturers in Active Campaign

The North Korean state-sponsored Lazarus hacking group has launched a sophisticated cyberespionage campaign targeting European defense contractors involved in uncrewed…

Attackers Leveraging telnetd Exploit for Root Privileges After PoC Goes Public
24
Jan
2026

Attackers Leveraging telnetd Exploit for Root Privileges After PoC Goes Public

The threat actors have begun actively exploiting a critical authentication bypass vulnerability in GNU InetUtils telnetd immediately after proof-of-concept code…

Researchers Uncover Multi-Stage AiTM Attack Using SharePoint to Bypass Security Controls
24
Jan
2026

Researchers Uncover Multi-Stage AiTM Attack Using SharePoint to Bypass Security Controls

Microsoft Defender researchers have exposed a sophisticated adversary-in-the-middle (AiTM) phishing campaign targeting energy sector organizations, leveraging SharePoint file-sharing services to…

Microsoft Shared BitLocker Recovery Keys with FBI to Unlock Encrypted Laptop Data
24
Jan
2026

Microsoft Shared BitLocker Recovery Keys with FBI to Unlock Encrypted Laptop Data

Microsoft has confirmed that it provided BitLocker encryption recovery keys to the FBI following a valid search warrant, marking the…

Microsoft Open-Sources winapp, a New CLI Tool for Streamlined Windows App Development
24
Jan
2026

Microsoft Open-Sources winapp, a New CLI Tool for Streamlined Windows App Development

Microsoft has announced the public preview of the Windows App Development CLI (winapp), a new open-source command-line tool designed to…

Microsoft Teams to Begin Sharing Employee Location with Employers Based on Wi-Fi Networks
24
Jan
2026

Microsoft Teams to Begin Sharing Employee Location with Employers Based on Wi-Fi Networks

Microsoft has confirmed a controversial new feature coming to Teams that will automatically reveal employee work locations by detecting which…

Top 10 World's Best Data Security Companies in 2026
24
Jan
2026

Top 10 World’s Best Data Security Companies in 2026

Best Data Security Companies In 2026, data has become the most valuable asset for businesses and the most targeted. With…

Microsoft Introduces Brand Impersonation Protection Warning for Teams Calls
24
Jan
2026

Microsoft Introduces Brand Impersonation Protection Warning for Teams Calls

Microsoft is launching a new security feature designed to protect Teams users from fraudulent external callers impersonating trusted organizations. The…

MacSync macOS Infostealer Exploits ClickFix-style Attack to Trick Users with Single Terminal Command
23
Jan
2026

MacSync macOS Infostealer Exploits ClickFix-style Attack to Trick Users with Single Terminal Command

A sophisticated macOS infostealer campaign that leverages deceptive ClickFix-style social engineering to distribute MacSync, a Malware-as-a-Service (MaaS) credential-stealing tool targeting cryptocurrency…

76 Zero-Day Vulnerabilities Exposed at Pwn2Own Automotive 2026 by Hackers
23
Jan
2026

76 Zero-Day Vulnerabilities Exposed at Pwn2Own Automotive 2026 by Hackers

The final day of Pwn2Own Automotive 2026 brought the world’s elite security researchers to the finish line with a spectacular…