1010.cx

  • US investors warm to Ukrainian defense startups—but export laws slow cooperation

    ·

    Science & Tech
    Ukrainian companies are attracting American private investment and Pentagon interest with award-winning drones, but U.S. export laws threaten to squelch efforts to develop technology, company execs said Friday.

    U.S. investors are pouring money into Ukrainian defense startups. For example, Swarmer, which makes AI software to control multiple drones simultaneously, saw its shares rise 700 percent on its first day of trading.

    Meanwhile, a joint effort of Ukraine’s SkyFall and UK’s SkyCutter won the initial competition of a series held by the Pentagon’s Drone Dominance effort, which would grow by several thousand percent to $54 billion under the White House’s 2027 budget plan. Several other Ukrainian drone companies took spots on the leaderboard. 

    “We're excited about that,” Undersecretary of Defense for Research and Engineering Emil Michael told reporters at the Pentagon last week. “These companies now that have gotten big and had a lot of expertise, if they're willing to do it in America, because we want to control our own supply chains. I think that's excellent.”

    But Ukrainian companies say U.S. export-control laws make it all but impossible to build cutting-edge defense products in the United States. Take Airlogix, which has a joint venture with Auterion, a U.S.-German company, to develop and build drones in the United States. The company has found it can take four months to obtain licenses to send its U.S.-developed tech to Ukraine, even if the tech it developed in the United States is based on information from the Ukrainian front line. 

    “That is not fast, I would say. We iterate with a pace of weeks, not months,” Airlogix CTO Mykola Mazur said Friday at the Special Competitive Studies Project AI+ Expo in Washington D.C.

    This should be remedied, perhaps by granting Ukraine a special status, like designating Taiwan a major non-NATO ally, said John Hardie, the deputy director of the Foundation for Defense of Democracies’ Russia Program.

    Failure to lift the barriers will slow the Pentagon’s efforts to buy the best drone and counter-drone technology, which increasingly comes from Ukraine, said Joseph Gagnard, who runs U.S. field operations for Swarmer.

    “There has to be some sort of middle ground where the government says, ‘OK, this technology is born in Ukraine. This technology was shared with the United States for our benefit. There's got to be some sort of expedited ITAR process that is going to encourage countries to do this—Ukraine specifically,’” Gagnard said Friday.

    ]]>

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • OpenClaw Malware Targets Crypto Wallets and Bitwarden Credentials

    ·

    cyber security, Cyber Security News, Malware

    OpenClaw users are being targeted in a fresh malware campaign that abuses a fake installer to steal credentials from popular crypto wallets and password managers, including MetaMask, Phantom, and Bitwarden. The archive contains a 130MB Rust executable padded with fake documentation to evade antivirus file-size scanning limits and many automated sandbox upload thresholds. The PE […]

    The post OpenClaw Malware Targets Crypto Wallets and Bitwarden Credentials appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Crimenetwork Bust Reveals 22,000 Members and Over 100 Illicit Vendors

    ·

    Cyber Crime, cyber security, Cyber Security News

    Law enforcement authorities have successfully dismantled the relaunched version of “Crimenetwork,” a prominent criminal online trading platform. A 35-year-old German citizen, suspected of operating the illicit platform, was apprehended at his residence in Mallorca, Spain, by a special unit of the Spanish National Police acting on a European Arrest Warrant. Crimenetwork Bust Reveals Illicit Vendors […]

    The post Crimenetwork Bust Reveals 22,000 Members and Over 100 Illicit Vendors appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • ShinyHunters Exploits Canvas LMS Free Teacher Accounts in New Breach

    ·

    cyber security, Cyber Security News

    In early May 2026, ShinyHunters breached Instructure’s Canvas LMS by abusing the Free-For-Teacher (FFT) account program, triggering an active extortion campaign and exposing student and faculty data across thousands of schools worldwide. ShinyHunters claimed responsibility on 3 May and published a ransom note threatening to leak stolen data if payment was not made. The exposure […]

    The post ShinyHunters Exploits Canvas LMS Free Teacher Accounts in New Breach appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Fake OpenAI Privacy Filter Repo Hits #1 on Hugging Face, Draws 244K Downloads

    ·

    A malicious Hugging Face repository managed to take a spot in the platform’s trending list by impersonating OpenAI’s Privacy Filter open-weight model to deliver a Rust-based information stealer to Windows users. The project, named Open-OSS/privacy-filter, masqueraded as its legitimate counterpart, released by OpenAI late last month (openai/privacy-filter), including copying the entire

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Windows CreateFileW API Flaw Could Let Attackers Lock SMB Files at Scale

    ·

    CVE/vulnerability, cyber security, Cyber Security News, vulnerability, Windows

    The multi-billion-dollar ransomware defence industry operates on a fundamental assumption: to cause catastrophic operational damage, malicious actors must write corrupted data to a disk. However, a newly disclosed attack technique, GhostLock, completely invalidates this foundational premise by demonstrating how threat actors can paralyze enterprise file systems without encrypting a single byte. Published in May 2026 […]

    The post Windows CreateFileW API Flaw Could Let Attackers Lock SMB Files at Scale appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Weaponized JPEG file Drops Trojanized ScreenConnect Malware

    ·

    cyber security, Cyber Security News, Malware

    Hackers are abusing a weaponized JPEG file to quietly install a trojanized version of the ConnectWise ScreenConnect remote‑access tool on Windows systems, enabling full surveillance, credential theft, and long‑term control over compromised networks. The campaign shows how a simple‑looking image attachment can hide a multi‑stage PowerShell intrusion chain that blends into legitimate enterprise software. Researchers […]

    The post Weaponized JPEG file Drops Trojanized ScreenConnect Malware appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • macOS Malware Abuses Google Ads and Claude Shared Chats to Deliver Payloads

    ·

    cyber security, Cyber Security News, Google, macOS, Malware

    Threat actors are deploying a sophisticated malvertising campaign targeting macOS users by exploiting Google Ads and legitimate Anthropic Claude shared chats. Security researcher Berk Albayrak uncovered this novel attack chain on May 10, which distributes a variant of the MacSync malware. Disguised as an official installation guide for “Claude Code on Mac,” this campaign highlights […]

    The post macOS Malware Abuses Google Ads and Claude Shared Chats to Deliver Payloads appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • ODINI Malware Uses CPU Magnetic Signals to Exfiltrate Data from Air-Gapped Systems

    ·

    cyber security, Cyber Security News, Malware

    Air-gapped systems and Faraday cages have long represented the gold standard for protecting critical infrastructure and sensitive military networks. However, a groundbreaking threat known as ODINI demonstrates that even these extreme isolation measures can be compromised. Researchers have developed a new technique in which malicious software exploits low-frequency magnetic fields generated by a computer’s central […]

    The post ODINI Malware Uses CPU Magnetic Signals to Exfiltrate Data from Air-Gapped Systems appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • New cPanel and WHM Vulnerabilities Expose Servers to Code Execution and DoS Attacks

    ·

    CVE/vulnerability, cyber security, Cyber Security News, Vulnerabilities, vulnerability

    cPanel and WebHost Manager (WHM) are critical administrative control panels used by hosting providers globally to manage servers, websites, and databases. Due to their widespread deployment, vulnerabilities in these platforms immediately become high-value targets for threat actors. On May 8, 2026, researchers disclosed three severe security flaws impacting cPanel, WHM, and the WP Squared platform. […]

    The post New cPanel and WHM Vulnerabilities Expose Servers to Code Execution and DoS Attacks appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

1 2 3 … 771
Next Page

1010.cx

cybersecurity / defense / intelligence