Tag: GBHackers Security | #1 Globally Trusted Cyber Security News Platform

New Study Finds GPT-5.2 Can Reliably Develop Zero-Day Exploits at Scale

Advanced large language models can autonomously develop working exploits for zero-day vulnerabilities, marking a significant shift in the offensive cybersecurity landscape. The research demonstrates that artificial intelligence systems can now perform complex exploit development tasks that previously required specialized human…

Discord Exploited to Spread Clipboard Hijacker Stealing Cryptocurrency Funds

CloudSEK’s STRIKE team has uncovered a sophisticated cryptocurrency theft operation orchestrated by the threat actor “RedLineCyber,” who deliberately impersonates the notorious RedLine Solutions to establish credibility within underground communities. Rather than collecting comprehensive system data, the malware employs a highly…

SolyxImmortal Malware Abuses Discord to Quietly Harvest Sensitive Information

A newly discovered information-stealing malware, SolyxImmortal, has emerged as a persistent surveillance threat targeting Windows users. Distributed through underground Telegram channels, this Python-based implant combines credential theft, document harvesting, keystroke logging, and screen capture capabilities into a continuously running surveillance…

WhisperPair Vulnerability Allows Attackers to Pair Devices Without User Consent

Google’s Fast Pair technology has revolutionised Bluetooth connectivity, enabling seamless one-tap pairing across supported accessories and account synchronisation for millions of users.  However, a critical vulnerability discovered in flagship audio accessories threatens the security of hundreds of millions of devices.  Attribute  Details …

Cybercriminals Impersonate Malwarebytes to Steal User Credentials

As part of an ongoing effort to highlight active and technically interesting intrusions, a new “Flash Hunting Findings” investigation has uncovered a short but well‑structured malware campaign impersonating MalwareBytes to deliver infostealers and steal user logins and crypto‑wallet data. The…

CIRO Confirms Data Breach Impacting 750,000 Canadian Investors

The Canadian Investment Regulatory Organization (CIRO) has officially confirmed a significant data breach affecting approximately 750,000 Canadian investors, stemming from a sophisticated phishing attack initially detected in August 2025.   The organization publicly disclosed the incident on January 14, 2026, following a comprehensive…

Pulsar RAT Abuses Memory-Only Execution and HVNC for Stealthy Remote Takeover

Pulsar RAT, an advanced evolution of the open-source Quasar RAT, is actively targeting Windows systems with enhanced stealth capabilities and fileless execution techniques.  This modular remote access trojan combines memory-only loading, hidden virtual network computing (HVNC), and cryptocurrency wallet clipping to establish persistent backdoor…