The European Parliament has taken a precautionary step by disabling built-in artificial intelligence features on work devices issued to lawmakers and staff members, citing unresolved cybersecurity and data protection risks. The decision follows an internal IT security assessment that identified potential vulnerabilities…
Category: GBHackers Security | #1 Globally Trusted Cyber Security News Platform
New Sophisticated ‘Carding-as-a-Service’ Marketplaces Fuel Surge in Credit Card Fraud
Credit card fraud has matured into a service-based criminal economy where stolen cards, malware, and support are bundled and sold like commercial products. Underground “dump shops” such as Findsome, UltimateShop, and Brian’s Club now operate as full-fledged carding-as-a-service (CaaS) marketplaces, mirroring legitimate…
DigitStealer Infostealer Targets macOS, Revealing Critical Infrastructure Vulnerabilities
DigitStealer is an increasingly active macOS‑targeting infostealer whose predictable command‑and‑control (C2) setup exposes structural weaknesses in its operators’ infrastructure decisions. While technically sophisticated on the endpoint, its reuse of the same providers, protocols, and registration patterns has made much of…
Firefox v147.0.3 Released with Critical Fix for Heap Buffer Overflow Vulnerability
Mozilla has released an emergency security update for Firefox, addressing a critical heap buffer overflow vulnerability in the libvpx library. The update, version 147.0.4, was announced on February 16, 2026, alongside corresponding patches for Firefox ESR 140.7.1 and ESR 115.32.1.…
Malicious Fork of Legitimate Triton App Discovered on GitHub, Exposing New Malware Threat
Attackers have weaponized a malicious fork of the legitimate Triton macOS client for omg.lol, turning a trusted open-source project into a delivery channel for Windows malware hosted on GitHub. The campaign abuses GitHub’s forking model, misleading README content, and obscure…
Microsoft Teams Leverages AI Workflows with Microsoft 365 Copilot for Task Automation
Microsoft is rolling out AI Workflows in the Teams Workflows app, bringing intelligent automation capabilities powered by Microsoft 365 Copilot to help users streamline daily operations and automate complex tasks. The feature uses scheduled Copilot prompts through predefined templates, making…
Apache NiFi Vulnerabilities Expose Systems to Authorization Bypass Attacks
Apache NiFi users are being urged to upgrade after the project disclosed a high-severity authorization flaw tracked as CVE-2026-25903. The issue, published on 2026-02-16, can allow a less-privileged authenticated user to modify configuration properties on certain “restricted” extension components that…
QR Codes Exploited for Phishing Attacks and Malware Spread on Mobile Devices
QR code abuse has become a significant mobile threat vector, with attackers using it to deliver phishing pages, trigger in‑app account takeovers, and distribute malicious applications outside official app stores. Because people routinely scan QR codes for payments, menus and…
Malicious Chrome Extension Exposes Facebook Business Manager Accounts to 2FA and Analytics Theft
A malicious Google Chrome extension, CL Suite by @CLMasters, which masquerades as a productivity tool for Meta Business Suite while silently stealing sensitive authentication data. Although the extension markets itself as a solution to “remove verification popups” and “generate 2FA codes,”…
0APT Ransomware Group Claims 200 Victims, Fails to Provide Proof
A new ransomware-as-a-service (RaaS) outfit calling itself 0APT has quickly drawn attention for all the wrong reasons, after loudly claiming to have compromised around 200 victims while failing to provide any verifiable proof of compromise. Emerging on or around January 28, 2026,…
Langchain Community SSRF Bypass Vulnerability Exposes Internal Services to Unauthorized Access
The Langchain development team has released a critical security update for the @langchain/community package to address a Server-Side Request Forgery (SSRF) vulnerability. Identified as CVE-2026-26019, this flaw exists within the RecursiveUrlLoader class, a utility used for web crawling. If left unpatched, the vulnerability allows…
25 Vulnerabilities Found in Cloud Password Managers, Exposing Users to Unauthorized Access and Changes
The three major cloud-based password managers, such as Bitwarden, LastPass, and Dashlane, collectively serve approximately 60 million users. Despite marketing claims of “zero-knowledge encryption,” the research team demonstrated that these platforms contained vulnerabilities allowing attackers to view or modify stored…
Threat Actors Target OpenClaw Configurations to Steal Login Credentials
A new wave of infostealer activity targeting OpenClaw, an emerging AI assistant platform. The discovery marks a major turning point in the behavior of infostealer malware moving beyond browser and cryptocurrency theft to focus on AI configuration environments that hold deep…
Noodlophile Malware Authors Use Fake Job Ads and Phishing Schemes to Evolve Tactics
Hey folks in the threat‑hunting world looks like our coverage of the Noodlophile infostealer has struck a nerve with its creators. The operators used inflated engagement metrics and fake popularity scores to lure victims into downloading malicious ZIP archives. Once executed, these…
Windows 11 KB5077181 Update Triggers Infinite Restart Loop on Some Devices
Microsoft’s February 10, 2026, Patch Tuesday cumulative update KB5077181 for Windows 11 is being linked to severe boot failures on some devices, with users reporting systems that restart repeatedly and never reach the desktop. The issue is primarily discussed across community threads,…
Cybersecurity Alert: Fake Shops Target Winter Olympics 2026 Fans for Attacks
The excitement surrounding the Milano-Cortina 2026 Winter Olympics has given cybercriminals a new opportunity to trick fans. The adorable stoat mascots, Tina and Milo, have become international sensations especially their official 27 cm plush version, which quickly sold out on…
Joomla Vulnerabilities in Novarain/Tassos Framework Expose SQL Injection Risks
Joomla site owners using extensions that bundle the Novarain/Tassos Framework are being warned after a source code review identified multiple attack primitives that can be chained together to achieve administrator takeover and reliable remote code execution (RCE) on unpatched instances.…
CleanTalk Plugin for WordPress Exposes Sites to Authorization Bypass via Reverse DNS
A critical vulnerability in the popular CleanTalk Spam Protection plugin for WordPress exposes websites to complete takeover. Tracked as CVE-2026-1490, this high-severity flaw allows unauthenticated attackers to bypass authorization mechanisms and install arbitrary plugins on affected sites. The vulnerability carries…
Hackers Exploit ‘Summarize with AI’ Feature to Inject Malicious Prompts into AI Recommendations
Hackers and marketers are increasingly abusing “Summarize with AI” buttons and AI-share links to quietly plant persistent instructions in AI assistants’ memory, a growing attack trend Microsoft calls AI Recommendation Poisoning. By silently biasing what assistants “remember” as trusted or preferred…
OpenClaw Founder Peter Steinberger Joins OpenAI to Strengthen AI Research
OpenClaw founder Peter Steinberger says he is joining OpenAI to help “bring agents to everyone,” positioning the move as a way to accelerate development while putting stronger safety work around consumer-grade AI automation. In a Feb. 14, 2026, blog post,…