-
Tyler Robert Buchanan, a 24-year-old British hacker linked to Scattered Spider, admits to a multi-year US hacking scheme involving at least $8M in crypto theft.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Hackers are abusing a trusted Intel utility to quietly launch advanced malware by hijacking the .NET AppDomain mechanism, allowing malicious code to run inside a signed executable and evade many enterprise defenses. The campaign, dubbed Operation PhantomCLR by researchers, targets financial and other organizations in the Middle East and wider EMEA region using highly targeted […]
The post Intel Utility Hijacked in AppDomain Attack to Launch Malware appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
This week in cybersecurity from the editors at Cybercrime Magazine
Sausalito, Calif. – Apr. 20, 2026The Cybercrime Magazine Podcast tops Million Podcast’s curated list of the best 60 cybercrime podcasts to listen to in 2026.
These podcasts are ranked based on their Apple review count, Apple and Spotify ratings, monthly listeners, activeness, subject expertise and overall authority within the niche.
The average length of each Cybercrime Magazine Podcast episode is 5 minutes, compared to some of the most popular Podcasts that run as long as 30 minutes to an hour.
The Cybercrime Magazine Podcast is especially popular with Fortune 500, Global 2000 and midmarket chief information security officers and security leaders, who are very protective of their time and selective about where they spend it.
“I’m a Cybercrime Magazine subscriber because their content is both brief and meaningful,” says Adam Keown, CISO at Eastman, a Fortune 500 global specialty materials company with 13,000 employees in more than 100 countries. “The accessibility on my podcast platform or YouTube allows me to enjoy it whenever I have time.”
“Our Podcast, also known as Cybercrime Radio, resembles radio station programming with short spots such a daily news coverage,” says Steve Morgan, executive producer of the Podcast. “We mix in 12-15 minute interviews with CISOs, ex-cybercriminals, thought leaders, and even some Hollywood celebrities,” adds Morgan.
The University of San Diego lists the Cybercrime Magazine Podcast as one of the Top 24 Cybersecurity Podcasts and describes it as a place to discover the latest cybersecurity facts, figures and stats wiith topics including women in cybersecurity, cyber programs at high schools and colleges, highlights from industry events such as DEF CON, and more.
According to Listen Notes, which is like Google for Podcasts, the Cybercrime Magazine Podcast is one of the top 5 percent most popular shows out of more than 3.1 million podcasts globally.
FeedSpot, which indexes content from hundreds of thousands of global sources and publishes a list of the 100 best cybersecurity podcasts from thousands of podcasts on the web and ranked by traffic, social media followers and freshness, indicates that the Cybercrime Magazine Podcast puts out the most episodes per day, per week, per month, and per year, compared to all other cybercrime and cybersecurity podcasts.
“We continuously poll CISOs, especially at large enterprises, to find out what content they are most interested in,” says Morgan. “It’s not what you’d think. CISOs are overloaded with the same content from many media sources. They definitely want to learn about new cybersecurity companies and solutions, but they’re also looking for entertainment value.”
The CTO Club names its 20 Cybersecurity Podcasts for Tech Leaders in 2026, and picks the Cybercrime Magazine Podcast for providing a knowledgeable and accessible approach to understanding the complexities of cybercrime and cybersecurity, making it a must-listen for industry professionals and enthusiasts alike.
Cybercrime Magazine is Page ONE for Cybersecurity. Go to any of our sections to read the latest:
- SCAM. The latest schemes, frauds, and social engineering attacks being launched on consumers globally.
- NEWS. Breaking coverage on cyberattacks and data breaches, and the most recent privacy and security stories.
- HACK. Another organization gets hacked every day. We tell you who, what, where, when, and why.
- VC. Cybersecurity venture capital deal flow with the latest investment activity from various sources around the world.
- M&A. Cybersecurity mergers and acquisitions including big tech, pure cyber, product vendors and professional services.
- BLOG. What’s happening at Cybercrime Magazine. Plus the stories that don’t make headlines (but maybe they should).
- PRESS. Cybersecurity industry news and press releases in real time from the editors at Business Wire.
- PODCAST. New episodes daily on the Cybercrime Magazine Podcast feature victims, law enforcement, vendors, and cybersecurity experts.
- RADIO. Tune into WCYB Digital Radio at Cybercrime.Radio, the first and only round-the-clock internet radio station devoted to cybersecurity.
Contact us to send story tips, feedback and suggestions, and for sponsorship opportunities and custom media productions.
The post Best Cybercrime and Cybersecurity Podcasts for CISOs In 2026 appeared first on Cybercrime Magazine.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
A critical, systemic vulnerability discovered in Anthropic’s Model Context Protocol (MCP) has exposed over 150 million downloads and up to 200,000 servers to complete takeover, according to research published April 15, 2026, by the OX Security Research team. The flaw enables Arbitrary Remote Code Execution (RCE) on any system running a vulnerable MCP implementation, allowing […]
The post Anthropic MCP Hit by Critical Vulnerability Enabling Remote Code Execution appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
North Korea-linked threat actor UNC1069 is running a highly targeted campaign that abuses fake Zoom, Google Meet, and Microsoft Teams meetings to compromise cryptocurrency and Web3 professionals across Windows, macOS, and Linux systems. The goal is long-term access and large-scale theft of digital assets through stealthy social engineering and multi-stage malware deployment. Attackers often hijack […]
The post North Korea-Linked UNC1069 Hacks Crypto Pros via Fake Meetings appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
The fastest way to fall in love with an AI tool is to watch the demo. Everything moves quickly. Prompts land cleanly. The system produces impressive outputs in seconds. It feels like the beginning of a new era for your team. But most AI initiatives don’t fail because of bad technology. They stall because what worked in the demo doesn’t survive contact with real operations. The gap between a
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
A single Iranian state-directed operation is hiding behind several so‑called “hacktivist” brands, using different online identities to run one coordinated global cyber campaign. New analysis links three prominent personas Homeland Justice, Karma/KarmaBelow80, and Handala to Iran’s Ministry of Intelligence and Security (MOIS), rather than to independent hacktivist groups as they claim. Researchers say these identities act as interchangeable […]
The post Iran’s MOIS Tied to Coordinated Cyber Campaign Using Multiple Hacker Personas appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
·
Critical RCE flaw in protobuf.js lets attackers execute code via malicious schemas. Learn who is at risk, affected versions, and how to fix it.¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Cybersecurity researchers have discovered a critical “by design” weakness in the Model Context Protocol’s (MCP) architecture that could pave the way for remote code execution and have a cascading effect on the artificial intelligence (AI) supply chain. “This flaw enables Arbitrary Command Execution (RCE) on any system running a vulnerable MCP implementation, granting attackers direct access to
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Hackers are actively exploiting a critical vulnerability in TBK digital video recorder (DVR) devices to deploy a new Mirai-based botnet called Nexcorium. The campaign leverages CVE-2024-3721, an OS command injection vulnerability, highlighting how poorly secured IoT devices continue to fuel large-scale distributed denial-of-service (DDoS) attacks. Threat actors exploit CVE-2024-3721 by manipulating the “mdb” and “mdc” […]
The post TBK DVR Vulnerability CVE-2024-3721 Exploited to Spread Nexcorium DDoS Malware appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶


