Category: GBHackers

ownCloud Warns Users to Enable MFA After Credential Theft Incident
08
Jan
2026

ownCloud Warns Users to Enable MFA After Credential Theft Incident

ownCloud has issued an urgent security advisory urging users to enable Multi-Factor Authentication (MFA) following a credential theft incident reported…

Linux Battery Utility Vulnerability Allows Authentication Bypass and System Tampering
08
Jan
2026

Linux Battery Utility Vulnerability Allows Authentication Bypass and System Tampering

Linux laptop users are being urged to update after a flaw in a popular battery optimisation tool was found to…

Three Malicious NPM Packages Target Developers’ Login Credentials
08
Jan
2026

Three Malicious NPM Packages Target Developers’ Login Credentials

Security researchers at Zscaler ThreatLabz have uncovered three malicious npm packages designed to install a sophisticated remote access trojan (RAT)…

BlueDelta Hackers Target Microsoft OWA, Google, and Sophos VPN to Steal Credentials
08
Jan
2026

BlueDelta Hackers Target Microsoft OWA, Google, and Sophos VPN to Steal Credentials

A sophisticated credential-harvesting operation conducted by BlueDelta, a Russian state-sponsored threat group linked to the GRU’s Main Directorate, targeted critical…

GitLab Patches Multiple Flaws Allowing Arbitrary Code Execution 
08
Jan
2026

GitLab Patches Multiple Flaws Allowing Arbitrary Code Execution 

Linux administrators are being urged to update promptly after disclosures of multiple vulnerabilities in GitLab, including flaws that could enable cross-site…

Chinese Hackers Launch Ongoing Attacks on Taiwan's Critical Infrastructure
08
Jan
2026

Chinese Hackers Launch Ongoing Attacks on Taiwan’s Critical Infrastructure

China’s state-sponsored cyber operations against Taiwan have intensified dramatically, with threat actors launching an average of 2.63 million intrusion attempts…

LockBit 5.0 Unveils Advanced Encryption and Enhanced Anti-Analysis Techniques
08
Jan
2026

LockBit 5.0 Unveils Advanced Encryption and Enhanced Anti-Analysis Techniques

LockBit has solidified its position as the most prolific ransomware-as-a-service (RaaS) operation globally, accounting for approximately 21% of all documented…

ToddyCat Malware Exploits ProxyLogon to Compromise Microsoft Exchange Servers
08
Jan
2026

ToddyCat Malware Exploits ProxyLogon to Compromise Microsoft Exchange Servers

ToddyCat, a sophisticated cyber-espionage threat group also known as Websiic and Storm-0247, has emerged as a significant risk to organizations…

Threat Actors Exploit Google Cloud Services to Steal Microsoft 365 Credentials
08
Jan
2026

Threat Actors Exploit Google Cloud Services to Steal Microsoft 365 Credentials

A sophisticated phishing campaign is exploiting Google Cloud infrastructure to bypass email security filters and steal Microsoft 365 credentials, demonstrating…

TOTOLINK EX200 Extender Flaw Allows Attackers Full System Access
08
Jan
2026

TOTOLINK EX200 Extender Flaw Allows Attackers Full System Access

A critical security flaw has been discovered in the TOTOLINK EX200 Wi-Fi extender that allows attackers to gain complete control…

Chinese Hackers Use NFC-Enabled Android Malware to Steal Payment Information
08
Jan
2026

Chinese Hackers Use NFC-Enabled Android Malware to Steal Payment Information

Chinese threat actors are conducting an aggressive campaign that distributes NFC-enabled Android malware capable of intercepting and remotely relaying payment…

CrazyHunter Ransomware Targets Healthcare Sector Using Sophisticated Evasion Tactics
08
Jan
2026

CrazyHunter Ransomware Targets Healthcare Sector Using Sophisticated Evasion Tactics

A sophisticated new ransomware variant, CrazyHunter, has emerged as a critical threat to the healthcare sector, employing advanced anti-malware evasion…