Category: GBHackers

Cardano Users Warned of Possible Phishing Attempt Posing as ‘Eternl Desktop’ Update
02
Jan
2026

Cardano Users Warned of Possible Phishing Attempt Posing as ‘Eternl Desktop’ Update

A sophisticated phishing campaign is currently circulating within the Cardano community, utilizing high-trust social engineering to distribute malware under the…

RondoDoX Botnet Abuses React2Shell Vulnerability for Malware Deployment
02
Jan
2026

RondoDoX Botnet Abuses React2Shell Vulnerability for Malware Deployment

CloudSEK has uncovered a sustained nine-month campaign by the RondoDoX botnet operation, revealing rapid exploitation of emerging vulnerabilities including the…

Cognizant Faces Multiple US Class-Action Lawsuits After TriZetto Data Breach
02
Jan
2026

Cognizant Faces Multiple US Class-Action Lawsuits After TriZetto Data Breach

Cognizant Technology Solutions is facing a wave of legal challenges in the United States following a significant data breach at…

Hacker Group Claims Responsibility for Alleged Tokyo FM Broadcasting Breach
02
Jan
2026

Hacker Group Claims Responsibility for Alleged Tokyo FM Broadcasting Breach

A threat actor operating under the alias “victim” has claimed responsibility for a significant data breach targeting Tokyo FM Broadcasting…

Google Tasks Feature Exploited in New Sophisticated Phishing Campaign
02
Jan
2026

Google Tasks Feature Exploited in New Sophisticated Phishing Campaign

Over 3,000 organisations, predominantly in manufacturing, fell victim to a sophisticated phishing campaign in December 2025 that leveraged Google’s own…

Handala Hackers Breach Telegram Accounts Linked to Israeli Officials
02
Jan
2026

Handala Hackers Breach Telegram Accounts Linked to Israeli Officials

In December 2025, the Iran-linked hacking group known as Handala escalated its influence operations against Israel’s political establishment by publishing…

Careto Hacker Group Resurfaces After a Decade, Unleashing New Attack Techniques
02
Jan
2026

Careto Hacker Group Resurfaces After a Decade, Unleashing New Attack Techniques

The legendary Careto threat actor, also known as “The Mask,” has resurfaced after a decade-long disappearance, employing sophisticated new attack…

Apache NuttX Flaw Allows Attackers to Crash Embedded Systems
02
Jan
2026

Apache NuttX Flaw Allows Attackers to Crash Embedded Systems

The Apache Software Foundation has released a security advisory addressing a memory corruption vulnerability in the Apache NuttX Real-Time Operating…

APT36 Targets Indian Government Systems Using Malicious Windows LNK Files
01
Jan
2026

APT36 Targets Indian Government Systems Using Malicious Windows LNK Files

A sophisticated cyber-espionage operation attributed to APT36, also known as Transparent Tribe, has been identified targeting Indian governmental, academic, and…

Critical Apache StreamPipes Flaw Allows Attackers to Take Over Admin Accounts
01
Jan
2026

Critical Apache StreamPipes Flaw Allows Attackers to Take Over Admin Accounts

Apache StreamPipes has released an urgent security advisory addressing CVE-2025-47411, a critical privilege escalation vulnerability affecting versions 0.69.0 through 0.97.0….

Two U.S. Cybersecurity Professionals Plead Guilty to Acting as ALPHV/BlackCat Affiliates
01
Jan
2026

Two U.S. Cybersecurity Professionals Plead Guilty to Acting as ALPHV/BlackCat Affiliates

A federal district court in the Southern District of Florida accepted guilty pleas from two cybersecurity professionals who turned their…

Malicious Manipulation of LLMs for Scalable Vulnerability Exploitation
31
Dec
2025

Malicious Manipulation of LLMs for Scalable Vulnerability Exploitation

A groundbreaking study from researchers at the University of Luxembourg reveals a critical security paradigm shift: large language models (LLMs)…