-
Torrance, United States / California, 19th December 2025, CyberNewsWire
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
This week in cybersecurity from the editors at Cybercrime Magazine
Sausalito, Calif. – Dec. 19, 2025–Read the Full Story in Business Observer
Global cybercrime is projected to cost $10.5 trillion this year, around three times, or 3X more, than the $3 trillion estimated a decade ago. That growth pales in comparison to calls from Sarasota, Fla.-based Tenex to 10X your cybersecurity.
The name “Tenex” means 10X, or ten times something, its CEO Eric Foster told Business Observer. He says that the concept has been around a long time, especially in software development. “We believe in the 10X,” Foster says. “We believe that the best people, especially in creative work, are 10 times better than average, and we look … for those those kind of people.”
Tenex has “10X Your Cybersecurity” splashed across its homepage in a call out to help its customers to up their defensive measures.
Foster says that Tenex, which came out of stealth in January and has exceeded $18 million in revenue, has a goal to become a $100 million-plus business in the next fiscal year, according to Business Observer.
Billion-dollar cybersecurity stalwarts such as Tampa-based ReliaQuest and Clearwater-based KnowBe4 — aka unicorns — are among the industry leaders in the South Florida region where Tenex has its headquarters.
In a 2020 Cybercrime Magazine documentary, “KnowBe4: The Making of a Unicorn“, its founder and CEO, Stu Sjouwerman, said, “It’s the Google gospel — they don’t do anything unless they can 10X it,” after his company had grown from $75,000 in annual sales in 2011 to $175 million in 2019. KnowBe4 was acquired by Vista Equity Partners for $4.6 billion in 2022.
Earlier this year, Cybercrime Magazine listed the 10 best cybersecurity company names at the RSA Conference USA 2025 in San Francisco. The criteria? The names are easy to say, easy to remember, easy to type, short, have a matching dot com, and say what the company does.
Tenex checks all the boxes except for the dot ai at the end of its domain name. But with its 10X branding, people are likely to remember Tenex.ai, which is AI native, meaning it was developed using artificial intelligence. Its flagship product is its managed detection and response service, which uses AI agents to detect and handle cyber threats, escalating issues to humans as needed.
The owners of Tenex.com, manufacturers of residential and commercial flooring protection, are surely benefiting from the 10X hype due to the creatures of habit who still type .com after every name.
Cybercrime Magazine is Page ONE for Cybersecurity. Go to any of our sections to read the latest:
- SCAM. The latest schemes, frauds, and social engineering attacks being launched on consumers globally.
- NEWS. Breaking coverage on cyberattacks and data breaches, and the most recent privacy and security stories.
- HACK. Another organization gets hacked every day. We tell you who, what, where, when, and why.
- VC. Cybersecurity venture capital deal flow with the latest investment activity from various sources around the world.
- M&A. Cybersecurity mergers and acquisitions including big tech, pure cyber, product vendors and professional services.
- BLOG. What’s happening at Cybercrime Magazine. Plus the stories that don’t make headlines (but maybe they should).
- PRESS. Cybersecurity industry news and press releases in real time from the editors at Business Wire.
- PODCAST. New episodes daily on the Cybercrime Magazine Podcast feature victims, law enforcement, vendors, and cybersecurity experts.
- RADIO. Tune into WCYB Digital Radio at Cybercrime.Radio, the first and only round-the-clock internet radio station devoted to cybersecurity.
Contact us to send story tips, feedback and suggestions, and for sponsorship opportunities and custom media productions.
The post What’s In A Company Name? 10X Your Cybersecurity appeared first on Cybercrime Magazine.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Russian state-sponsored threat group BlueDelta has conducted a sustained credential-harvesting campaign targeting users of UKR.NET, one of Ukraine’s most popular webmail and news services, between June 2024 and April 2025. According to research by Recorded Future’s Insikt Group, the operation represents a significant escalation in the GRU-linked threat actor’s efforts to compromise Ukrainian user credentials […]
The post BlueDelta Hackers Target Users of Popular Ukrainian Webmail and News Service appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
In mid-September 2025, the ransomware landscape witnessed a significant development when DragonForce announced an alliance with Qilin and LockBit on a Russian underground forum. The announcement, posted on September 15, 2025, claimed the three groups were joining forces to navigate an increasingly challenging criminal ecosystem marked by intensified law enforcement pressure and operational fragmentation. A […]
The post Mapping the Emerging Alliance Between Qilin, DragonForce, and LockBit appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
The Cloud Atlas threat group, active since 2014, continues to pose a significant risk to organizations in Eastern Europe and Central Asia through sophisticated attacks leveraging legacy Microsoft Office vulnerabilities. Security researchers have documented the group’s expanded arsenal and evolving infection chains deployed throughout the first half of 2025, revealing previously undescribed implants and attack […]
The post Cloud Atlas Exploits Office Vulnerabilities to Execute Malicious Code appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
A critical remote code execution vulnerability in Gladinet Triofox is now under active exploitation by threat actors, and security researchers have demonstrated that weaponizing the flaw requires far more sophistication than initial analyses suggest. CVE-2025-12480, tracked by UNC6485, represents a complex attack chain that involves multiple infrastructure challenges and technical hurdles attackers must overcome to […]
The post Hackers Leverage Gladinet Triofox 0-Day Vulnerability to Run Malicious Code appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Crypto’s public image lagged reality. Stablecoins, tokenization, and regulation now power a blockchain backend settling global finance at institutional scale.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
The Apache Software Foundation has released a critical security update for its widely used Log4j logging library. A newly discovered vulnerability, tracked as CVE-2025-68161, allows attackers to intercept or redirect sensitive log data by exploiting a flaw in how the software establishes secure connections. The issue specifically affects the “Socket Appender” component in Apache Log4j Core. This […]
The post Apache Log4j Flaw Enables Interception of Sensitive Logging Data appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Iranian state-sponsored threat actors, previously thought to have gone dormant, have resurfaced with sophisticated new malware campaigns targeting critical infrastructure organizations globally. A new research report released by SafeBreach Labs reveals that the “Prince of Persia” (also known as Infy) Advanced Persistent Threat (APT) group has broken a three-year silence with a dramatic overhaul of […]
The post Iranian APT Targeting Networks and Critical Infrastructure Organizations appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶


