Category: GBHackers Security | #1 Globally Trusted Cyber Security News Platform

Microsoft Desktop Window Manager Zero-Day Exploited in Active Attacks

Microsoft has disclosed a critical information disclosure vulnerability in the Desktop Window Manager that threat actors are actively exploiting. The vulnerability, tracked as CVE-2026-20805, was publicly released on January 13, 2026, and allows authenticated local attackers to access sensitive information…

An AI-Driven Game-Theoretic Approach to Attack and Defense

A new research effort from Alias Robotics and Johannes Kepler University Linz proposes a game-theoretic “brain” for cybersecurity AI, aiming to push automated penetration testing and defense planning beyond human-level performance. The work introduces Generative Cut-the-Rope (G-CTR), a guidance layer…

FortiOS and FortiSwitchManager Flaw Allows Remote Code Execution

A high heap-based buffer overflow vulnerability in the cw_acd daemon component of Fortinet’s FortiOS and FortiSwitchManager has been disclosed, enabling remote unauthenticated attackers to execute arbitrary code on affected systems. The vulnerability, tracked as CVE-2025-25249, carries a high CVSS v3.1…

Analysis of VoidLink: A Cloud-Native Malware Threat Targeting Linux Systems

A sophisticated Linux malware framework, VoidLink, has been identified by Check Point Research, representing a significant escalation in threats targeting cloud-native environments. The advanced framework, developed by Chinese-affiliated developers, combines custom loaders, implants, rootkits, and over 30 modular plugins specifically…

HoneyTrap: Outsmarting Jailbreak Attacks on Large Language Models

Researchers from Shanghai Jiao Tong University, the University of Illinois at Urbana-Champaign, and Zhejiang University have unveiled HoneyTrap, a groundbreaking deceptive defense framework designed to counter progressively intensifying jailbreak attacks on large language models. The novel approach leverages collaborative multi-agent…

PowerShell-Driven Multi-Stage Windows Malware Using Text Payloads

Security researchers have identified a sophisticated multi-stage malware campaign dubbed SHADOW#REACTOR that chains together obfuscated Visual Basic Script (VBS) execution, resilient PowerShell stagers, text-only payload delivery mechanisms, and .NET Reactor–protected in-memory loaders to deploy Remcos RAT while evading detection and…

5 Facts You Should Know About Cybersecurity

Are you fascinated by the world of cybersecurity? If so, then keep on reading. We are going to be listing five facts about the cybersecurity world, and explaining them. Are you interested in a degree in cybersecurity? You can learn…

Hackers Remotely Took Control of an Apex Legends Player’s Inputs

A critical security vulnerability has emerged in Respawn Entertainment’s popular battle royale title, allowing threat actors to remotely manipulate player inputs without requiring code execution capabilities. Respawn Entertainment, the developer of Apex Legends, has confirmed an active security incident affecting…

3 Best Android Apps to Help College Students

For college students, it’s always difficult to keep all their lessons and homework well-organized as well as manage their time. Sometimes for some of them, it may seem that life turns into an endless circle, and every new day just…

ServiceNow Vulnerability Enables Privilege Escalation Without Authentication

A critical privilege escalation vulnerability has been identified in ServiceNow’s AI Platform, posing significant risks to enterprise users worldwide. Tracked as CVE-2025-12420, this security flaw allows unauthenticated attackers to impersonate other users and execute unauthorized operations based on the compromised account’s…

DPRK Hackers Earn $600M Posing as Remote Workers

The landscape of corporate espionage has undergone a fundamental transformation. For decades, security teams focused their efforts on identifying disgruntled employees or negligent contractors the traditional “insider threat.” Today, the most dangerous infiltrator is not a rogue staffer but rather…