Category: GBHackers Security | #1 Globally Trusted Cyber Security News Platform

Analysis of VoidLink: A Cloud-Native Malware Threat Targeting Linux Systems

A sophisticated Linux malware framework, VoidLink, has been identified by Check Point Research, representing a significant escalation in threats targeting cloud-native environments. The advanced framework, developed by Chinese-affiliated developers, combines custom loaders, implants, rootkits, and over 30 modular plugins specifically…

HoneyTrap: Outsmarting Jailbreak Attacks on Large Language Models

Researchers from Shanghai Jiao Tong University, the University of Illinois at Urbana-Champaign, and Zhejiang University have unveiled HoneyTrap, a groundbreaking deceptive defense framework designed to counter progressively intensifying jailbreak attacks on large language models. The novel approach leverages collaborative multi-agent…

PowerShell-Driven Multi-Stage Windows Malware Using Text Payloads

Security researchers have identified a sophisticated multi-stage malware campaign dubbed SHADOW#REACTOR that chains together obfuscated Visual Basic Script (VBS) execution, resilient PowerShell stagers, text-only payload delivery mechanisms, and .NET Reactor–protected in-memory loaders to deploy Remcos RAT while evading detection and…

5 Facts You Should Know About Cybersecurity

Are you fascinated by the world of cybersecurity? If so, then keep on reading. We are going to be listing five facts about the cybersecurity world, and explaining them. Are you interested in a degree in cybersecurity? You can learn…

Hackers Remotely Took Control of an Apex Legends Player’s Inputs

A critical security vulnerability has emerged in Respawn Entertainment’s popular battle royale title, allowing threat actors to remotely manipulate player inputs without requiring code execution capabilities. Respawn Entertainment, the developer of Apex Legends, has confirmed an active security incident affecting…

3 Best Android Apps to Help College Students

For college students, it’s always difficult to keep all their lessons and homework well-organized as well as manage their time. Sometimes for some of them, it may seem that life turns into an endless circle, and every new day just…

ServiceNow Vulnerability Enables Privilege Escalation Without Authentication

A critical privilege escalation vulnerability has been identified in ServiceNow’s AI Platform, posing significant risks to enterprise users worldwide. Tracked as CVE-2025-12420, this security flaw allows unauthenticated attackers to impersonate other users and execute unauthorized operations based on the compromised account’s…

DPRK Hackers Earn $600M Posing as Remote Workers

The landscape of corporate espionage has undergone a fundamental transformation. For decades, security teams focused their efforts on identifying disgruntled employees or negligent contractors the traditional “insider threat.” Today, the most dangerous infiltrator is not a rogue staffer but rather…

CISA Alerts on Actively Exploited Gogs Path Traversal Flaw

The Cybersecurity and Infrastructure Security Agency (CISA) has added a critical vulnerability in Gogs, a self-hosted Git service, to its Known Exploited Vulnerabilities catalog, warning that the flaw is being actively exploited in the wild. Critical Vulnerability Details Tracked as CVE-2025-8110,…

New Angular Vulnerability Allows Attackers to Execute Malicious Payloads

A high Cross-Site Scripting (XSS) vulnerability has been discovered in Angular’s Template Compiler, potentially exposing millions of web applications to malicious JavaScript execution. The flaw, tracked as CVE-2026-22610, affects multiple versions of Angular’s core packages and carries a High severity rating with a…