Category: GBHackers

New PoC for Windows Exploit Lets Low-Privileged Users Crash Systems with BSOD
26
Feb
2026

New PoC for Windows Exploit Lets Low-Privileged Users Crash Systems with BSOD

Security researchers have released a new Proof of Concept (PoC) for a vulnerability in the Windows Common Log File System…

Claude Code Lets Users Control Terminal Sessions Remotely from Their Phones
26
Feb
2026

Claude Code Lets Users Control Terminal Sessions Remotely from Their Phones

Anthropic has unveiled a significant update to its Claude Code platform, introducing a new “Remote Control” feature. This capability allows…

DarkCloud Infostealer Escalates as Major Enterprise Threat with Scalable Credential Theft
26
Feb
2026

DarkCloud Infostealer Escalates as Major Enterprise Threat with Scalable Credential Theft

Infostealers continue to dominate the initial access landscape in 2026, driving breaches through scalable credential theft. Among these, DarkCloud has emerged as…

Firefox 148 Unveils New Sanitizer API to Mitigate XSS Attacks in Web Applications
26
Feb
2026

Firefox 148 Unveils New Sanitizer API to Mitigate XSS Attacks in Web Applications

Firefox has launched a major update to help protect web applications from Cross-Site Scripting (XSS) attacks. With the release of…

Kali Linux Introduces Claude AI for Automated Penetration Testing Using Model Context Protocol
26
Feb
2026

Kali Linux Introduces Claude AI for Automated Penetration Testing Using Model Context Protocol

Offensive security operations are evolving with a new method for running Kali Linux. By combining Kali with Anthropic’s Claude AI…

Critical Cisco SD-WAN 0-Day Exploited for Root Access in Active Cyberattacks
26
Feb
2026

Critical Cisco SD-WAN 0-Day Exploited for Root Access in Active Cyberattacks

Cisco has released urgent updates to patch a critical zero-day vulnerability in its Catalyst SD-WAN products. A highly sophisticated threat…

Michael Henricks Named CFO and COO at One Identity
25
Feb
2026

Michael Henricks Named CFO and COO at One Identity

Alisa Viejo, CA, United States, February 25th, 2026, CyberNewswire One Identity, a trusted leader in identity security, today announced the…

Hackers Exploit Cortex XDR Live Terminal for C2 Communications
25
Feb
2026

Hackers Exploit Cortex XDR Live Terminal for C2 Communications

Hackers can repurpose the Cortex XDR Live Terminal feature as a stealthy, EDR‑trusted command‑and‑control (C2) channel, effectively turning a built‑in…

CISA Issues Alert on Active Exploitation of FileZen Vulnerability
25
Feb
2026

CISA Issues Alert on Active Exploitation of FileZen Vulnerability

The Cybersecurity and Infrastructure Security Agency (CISA) has added a new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, citing…

Critical SolarWinds Serv-U Vulnerabilities Enable Remote Root Access
25
Feb
2026

Critical SolarWinds Serv-U Vulnerabilities Enable Remote Root Access

SolarWinds has released a critical security update for its Serv-U file transfer software, patching four vulnerabilities that could allow attackers…

Cybercriminals Exploit Fake Avast Website to Steal Users' Credit Card Information
25
Feb
2026

Cybercriminals Exploit Fake Avast Website to Steal Users’ Credit Card Information

Cybercriminals have launched a convincing phishing operation by building a fake Avast website designed to steal credit card information from…

Android RAT SURXRAT Grants Hackers Full Device Control and Data Exfiltration
25
Feb
2026

Android RAT SURXRAT Grants Hackers Full Device Control and Data Exfiltration

SURXRAT is an actively developed Android Remote Access Trojan (RAT) sold as a commercial malware-as-a-service (MaaS) on Telegram, giving attackers…