1010.cx

  • Hackers Exploit n8n Webhooks to Spread Malware

    ·

    cyber security, Cyber Security News, Malware

    A new abuse campaign targeting AI-driven workflow automation platforms particularly n8n that turns legitimate automation tools into powerful malware delivery systems. Between October 2025 and March 2026, security analysts observed a sharp surge in phishing emails that weaponized n8n-generated webhooks to deliver malicious payloads and collect device fingerprints under the guise of trusted infrastructure. AI workflow platforms like n8n and Zapier are […]

    The post Hackers Exploit n8n Webhooks to Spread Malware appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Two U.S. Nationals Sentenced in $5 Million DPRK Remote Worker Laptop Farm Scheme

    ·

    Cyber Security News

    The U.S. Justice Department has sentenced two New Jersey residents, Kejia Wang and Zhenxing Wang, for enabling a massive fraudulent employment operation that generated over $5 million for the Democratic People’s Republic of Korea (DPRK). Kejia Wang received a 108-month prison term, while Zhenxing Wang was sentenced to 92 months in prison. Both defendants were […]

    The post Two U.S. Nationals Sentenced in $5 Million DPRK Remote Worker Laptop Farm Scheme appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • New PoC Exploit Published for Microsoft Defender 0-Day Flaw

    ·

    cyber security, Cyber Security News, Microsoft

    A security researcher operating under the alias “Chaotic Eclipse” has publicly released a proof-of-concept (PoC) exploit for a vulnerability in Microsoft Defender. Published on April 15, 2026, the exploit targets a flaw in CVE-2026-33825, a recently patched vulnerability. The uncoordinated release highlights an escalating conflict between independent security researchers and Microsoft’s vulnerability disclosure programs. Public […]

    The post New PoC Exploit Published for Microsoft Defender 0-Day Flaw appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Cisco FMC Zero-Day Among 31 High-Impact Vulnerabilities Exploited in March

    ·

    Cisco, cyber security, Cyber Security News, Vulnerabilities, Zero-Day

    31 high-impact vulnerabilities were actively exploited in March 2026, with a Cisco firewall zero-day abused by the Interlock ransomware group emerging as one of the most dangerous threats to enterprise networks. Affected vendors span core enterprise and developer ecosystems, including Cisco, Microsoft, Google, ConnectWise, Langflow, Citrix, Aquasecurity, Nginx UI, Qualcomm, F5, Craft CMS, Laravel, Apple, […]

    The post Cisco FMC Zero-Day Among 31 High-Impact Vulnerabilities Exploited in March appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Chrome Privacy Vulnerability Exposes Users via Fingerprinting and Header Leaks

    ·

    Chrome, cyber security, Cyber Security News, vulnerability

    A new technical review of Google Chrome’s privacy posture shows that modern tracking no longer depends only on cookies, because websites can combine browser fingerprinting, storage tricks, and HTTP header leaks to identify users with surprising accuracy. Chrome has reduced some obvious signals, but many high-value surfaces such as canvas rendering, WebGL, audio processing, Client […]

    The post Chrome Privacy Vulnerability Exposes Users via Fingerprinting and Header Leaks appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Critical Cisco ISE Flaws Let Remote Attackers Execute Malicious Code

    ·

    CVE/vulnerability, cyber security, Cyber Security News, vulnerability

    Networking giant Cisco has issued an urgent security advisory warning of two newly discovered vulnerabilities impacting its Identity Services Engine (ISE) and ISE Passive Identity Connector (ISE-PIC). Cisco Identity Services Engine (ISE) is a widely deployed security policy management platform that provides secure access to enterprise network resources. The most severe of these new flaws […]

    The post Critical Cisco ISE Flaws Let Remote Attackers Execute Malicious Code appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Cisco Webex Vulnerability Allows User Impersonation Attacks

    ·

    CVE/vulnerability, cyber security, Cyber Security News, vulnerability

    Cisco has released an urgent security advisory warning organizations of a critical vulnerability in its Webex communication platform. Tracked as CVE-2026-20184, this severe flaw could allow unauthenticated, remote attackers to entirely bypass security checks and impersonate any legitimate user within the service. Understanding the Vulnerability According to the official Cisco Security Advisory published on April […]

    The post Cisco Webex Vulnerability Allows User Impersonation Attacks appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Fake Adobe Reader Download Drops ScreenConnect via Fileless Loader

    ·

    adobe, cyber security, Cyber Security News

    A deceptive campaign in which attackers distributed a fake Adobe Acrobat Reader installer that secretly deployed ConnectWise’s ScreenConnect via a complex in‑memory execution chain. Although ScreenConnect is a legitimate remote‑access tool, it was repurposed for unauthorized system control and data collection. The attack chain started when victims landed on a phishing site designed to mimic Adobe’s official download page. […]

    The post Fake Adobe Reader Download Drops ScreenConnect via Fileless Loader appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • UAC-0247 Targets Ukrainian Clinics and Government in Data-Theft Malware Campaign

    ·

    The Computer Emergencies Response Team of Ukraine (CERT-UA) has disclosed details of a new campaign that has targeted governments and municipal healthcare institutions, mainly clinics and emergency hospitals, to deliver malware capable of stealing sensitive data from Chromium-based web browsers and WhatsApp. The activity, which was observed between March and April

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Russian Hosting Tied to 1,250+ C2 Servers Across 165 Providers

    ·

    cyber security, Cyber Security News

    More than 1,250 C2 servers were identified across 165 Russian infrastructure providers within the past 3 months. Infrastructure analytics and ISP mapping are exposing the hidden backbone of cyber threats operating inside Russian networks. By looking beyond single IPs or one-off indicators, analysts used Host Radar and HuntSQL to map more than 1,250 active command‑and‑control […]

    The post Russian Hosting Tied to 1,250+ C2 Servers Across 165 Providers appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

1 2 3 … 713
Next Page

1010.cx

cybersecurity / defense / intelligence