A newly exposed malware framework, VoidLink, is reshaping how attackers manage implants across modern cloud and enterprise environments. Cisco Talos has now linked this framework to a threat actor tracked as UAT-9921, highlighting how on-demand compilation, modular plugins, and early…
Category: GBHackers Security | #1 Globally Trusted Cyber Security News Platform
MSHTML Framework Zero-Day Opens Door to Network-Based Security Bypass
Microsoft has disclosed a new zero-day vulnerability in the MSHTML Framework that allows attackers to bypass security features, posing significant risks to organizations worldwide. Tracked as CVE-2026-21513, this vulnerability was released on February 10, 2026, and has already been exploited…
Microsoft Office Word 0-Day Vulnerability Enables Attackers to Bypass Security Feature
Microsoft has disclosed a zero-day vulnerability in Microsoft Office Word that allows attackers to bypass security protections. Identified as CVE-2026-21514, this security flaw was officially documented on February 10, 2026, and poses significant risks to users worldwide. Vulnerability Overview CVE-2026-21514 is…
Desktop Window Manager Zero-Day Enables Privilege Escalation
A zero-day vulnerability in the Windows Desktop Window Manager (DWM) is currently under active exploitation. Microsoft released patches today, February 10, 2026, to address this flaw as part of the monthly security update cycle. The vulnerability, tracked as CVE-2026-21519, allows attackers…
GTIG Warns of Rising Espionage and Supply Chain Cyber Threats Targeting Defense Sector
The defense industry is facing an intense, multi-front cyber onslaught as espionage, personnel targeting, and supply chain attacks converge into a persistent, strategic risk to national security. Recent analysis from Google’s Threat Intelligence Group (GTIG) shows that state-backed actors and…
RU-APT-ChainReaver-L Hijacks Trusted Sites and GitHub in Sweeping Cross-Platform Supply Chain Attack
A newly exposed advanced persistent threat (APT) campaign, tracked as RU-APT-ChainReaver-L, is hijacking trusted file-hosting sites and long-standing GitHub accounts to deliver stealthy malware to Windows, macOS, and iOS users at scale. The campaign abuses popular mirror and file-distribution portals…
Ivanti Endpoint Manager Flaw Enables Remote Data Exposure
Ivanti has issued a high-security update for its Endpoint Manager (EPM) solution to address two significant vulnerabilities that could put organisational data at risk. The advisory, released on February 9, 2026, highlights a high-severity flaw that allows attackers to bypass…
Windows Remote Access Connection Manager Zero-Day Enables DoS Attacks
Microsoft has released urgent security updates to address a zero-day vulnerability in the Windows Remote Access Connection Manager (RasMan). Assigned the identifier CVE-2026-21525, this flaw is currently being exploited in the wild, meaning attackers were using it to target systems before…
Hackers Exploit ChatGPT, Grok and Google Ads to Spread macOS AMOS Stealer
Threat actors are abusing shareable ChatGPT and Grok conversations and pushing them with Google Search ads to trick macOS users into running Terminal commands that install the Atomic macOS Stealer (AMOS). This campaign shows how attackers now blend social engineering…
Windows Shell Zero-Day Vulnerability Allows Attackers to Bypass Authentication
Microsoft has issued an urgent security warning following the discovery of a zero-day vulnerability in the Windows Shell, now tracked as CVE-2026-21510. This critical flaw, which carries a high severity score of 8.8, is currently being exploited in the wild, forcing a…
Legacy IRC Botnet Leverages Automated SSH Exploit Pipeline to Mass-Enroll Linux Hosts
Identified through data captured by our SSH honeypots over two months, this campaign represents a sophisticated blend of eras. It merges “old-school” Internet Relay Chat (IRC) botnet tactics from the late 2000s with modern, automated mass-compromise techniques. While the infrastructure…
Cephalus Ransomware Emerges as Go-Based Double-Extortion Threat Exploiting Exposed RDP Access
A sophisticated ransomware operation known as Cephalus has emerged as a significant cybersecurity threat since mid-2025, exploiting exposed Remote Desktop Protocol (RDP) services to breach organizations worldwide. Developed in the Go programming language, this malware represents a growing trend of…
FortiOS Vulnerability Enables LDAP Authentication Bypass
Fortinet has issued a high-severity security advisory regarding a vulnerability in specific versions of its FortiOS operating system. The flaw, identified as CVE-2026-22153, could allow unauthorized attackers to bypass authentication mechanisms, potentially granting them access to critical network resources. The vulnerability…
GitLab Patches Multiple Vulnerabilities Enabling DoS and Cross-Site Scripting Attacks
GitLab has released critical security updates for its Community Edition (CE) and Enterprise Edition (EE) to address multiple high-severity vulnerabilities. These patches, detailed in the release notes for versions 18.8.4, 18.7.4, and 18.6.6, resolve flaws that could allow attackers to…
Microsoft Patch Tuesday February 2026 Fixes 54 Flaws, 6 Zero-Days Under Active Exploitation
Microsoft’s February 2026 Patch Tuesday update has arrived with critical urgency, addressing 54 security vulnerabilities across its ecosystem. This month’s release is particularly severe due to the inclusion of six zero-day vulnerabilities that are currently being exploited in the wild. Security teams are urged…
Coinbase Cartel Shifts to Data-Theft-First Tactics, Targeting High-Value Industries
A ransomware threat actor calling itself Coinbase Cartel has quickly become one to watch, not because it locks files, but because it often doesn’t. First seen in September 2025, the group claimed 14 victims in that single month and later…
Hackers Weaponize 7-Zip Downloads to Turn Home PCs Into Proxy Nodes
A fake website impersonating the popular 7-Zip file archiver has been distributing malicious software that secretly converts infected computers into residential proxy nodes. The counterfeit site has been operating undetected for an extended period, exploiting user trust in what appears…
TeamPCP Turns Cloud Misconfigurations Into a Self-Propagating Cybercrime Platform
TeamPCP, operating under aliases including PCPcat, ShellForce, and DeadCatx3, emerged in late 2025 as a cloud-native cybercrime operation that transforms misconfigured infrastructure into automated attack platforms. Unlike traditional malware groups, this threat actor doesn’t break into systems they walk through…
SAP Security Patch Day Fixes Critical Code Injection Flaw in SAP CRM and S/4HANA
SAP said the February 10, 2026 Patch Day delivered fixes across multiple SAP products and urged customers to apply patches with priority via the Support Portal to protect their SAP landscape. The highest-risk item highlighted this month is CVE-2026-0488, described…
React2Shell Vulnerability Exploited in the Wild, Analysts Warn
React2Shell (CVE-2025-55182) is a critical, pre-auth remote code execution weakness in React Server Components that impacts multiple React versions used across the React 19 ecosystem. WXA Internet Abuse Signal Collective (WXA IASC) is inaugurating To Cache A Predator, a threat research…