Category: GBHackers Security | #1 Globally Trusted Cyber Security News Platform

LLMs Supercharge Ransomware Speed, Scale, and Global Reach

Large language models are not fundamentally transforming ransomware operations. However, they are dramatically accelerating the threat landscape through measurable gains in speed, volume, and multilingual capabilities. According to SentinelLABS research, adversaries are leveraging LLMs across reconnaissance, phishing, tooling assistance, data…

CastleLoader Malware Targets U.S. Government Agencies

Security researchers are sounding the alarm over CastleLoader, a stealthy first-stage malware loader now implicated in campaigns targeting US-based government entities and multiple high-value industries. According to a recent deep-dive by ANY.RUN’s malware analysis team, the loader has been observed…

Google Releases Chrome 144, Fixing 10 V8 Engine Vulnerabilities

Google has launched Chrome 144 for desktop platforms, addressing ten security vulnerabilities including multiple high-severity flaws in the V8 JavaScript engine. The stable channel update began rolling out on January 13, 2026, for Windows, Mac, and Linux systems. Chrome 144.0.7559.59…

Top 10 Best Android Games for 2026

Are you looking for the Best Android games? Here we have list Top 15 best Android games free with an updated list to enjoy your free time. Video games have always been the favorite entertainment for most of us. Starting…

10 Best Android Keyboard Apps for Android Users in 2026

Everybody loves a little personalized smartphone and keyboard are no exception to that, users can opt from different Android keyboard apps on play store to personalize their keyboard and typing routines. The cool Keyboard apps express our thoughts and feelings…

Top 5 Snapchat Track Apps for Android – 2026

Snapchat Track Apps: Social media apps are some of the most used apps on smartphones and Snapchat is up there. Snapchat is especially popular among youngsters. Here, teenagers share short videos ‘snaps’, pictures and gifs. However, parents who have concerns…

Microsoft Desktop Window Manager Zero-Day Exploited in Active Attacks

Microsoft has disclosed a critical information disclosure vulnerability in the Desktop Window Manager that threat actors are actively exploiting. The vulnerability, tracked as CVE-2026-20805, was publicly released on January 13, 2026, and allows authenticated local attackers to access sensitive information…

An AI-Driven Game-Theoretic Approach to Attack and Defense

A new research effort from Alias Robotics and Johannes Kepler University Linz proposes a game-theoretic “brain” for cybersecurity AI, aiming to push automated penetration testing and defense planning beyond human-level performance. The work introduces Generative Cut-the-Rope (G-CTR), a guidance layer…

FortiOS and FortiSwitchManager Flaw Allows Remote Code Execution

A high heap-based buffer overflow vulnerability in the cw_acd daemon component of Fortinet’s FortiOS and FortiSwitchManager has been disclosed, enabling remote unauthenticated attackers to execute arbitrary code on affected systems. The vulnerability, tracked as CVE-2025-25249, carries a high CVSS v3.1…

Analysis of VoidLink: A Cloud-Native Malware Threat Targeting Linux Systems

A sophisticated Linux malware framework, VoidLink, has been identified by Check Point Research, representing a significant escalation in threats targeting cloud-native environments. The advanced framework, developed by Chinese-affiliated developers, combines custom loaders, implants, rootkits, and over 30 modular plugins specifically…

HoneyTrap: Outsmarting Jailbreak Attacks on Large Language Models

Researchers from Shanghai Jiao Tong University, the University of Illinois at Urbana-Champaign, and Zhejiang University have unveiled HoneyTrap, a groundbreaking deceptive defense framework designed to counter progressively intensifying jailbreak attacks on large language models. The novel approach leverages collaborative multi-agent…

PowerShell-Driven Multi-Stage Windows Malware Using Text Payloads

Security researchers have identified a sophisticated multi-stage malware campaign dubbed SHADOW#REACTOR that chains together obfuscated Visual Basic Script (VBS) execution, resilient PowerShell stagers, text-only payload delivery mechanisms, and .NET Reactor–protected in-memory loaders to deploy Remcos RAT while evading detection and…