Category: GBHackers

Two U.S. Cybersecurity Professionals Plead Guilty to Acting as ALPHV/BlackCat Affiliates
01
Jan
2026

Two U.S. Cybersecurity Professionals Plead Guilty to Acting as ALPHV/BlackCat Affiliates

A federal district court in the Southern District of Florida accepted guilty pleas from two cybersecurity professionals who turned their…

Malicious Manipulation of LLMs for Scalable Vulnerability Exploitation
31
Dec
2025

Malicious Manipulation of LLMs for Scalable Vulnerability Exploitation

A groundbreaking study from researchers at the University of Luxembourg reveals a critical security paradigm shift: large language models (LLMs)…

DarkSpectre Malware Campaign Hits Chrome, Edge, and Firefox Users
31
Dec
2025

DarkSpectre Malware Campaign Hits Chrome, Edge, and Firefox Users

A sophisticated Chinese threat actor dubbed DarkSpectre has compromised 8.8 million users across Chrome, Edge, and Firefox through three distinct…

NeuroSploit v2 Launches as AI-Powered Penetration Testing Framework
31
Dec
2025

NeuroSploit v2 Launches as AI-Powered Penetration Testing Framework

NeuroSploit v2 is an advanced AI-powered penetration testing framework designed to automate and enhance offensive security operations. Leveraging cutting-edge large…

New Cybercrime Tool “ErrTraffic” Enables Automated ClickFix Attacks
31
Dec
2025

New Cybercrime Tool “ErrTraffic” Enables Automated ClickFix Attacks

The cybercriminal underground has entered a new phase of industrialization. Hudson Rock researchers have uncovered ErrTraffic v2, a sophisticated ClickFix-as-a-Service…

GlassWorm Malware Turns VS Code Extensions into an Attack Vector Against macOS
31
Dec
2025

GlassWorm Malware Turns VS Code Extensions into an Attack Vector Against macOS

GlassWorm has returned with a dangerous new evolution. The notorious self-propagating malware, which first surfaced in October as an invisible…

New Open-Source C2 Framework AdaptixC2 Debuts With Improved Stability and Speed
31
Dec
2025

New Open-Source C2 Framework AdaptixC2 Debuts With Improved Stability and Speed

The open-source community has received a major update with the release of AdaptixC2 Version 1.0. This new version brings significant…

New AI-Enhanced Crypter Promoted as Capable of Evading Windows Defender
31
Dec
2025

New AI-Enhanced Crypter Promoted as Capable of Evading Windows Defender

Cybersecurity researchers have spotted a new high-sophistication malware loader being advertised on dark web forums, marketed as a commercial solution…

Chinese Hackers Deploy Rootkit to Stealthily Mask ToneShell Malware
31
Dec
2025

Chinese Hackers Deploy Rootkit to Stealthily Mask ToneShell Malware

A sophisticated cyberespionage campaign leveraging kernel-mode rootkit technology has been discovered targeting government organizations across Southeast and East Asia, with…

Hackers Abuse Copilot Studio’s New Connected Agents Feature to Plant Backdoors
31
Dec
2025

Hackers Abuse Copilot Studio’s New Connected Agents Feature to Plant Backdoors

Microsoft’s latest innovation may have opened the door to sophisticated cyberattacks. At Build 2025, the company introduced “Connected Agents,” a…

CISA Alerts on Active Exploitation of MongoDB Vulnerability CVE-2025-14847
31
Dec
2025

CISA Alerts on Active Exploitation of MongoDB Vulnerability CVE-2025-14847

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical warning about the active exploitation of CVE-2025-14847, a…

Hackers Impersonated Jackson JSON Library to Infiltrate Maven Central
31
Dec
2025

Hackers Impersonated Jackson JSON Library to Infiltrate Maven Central

Security researchers have uncovered a sophisticated multi-stage malware campaign targeting Maven Central, the primary repository for Java dependencies. The attack…