Category: GBHackers

AI-Powered Red Team Toolkit Integrating Metasploit, Nmap, and More
05
Jan
2026

AI-Powered Red Team Toolkit Integrating Metasploit, Nmap, and More

A new open-source tool is bridging the gap between artificial intelligence and offensive security operations.  GHOSTCREW is an advanced AI red…

Post-Escalation Tool Designed to Achieve Red Team Objectives
05
Jan
2026

Post-Escalation Tool Designed to Achieve Red Team Objectives

ProfileHound emerges as a specialized post-exploitation instrument for offensive security professionals seeking to identify high-value targets within Active Directory environments….

Kimwolf Botnet Exploits 2 Million Devices to Build a Global Proxy Infrastructure
05
Jan
2026

Kimwolf Botnet Exploits 2 Million Devices to Build a Global Proxy Infrastructure

A massive new botnet dubbed “Kimwolf” has infected over 2 million devices globally, transforming innocent users’ home internet connections into…

Attackers Leverage FortiWeb Vulnerabilities to Deploy Sliver C2 for Long-Term Access
05
Jan
2026

Attackers Leverage FortiWeb Vulnerabilities to Deploy Sliver C2 for Long-Term Access

Threat researchers have uncovered a sophisticated attack campaign targeting FortiWeb web application firewalls across multiple continents, with adversaries deploying the…

Hackers Steal $35M in Cryptocurrency Following LastPass Breach
05
Jan
2026

Hackers Steal $35M in Cryptocurrency Following LastPass Breach

Russian cybercriminals have laundered over $35 million in stolen cryptocurrency linked to the devastating 2022 LastPass breach, according to new…

Finnish Authorities Arrest Two Sailors in Probe Into Undersea Cable Disruption
03
Jan
2026

Finnish Authorities Arrest Two Sailors in Probe Into Undersea Cable Disruption

Finnish authorities have detained a cargo vessel suspected of damaging an undersea telecommunications cable connecting Helsinki to Estonia. The incident…

Threat Actors Test a Highly Obfuscated, Modified Variant of the Shai Hulud Malware
02
Jan
2026

Threat Actors Test a Highly Obfuscated, Modified Variant of the Shai Hulud Malware

Security researchers have identified what appears to be the first instance of a newly modified Shai Hulud malware strain uploaded…

CISA Issues Warning on WHILL Model C2 Wheelchair Takeover Vulnerabilities
02
Jan
2026

CISA Issues Warning on WHILL Model C2 Wheelchair Takeover Vulnerabilities

The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent warning about a severe security flaw in WHILL Model…

GNU Wget2 Vulnerability Enables Remote File Overwrite Attacks
02
Jan
2026

GNU Wget2 Vulnerability Enables Remote File Overwrite Attacks

A high-severity security flaw has been discovered in GNU Wget2, a popular command-line tool used for downloading files from the web….

Cardano Users Warned of Possible Phishing Attempt Posing as ‘Eternl Desktop’ Update
02
Jan
2026

Cardano Users Warned of Possible Phishing Attempt Posing as ‘Eternl Desktop’ Update

A sophisticated phishing campaign is currently circulating within the Cardano community, utilizing high-trust social engineering to distribute malware under the…

RondoDoX Botnet Abuses React2Shell Vulnerability for Malware Deployment
02
Jan
2026

RondoDoX Botnet Abuses React2Shell Vulnerability for Malware Deployment

CloudSEK has uncovered a sustained nine-month campaign by the RondoDoX botnet operation, revealing rapid exploitation of emerging vulnerabilities including the…

Cognizant Faces Multiple US Class-Action Lawsuits After TriZetto Data Breach
02
Jan
2026

Cognizant Faces Multiple US Class-Action Lawsuits After TriZetto Data Breach

Cognizant Technology Solutions is facing a wave of legal challenges in the United States following a significant data breach at…