Category: GBHackers

Microsoft Introduces Brand Impersonation Protection Warning for Teams Calls
24
Jan
2026

Microsoft Introduces Brand Impersonation Protection Warning for Teams Calls

Microsoft is launching a new security feature designed to protect Teams users from fraudulent external callers impersonating trusted organizations. The…

MacSync macOS Infostealer Exploits ClickFix-style Attack to Trick Users with Single Terminal Command
23
Jan
2026

MacSync macOS Infostealer Exploits ClickFix-style Attack to Trick Users with Single Terminal Command

A sophisticated macOS infostealer campaign that leverages deceptive ClickFix-style social engineering to distribute MacSync, a Malware-as-a-Service (MaaS) credential-stealing tool targeting cryptocurrency…

76 Zero-Day Vulnerabilities Exposed at Pwn2Own Automotive 2026 by Hackers
23
Jan
2026

76 Zero-Day Vulnerabilities Exposed at Pwn2Own Automotive 2026 by Hackers

The final day of Pwn2Own Automotive 2026 brought the world’s elite security researchers to the finish line with a spectacular…

Threat Actors Exploit LNK Files to Deploy MoonPeak Malware on Windows Systems
23
Jan
2026

Threat Actors Exploit LNK Files to Deploy MoonPeak Malware on Windows Systems

A sophisticated three-stage malware attack campaign against Windows users in South Korea using specially crafted LNK (shortcut) files. The attack…

Node.js Sets New Standard for HackerOne Reports, Demands Signal of 1.0 or Higher
23
Jan
2026

Node.js Sets New Standard for HackerOne Reports, Demands Signal of 1.0 or Higher

Node.js has implemented a new quality control measure on its HackerOne bug bounty program, requiring researchers to maintain a minimum…

CISA Updates KEV Catalog with 4 Critical Vulnerabilities Following Ongoing Exploits
23
Jan
2026

CISA Updates KEV Catalog with 4 Critical Vulnerabilities Following Ongoing Exploits

The Cybersecurity and Infrastructure Security Agency (CISA) has expanded its Known Exploited Vulnerabilities (KEV) Catalogue with four critical security flaws…

20,000 WordPress Sites Compromised by Backdoor Vulnerability Enabling Malicious Admin Access
23
Jan
2026

20,000 WordPress Sites Compromised by Backdoor Vulnerability Enabling Malicious Admin Access

A critical backdoor vulnerability discovered in the LA-Studio Element Kit for the Elementor plugin poses an immediate threat to more…

Fake Captcha Exploits Trusted Web Infrastructure to Distribute Malware
23
Jan
2026

Fake Captcha Exploits Trusted Web Infrastructure to Distribute Malware

Fake Captcha and “ClickFix” lures have emerged as among the most persistent and deceptive malware-delivery mechanisms on the modern web….

TrustAsia Pulls 143 Certificates Following Critical LiteSSL ACME Vulnerability
23
Jan
2026

TrustAsia Pulls 143 Certificates Following Critical LiteSSL ACME Vulnerability

TrustAsia has revoked 143 SSL/TLS certificates following the discovery of a critical vulnerability in its LiteSSL ACME service. The flaw,…

Fortinet Confirms Active Exploitation of FortiCloud SSO Bypass Vulnerability
23
Jan
2026

Fortinet Confirms Active Exploitation of FortiCloud SSO Bypass Vulnerability

Fortinet has officially confirmed active exploitation of critical FortiCloud single sign-on (SSO) authentication bypass vulnerabilities affecting multiple enterprise security appliances….

Researchers Score $516,500 For 37 Unique Zero-Days
23
Jan
2026

Researchers Score $516,500 For 37 Unique Zero-Days

Day Two of Pwn2Own Automotive 2026 kicked off with high intensity, as security researchers targeted automotive infotainment systems, EV chargers,…

Halo Security Achieves SOC 2 Type II Compliance, Demonstrating Sustained Security Excellence Over Time
23
Jan
2026

Halo Security Achieves SOC 2 Type II Compliance, Demonstrating Sustained Security Excellence Over Time – GBHackers Security

Miami, Florida, January 22nd, 2026, CyberNewsWire Halo Security, a leading provider of external attack surface management and penetration testing services,…