Category: GBHackers

25 Million Users Affected as AI Chat Platform Leaks 300 Million Messages
10
Feb
2026

25 Million Users Affected as AI Chat Platform Leaks 300 Million Messages

“Chat & Ask AI,” a highly popular mobile application available on both Google Play and the Apple App Store, has…

Bloody Wolf Cybercrime Group Uses NetSupport RAT to Breach Organizations
10
Feb
2026

Bloody Wolf Cybercrime Group Uses NetSupport RAT to Breach Organizations

The latest campaign, they have switched to misusing a legitimate remote administration tool called NetSupport RAT. A cybercriminal group known…

Chinese Hackers Target Singapore Telecoms in Edge Device Compromise Campaign
10
Feb
2026

Chinese Hackers Target Singapore Telecoms in Edge Device Compromise Campaign

A massive, eleven-month campaign to root out sophisticated attackers from the nation’s critical infrastructure. The Cyber Security Agency of Singapore…

Threat Actors Using Ivanti EPMM Flaws to Install Stealth Backdoors
10
Feb
2026

Threat Actors Using Ivanti EPMM Flaws to Install Stealth Backdoors

A sophisticated new cyber campaign has been detected targeting Ivanti Endpoint Manager Mobile (EPMM) systems. Starting on February 4, 2026,…

DPRK IT Workers Use Stolen LinkedIn Identities to Secure Remote Employment
10
Feb
2026

DPRK IT Workers Use Stolen LinkedIn Identities to Secure Remote Employment

A new wave of identity fraud has hit the remote job market, with North Korean (DPRK) operatives adopting a sophisticated…

New RecoverIt Tool Abuses Windows Service Failure Recovery to Execute Malicious Payloads
10
Feb
2026

New RecoverIt Tool Abuses Windows Service Failure Recovery to Execute Malicious Payloads

A new offensive security tool named “RecoverIt” has been released, offering red teamers a stealthy method for lateral movement and…

Hackers Abuse ClawHub Skills to Evade VirusTotal via Social Engineering
10
Feb
2026

Hackers Abuse ClawHub Skills to Evade VirusTotal via Social Engineering

A new evolution in ClawHub skill-based attacks that effectively sidesteps recent security measures. Rather than embedding base64-encoded payloads directly in…

ScarCruft Exploits Trusted Cloud Services and OLE Documents to Deliver Malware
10
Feb
2026

ScarCruft Exploits Trusted Cloud Services and OLE Documents to Deliver Malware

The North Korean-backed advanced persistent threat (APT) group known as ScarCruft has significantly evolved its attack techniques. In a departure…

Active Exploitation of SolarWinds Web Help Desk RCE Used to Drop Custom Malware
10
Feb
2026

Active Exploitation of SolarWinds Web Help Desk RCE Used to Drop Custom Malware

Threat actors are actively exploiting critical vulnerabilities in SolarWinds Web Help Desk (WHD) to deploy custom malware and establish persistent…

Node.js LTX Stealer Emerges as New Threat to Login Credentials
10
Feb
2026

Node.js LTX Stealer Emerges as New Threat to Login Credentials

A new, sophisticated malware campaign dubbed “LTX Stealer.” This malware represents a shift in attacker techniques, utilizing legitimate software frameworks…

European Commission Mitigates Cyberattack Aimed at Employee Mobile Information
10
Feb
2026

European Commission Mitigates Cyberattack Aimed at Employee Mobile Information

The European Commission successfully contained a cyberattack targeting its mobile device management infrastructure on January 30, 2026. The incident, which…

Hackers Abuse Apple & PayPal Invoice Emails in DKIM Replay Attack Campaign
10
Feb
2026

Hackers Abuse Apple & PayPal Invoice Emails in DKIM Replay Attack Campaign

A sophisticated way to bypass email security by weaponizing legitimate messages from trusted companies like Apple and PayPal. These attacks,…