Category: GBHackers

Criminal Networks Get a Boost from New Pig-Butchering-as-a-Service Toolkits
12
Jan
2026

Criminal Networks Get a Boost from New Pig-Butchering-as-a-Service Toolkits

The scam industry has undergone massive transformations over the past decade. The cliché image of the once-iconic Nigerian prince duping…

Google Integrates Gemini Into Gmail, Rolling Out New Capabilities
12
Jan
2026

Google Integrates Gemini Into Gmail, Rolling Out New Capabilities

Google has announced a major upgrade to Gmail, bringing its advanced Gemini AI directly into the email platform. The integration…

India Remains Top Target for Mobile Attacks as Threats Surge 38%
12
Jan
2026

India Remains Top Target for Mobile Attacks as Threats Surge 38%

New Delhi, January 12, 2026 – India has emerged as the world’s top target for mobile attacks yet again, recording…

Instagram Confirms No System Breach After External Password Reset Problem
12
Jan
2026

Instagram Confirms No System Breach After External Password Reset Problem

Instagram has dismissed security breach concerns, clarifying that recent unexpected password reset emails were caused by an external party exploiting…

Web3 Dev Environments Hit by Fake Interview Software Scam
12
Jan
2026

Web3 Dev Environments Hit by Fake Interview Software Scam

Web3 and cryptocurrency developers are facing a new wave of targeted attacks driven not by cold outreach, but by carefully…

Critical zlib Flaw Let Attackers Can Trigger a Buffer Overflow via untgz
12
Jan
2026

Critical zlib Flaw Let Attackers Can Trigger a Buffer Overflow via untgz

A severe buffer overflow vulnerability has been discovered in the zlib untgz utility, affecting version 1.3.1.2, allowing attackers to trigger…

Critical React Router Flaws Could Let Attackers Access or Modify Server Files
12
Jan
2026

Critical React Router Flaws Could Let Attackers Access or Modify Server Files

A critical vulnerability has been discovered in React Router and Remix that could allow attackers to access or modify sensitive files on…

Critical Apache Struts 2 Flaw Could Let Attackers Steal Sensitive Data
12
Jan
2026

Critical Apache Struts 2 Flaw Could Let Attackers Steal Sensitive Data

A newly disclosed vulnerability in Apache Struts 2’s XWork component could expose sensitive data and open the door to denial‑of‑service…

Cybercriminal Crypto Transactions Surge to 2025 High
12
Jan
2026

Cybercriminal Crypto Transactions Surge to 2025 High

Illicit cryptocurrency transactions reached unprecedented levels in 2025 as nation-states weaponized digital assets to evade sanctions, transforming the cybercrime landscape…

Stealth Intrusions Aimed at Financial Data Exfiltration
12
Jan
2026

Stealth Intrusions Aimed at Financial Data Exfiltration

A sophisticated second-stage malware payload known as ValleyRAT_S2 has emerged as a critical threat to organizations across Chinese-speaking regions, including…

Hacking Group “Everest” Allegedly Claims Nissan Motor Breach
12
Jan
2026

Hacking Group “Everest” Allegedly Claims Nissan Motor Breach

The Everest hacking group has allegedly claimed responsibility for a major cyberattack on Nissan Motor Co., Ltd., one of Japan’s…

Fake Employee Performance Reports Deliver Guloader Malware
12
Jan
2026

Fake Employee Performance Reports Deliver Guloader Malware

Organizations are being warned about a new phishing campaign that weaponizes fake employee performance reports to deploy the Guloader malware…