Category: GBHackers

Research Finds 64% of Third-Party Apps Access Sensitive Data
22
Jan
2026

Research Finds 64% of Third-Party Apps Access Sensitive Data

Boston, MA, USA, January 21st, 2026, CyberNewsWire Reflectiz today announced the release of its 2026 State of Web Exposure Research,…

Weaponized Shipping Documents Spread Remcos RAT in Stealthy Malware Campaign
21
Jan
2026

Weaponized Shipping Documents Spread Remcos RAT in Stealthy Malware Campaign

A sophisticated phishing campaign distributing a fileless variant of Remcos RAT, a commercial remote access tool offering extensive capabilities, including…

PURELOGS Payload Hidden in Weaponized PNG Images Used in Stealth Attacks
21
Jan
2026

PURELOGS Payload Hidden in Weaponized PNG Images Used in Stealth Attacks

A sophisticated PURELOGS infostealer campaign that weaponizes PNG image files to evade detection.The attack begins with a phishing email disguised…

Magecart Hack Injects JavaScript to Steal Online Payment Data
21
Jan
2026

Magecart Hack Injects JavaScript to Steal Online Payment Data

A new Magecart-style campaign is actively targeting e-commerce websites by injecting malicious JavaScript that intercepts and exfiltrates payment card data…

GNU InetUtils Vulnerability Exploited via “-f root” to Achieve Full System Control
21
Jan
2026

GNU InetUtils Vulnerability Exploited via “-f root” to Achieve Full System Control

A critical authentication bypass vulnerability in GNU InetUtils’ telnetd server allows remote attackers to gain root access without credentials by…

21
Jan
2026

GNU InetUtils Vulnerability Exploited via “-f root” to Achieve Full System Control

A critical authentication bypass vulnerability in GNU InetUtils’ telnetd server allows remote attackers to gain root access without credentials by…

Critical Zoom Vulnerability Enables Remote Code Execution via Command Injection
21
Jan
2026

Critical Zoom Vulnerability Enables Remote Code Execution via Command Injection

A critical command injection vulnerability in Zoom Node Multimedia Routers (MMRs) has been disclosed, potentially allowing meeting participants to execute…

ErrTraffic Exploits Visual Page Breaks to Fuel ClickFix Attacks, Rebranding Exploits as “GlitchFix”
21
Jan
2026

ErrTraffic Exploits Visual Page Breaks to Fuel ClickFix Attacks, Rebranding Exploits as “GlitchFix”

ErrTraffic is a Traffic Distribution System (TDS) designed to power ClickFix social engineering attacks. Unlike traditional fake update prompts, ErrTraffic deliberately breaks…

First Fully AI-Driven Malware Signals a New Era of Cyber Threats
21
Jan
2026

First Fully AI-Driven Malware Signals a New Era of Cyber Threats

A sophisticated Linux malware framework developed almost entirely through artificial intelligence, marking the beginning of a new era in AI-powered…

Hackers Weaponize 2,500+ Security Tools to Disable Endpoint Defenses Before Ransomware Attacks
21
Jan
2026

Hackers Weaponize 2,500+ Security Tools to Disable Endpoint Defenses Before Ransomware Attacks

A sophisticated campaign has weaponized over 2,500 variants of a legitimate security driver to disable endpoint protection before deploying ransomware…

NVIDIA Nsight Graphics on Linux Exposed to Code Execution Vulnerability
21
Jan
2026

NVIDIA Nsight Graphics on Linux Exposed to Code Execution Vulnerability

NVIDIA has released an urgent security update addressing a critical vulnerability in NSIGHT Graphics for Linux systems. The vulnerability, tracked…

GitLab Security Flaws Could Allow Two-Factor Authentication Bypass and DoS
21
Jan
2026

GitLab Security Flaws Could Allow Two-Factor Authentication Bypass and DoS

GitLab has released critical security patches addressing multiple vulnerabilities affecting both Community Edition (CE) and Enterprise Edition (EE). Versions 18.8.2,…