Category: GBHackers

Python-Based Recon Toolkit Aims to Boost Security Intelligence
19
Jan
2026

Python-Based Recon Toolkit Aims to Boost Security Intelligence

Security researchers and penetration testers gain a comprehensive open-source reconnaissance platform with the release of Argus v2.0, a Python-based information…

Mandiant Publishes Rainbow Tables That Crack NTLMv1 Admin Passwords
19
Jan
2026

Mandiant Publishes Rainbow Tables That Crack NTLMv1 Admin Passwords

Mandiant has publicly released comprehensive rainbow tables designed to crack Net-NTLMv1 authentication hashes, addressing a critical security gap that has persisted for…

The Tool Access 11 Chrome Web Store listing claims to "restrict access to special tools" and help "limit user
19
Jan
2026

Five Chrome Extensions Used to Hijack Enterprise HR and ERP Systems

Socket’s Threat Research Team has uncovered a coordinated Chrome extension campaign targeting enterprise HR and ERP platforms, including Workday, NetSuite,…

PDFSIDER Malware Actively Exploited to Evade Antivirus and EDR Defenses
19
Jan
2026

PDFSIDER Malware Actively Exploited to Evade Antivirus and EDR Defenses

Security researchers have identified a sophisticated backdoor malware variant, PDFSIDER, that leverages DLL side-loading to evade endpoint detection and response…

Researchers Hijack Hacker Domain Using Name Server Delegation
19
Jan
2026

Researchers Hijack Hacker Domain Using Name Server Delegation

Security researchers from Infoblox have successfully intercepted millions of malicious push notification advertisements by exploiting a DNS misconfiguration technique known…

New “BodySnatcher” Flaw Allows Full ServiceNow User Impersonation
19
Jan
2026

New “BodySnatcher” Flaw Allows Full ServiceNow User Impersonation

Security researcher has disclosed a critical vulnerability in ServiceNow’s Virtual Agent API and Now Assist AI Agents application, tracked as…

Threat Actors Abuse Browser Extensions to Deliver Fake Warning Messages
19
Jan
2026

Threat Actors Abuse Browser Extensions to Deliver Fake Warning Messages

Threat intelligence researchers at Huntress have uncovered a sophisticated browser extension campaign orchestrated by the KongTuke threat actor group, featuring…

New Kerberos Relay Technique Exploits DNS CNAMEs to Bypass Existing Defenses
19
Jan
2026

New Kerberos Relay Technique Exploits DNS CNAMEs to Bypass Existing Defenses

A critical vulnerability in Windows Kerberos authentication that enables attackers to conduct credential-relay attacks by exploiting DNS CNAME records. Tracked…

GhostPoster Malware Targets Chrome Users via 17 Rogue Extensions
19
Jan
2026

GhostPoster Malware Targets Chrome Users via 17 Rogue Extensions

A sophisticated malware campaign has compromised users of Chrome, Firefox, and Edge by deploying 17 malicious extensions that employ advanced…

Google Vertex AI Flaw Lets Low-Privilege Users Escalate to Service Agent Roles
17
Jan
2026

Google Vertex AI Flaw Lets Low-Privilege Users Escalate to Service Agent Roles

Security researchers have discovered critical privilege escalation vulnerabilities in Google’s Vertex AI platform that allow attackers with minimal permissions to…

Critical XSS Vulnerabilities in Meta Conversion API Enable Zero-Click Account Takeover
17
Jan
2026

Critical XSS Vulnerabilities in Meta Conversion API Enable Zero-Click Account Takeover

Security researchers have uncovered two critical cross-site scripting (XSS) vulnerabilities in Meta’s Conversions API Gateway that could enable attackers to…

Researchers Breach StealC Infrastructure, Access Malware Control Panels
17
Jan
2026

Researchers Breach StealC Infrastructure, Access Malware Control Panels

Criminal infrastructure often fails for the same reasons it succeeds: it is rushed, reused, and poorly secured. Security researchers recently…