❌

Normal view

There are new articles available, click to refresh the page.
Yesterday β€” 24 January 2026Main stream

Poland's energy grid was targeted by never-before-seen wiper malware

24 January 2026 at 14:08

Researchers on Friday said that Poland’s electric grid was targeted by wiper malware, likely unleashed by Russia state hackers, in an attempt to disrupt electricity delivery operations.

A cyberattack, Reuters reported, occurred during the last week of December. The news organization said it was aimed at disrupting communications between renewable installations and the power distribution operators but failed for reasons not explained.

Wipers R Us

On Friday, security firm ESET said the malware responsible was a wiper, a type of malware that permanently erases code and data stored on servers with the goal of destroying operations completely. After studying the tactics, techniques, and procedures (TTPs) used in the attack, company researchers said the wiper was likely the work of a Russian government hacker group tracked under the name Sandworm.

Read full article

Comments

Β© Getty Images

Before yesterdayMain stream

From Incident to Insight: How Forensic Recovery Drives Adaptive Cyber Resilience

23 January 2026 at 10:07
=

When ransomware cripples a business’s systems or stealthy malware slips past defenses, the first instinct is to get everything back online as quickly as possible. That urgency is understandable β€” Cybersecurity Ventures estimates ransomware damage costs $156 million per day. But businesses cannot let speed overshadow the more pressing need to understand exactly what happened,..

The post From Incident to Insight: How Forensic Recovery Drives Adaptive Cyber Resilience appeared first on Security Boulevard.

Fake Captcha Exploits Trusted Web Infrastructure to Distribute Malware

23 January 2026 at 08:03

Fake Captcha and β€œClickFix” lures have emerged as among the most persistent and deceptive malware-delivery mechanisms on the modern web. These pages mimic legitimate verification challenges from trusted services like Cloudflare, tricking users into executing malicious commands disguised as security checks or browser validation steps. What appears to be a routine security interstitial something millions […]

The post Fake Captcha Exploits Trusted Web Infrastructure to Distribute Malware appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

Threat Actors Exploit LNK Files to Deploy MoonPeak Malware on Windows Systems

23 January 2026 at 06:29

A sophisticated three-stage malware attack campaign against Windows users in South Korea using specially crafted LNK (shortcut) files. The attack begins with a deceptive LNK file named β€œμ‹€μ „ νŠΈλ ˆμ΄λ”© 핡심 λΉ„λ²•μ„œ.pdf.lnk” (translating to β€œPractical Trading Core Secret Book”), specifically crafted to target South Korean investors seeking financial guidance. This social engineering approach exploits users’ trust […]

The post Threat Actors Exploit LNK Files to Deploy MoonPeak Malware on Windows Systems appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

Hackers Disable Windows Security With New Malware Attack

23 January 2026 at 05:00

Unlike traditional attacks that rely on exploits, this succeeds through social engineering combined with abuse of Windows' own security architecture.

The post Hackers Disable Windows Security With New Malware Attack appeared first on TechRepublic.

Hackers Disable Windows Security With New Malware Attack

23 January 2026 at 05:00

Unlike traditional attacks that rely on exploits, this succeeds through social engineering combined with abuse of Windows' own security architecture.

The post Hackers Disable Windows Security With New Malware Attack appeared first on TechRepublic.

New Multi-Stage Windows Malware Disables Microsoft Defender, Deploys Malicious Payloads

22 January 2026 at 01:26

A sophisticated multi-stage malware campaign targeting Russian users, leveraging social engineering, legitimate cloud services, and native Windows functionality to achieve full system compromise without exploiting vulnerabilities. The campaign begins with deceptively crafted business-themed documents delivered via compressed archives. Victims receive Russian-language files that appear to be routine accounting tasks, but the archive contains a malicious […]

The post New Multi-Stage Windows Malware Disables Microsoft Defender, Deploys Malicious Payloads appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

New AI-Powered Android Malware Automatically Clicks Ads on Infected Devices

22 January 2026 at 00:30

A sophisticated new Android malware family dubbed β€œAndroid.Phantom” that leverages artificial intelligence to automate ad-clicking fraud while establishing a persistent command-and-control infrastructure through dual-mode operation. The malware operates through two distinct modes β€œphantom” and β€œsignaling” controlled from theΒ hxxps://dllpgd[.]clickΒ command server. The ML model downloads fromΒ hxxps://app-download[.]cn-wlcb[.]ufileos[.]comΒ and analyzes screenshots of virtual screens to identify and automatically click ad […]

The post New AI-Powered Android Malware Automatically Clicks Ads on Infected Devices appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

ClearFake malware Exploits Proxy Execution to Run Malicious PowerShell Commands via Trusted Windows Feature

21 January 2026 at 23:57

A sophisticated evolution of the ClearFake malware campaign has emerged, deploying advanced evasion techniques that abuse legitimate Windows components to bypass endpoint detection systems. The operation, which has compromised hundreds of websites since August 2025, now leverages a command injection vulnerability in a trusted Windows script to silently execute malicious PowerShell code, while hosting its […]

The post ClearFake malware Exploits Proxy Execution to Run Malicious PowerShell Commands via Trusted Windows Feature appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

VoidLink Emerges: First Fully AI-Driven Malware Signals a New Era of Cyber Threats

21 January 2026 at 06:59

A sophisticated Linux malware framework developed almost entirely through artificial intelligence, marking the beginning of a new era in AI-powered threats. Unlike previous AI-generated malware linked to inexperienced threat actors, VoidLink represents the first documented case of high-complexity, production-grade malware authored by AI under the direction of a skilled developer. Development artifacts exposed through operational […]

The post VoidLink Emerges: First Fully AI-Driven Malware Signals a New Era of Cyber Threats appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

Weaponized Shipping Documents Spread Remcos RAT in Stealthy Malware Campaign

21 January 2026 at 03:15

A sophisticated phishing campaign distributing a fileless variant of Remcos RAT, a commercial remote access tool offering extensive capabilities, including system resource management, remote surveillance, network management, and agent control. The campaign initiates through phishing emails impersonating Vietnamese shipping companies, tricking recipients into opening attached Word documents under the pretense of viewing updated shipping documents. […]

The post Weaponized Shipping Documents Spread Remcos RAT in Stealthy Malware Campaign appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

❌
❌