Category: GBHackers

The Role of Initial Access Markets in Ransomware Campaigns Targeting Australia and New Zealand
10
Jan
2026

The Role of Initial Access Markets in Ransomware Campaigns Targeting Australia and New Zealand

The cyber threat environment in Australia and New Zealand has entered a critical phase throughout 2025, marked by a dramatic…

CrowdStrike Acquires Identity Security Startup SGNL in $740 Million Deal
10
Jan
2026

CrowdStrike Acquires Identity Security Startup SGNL in $740 Million Deal

CrowdStrike has announced its agreement to acquire SGNL, a leading identity-first security company, for $740 million. The acquisition will strengthen…

Attackers Use Over 240 Exploits Ahead of Ransomware Attacks
10
Jan
2026

Attackers Use Over 240 Exploits Ahead of Ransomware Attacks

Ransomware attacks don’t begin with encryption. They start with reconnaissance and security researchers just documented a significant reconnaissance operation that…

OWASP CRS Vulnerability Enables Charset Validation Bypass
09
Jan
2026

OWASP CRS Vulnerability Enables Charset Validation Bypass

A newly disclosed vulnerability in the OWASP Core Rule Set (CRS) allows attackers to bypass charset validation in web application firewalls (WAFs), enabling…

Best Ways to Learn Everything About Investing in Bitcoin - GBHackers Security
09
Jan
2026

Best Ways to Learn Everything About Investing in Bitcoin – GBHackers Security

Bitcoin is a digital asset and a payment system invented by Satoshi Nakamoto. Transactions are verified by network nodes through…

xRAT Malware Targets Windows Users via Fake Adult Game
09
Jan
2026

xRAT Malware Targets Windows Users via Fake Adult Game

AhnLab Security Intelligence Center (ASEC) has uncovered a dangerous distribution campaign targeting Windows users through Korean web hard services. Threat…

Fog Ransomware Targets U.S. Organizations via Compromised VPN Credentials
09
Jan
2026

Fog Ransomware Targets U.S. Organizations via Compromised VPN Credentials

Arctic Wolf Labs has uncovered a new ransomware variant dubbed “Fog” striking US organizations, primarily in education and recreation, through…

Microsoft Introduces Teams External Collaboration Administrator Role
09
Jan
2026

Microsoft Introduces Teams External Collaboration Administrator Role

Microsoft is expanding its administrative capabilities in Teams by introducing a new built-in role called Teams External Collaboration Administrator.   This…

Microsoft Mandates MFA for Microsoft 365 Admin Center Access
09
Jan
2026

Microsoft Mandates MFA for Microsoft 365 Admin Center Access

Microsoft is tightening security for its cloud customers by making multi-factor authentication mandatory for anyone accessing the Microsoft 365 admin center, effectively…

New “Ghost Tap” Attack Hijacks Android Phones to Drain Bank Accounts
09
Jan
2026

New “Ghost Tap” Attack Hijacks Android Phones to Drain Bank Accounts

Chinese threat actors are weaponizing NFC technology to steal funds from victims’ bank remotely accounts through sophisticated Android malware campaigns,…

How Attackers Hide Processes by Abusing Kernel Patch Protection
09
Jan
2026

How Attackers Hide Processes by Abusing Kernel Patch Protection

Security researchers have identified a sophisticated technique that allows attackers to hide malicious processes from Windows Task Manager and system…

China Breached Email Systems Used by U.S. Congressional Staff
09
Jan
2026

China Breached Email Systems Used by U.S. Congressional Staff

Beijing dismissed accusations of Chinese involvement in a significant cyberattack against United States congressional staff email systems on Thursday, characterizing…