Category: GBHackers

Threat Actors Abuse Trusted Business Infrastructure to Host Infostealers
05
Jan
2026

Threat Actors Abuse Trusted Business Infrastructure to Host Infostealers

In a disturbing evolution of the cybercrime landscape, a self-sustaining cycle of infection has emerged in which victims of malware…

PyArmor Obfuscation as a Method to Hinder Static and Signature-Based Analysis
05
Jan
2026

PyArmor Obfuscation as a Method to Hinder Static and Signature-Based Analysis

Malware authors continue to adopt legitimate software protection tools to shield their malicious code from security researchers. A prime example…

Crimson Collective Claims Alleged Breach of Brightspeed Fiber Network
05
Jan
2026

Crimson Collective Claims Alleged Breach of Brightspeed Fiber Network

A threat actor group operating under the name “Crimson Collective” has publicly claimed responsibility for a significant data breach targeting…

AI-Powered Red Team Toolkit Integrating Metasploit, Nmap, and More
05
Jan
2026

AI-Powered Red Team Toolkit Integrating Metasploit, Nmap, and More

A new open-source tool is bridging the gap between artificial intelligence and offensive security operations.  GHOSTCREW is an advanced AI red…

Post-Escalation Tool Designed to Achieve Red Team Objectives
05
Jan
2026

Post-Escalation Tool Designed to Achieve Red Team Objectives

ProfileHound emerges as a specialized post-exploitation instrument for offensive security professionals seeking to identify high-value targets within Active Directory environments….

Kimwolf Botnet Exploits 2 Million Devices to Build a Global Proxy Infrastructure
05
Jan
2026

Kimwolf Botnet Exploits 2 Million Devices to Build a Global Proxy Infrastructure

A massive new botnet dubbed “Kimwolf” has infected over 2 million devices globally, transforming innocent users’ home internet connections into…

Attackers Leverage FortiWeb Vulnerabilities to Deploy Sliver C2 for Long-Term Access
05
Jan
2026

Attackers Leverage FortiWeb Vulnerabilities to Deploy Sliver C2 for Long-Term Access

Threat researchers have uncovered a sophisticated attack campaign targeting FortiWeb web application firewalls across multiple continents, with adversaries deploying the…

Hackers Steal $35M in Cryptocurrency Following LastPass Breach
05
Jan
2026

Hackers Steal $35M in Cryptocurrency Following LastPass Breach

Russian cybercriminals have laundered over $35 million in stolen cryptocurrency linked to the devastating 2022 LastPass breach, according to new…

Finnish Authorities Arrest Two Sailors in Probe Into Undersea Cable Disruption
03
Jan
2026

Finnish Authorities Arrest Two Sailors in Probe Into Undersea Cable Disruption

Finnish authorities have detained a cargo vessel suspected of damaging an undersea telecommunications cable connecting Helsinki to Estonia. The incident…

Threat Actors Test a Highly Obfuscated, Modified Variant of the Shai Hulud Malware
02
Jan
2026

Threat Actors Test a Highly Obfuscated, Modified Variant of the Shai Hulud Malware

Security researchers have identified what appears to be the first instance of a newly modified Shai Hulud malware strain uploaded…

CISA Issues Warning on WHILL Model C2 Wheelchair Takeover Vulnerabilities
02
Jan
2026

CISA Issues Warning on WHILL Model C2 Wheelchair Takeover Vulnerabilities

The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent warning about a severe security flaw in WHILL Model…

GNU Wget2 Vulnerability Enables Remote File Overwrite Attacks
02
Jan
2026

GNU Wget2 Vulnerability Enables Remote File Overwrite Attacks

A high-severity security flaw has been discovered in GNU Wget2, a popular command-line tool used for downloading files from the web….