1010.cx

  • Women In Cybersecurity Report, Winter 2025

    ·

    Blogs
    This week in cybersecurity from the editors at Cybercrime Magazine

    Sausalito, Calif. – Dec. 17, 2025

    –Watch the YouTube video

    The Women in Cybersecurity Report, a 12-minute video hosted by Cybercrime Magazine Deputy Editor Amanda Glassner, highlights the latest breakthroughs, voices, and stories from women leading the charge in cybersecurity. Special guest Elyse Gunn, Chief Information Security Officer (CISO) at Nasuni, joined us.

    The Winter 2025 edition includes coverage of:

    The 2025 Women in IT Security honorees, an extraordinary group of leaders shaping cybersecurity’s future and inspiring change across the industry, according to SC Media;

    Kaspersky’s partnership with Smart Africa and Africaines in Tech to unveil an innovative career orientation test which aims to inspire young women to explore and pursue careers in cybersecurity, a field that has traditionally seen a male-dominated workforce;

    BlackBerry Limited’s collaboration with Global Affairs Canada and Rogers Cybersecure Catalyst at Toronto Metropolitan University to launch the Women in Cyber Leadership Programme, which will advance women cybersecurity professionals into leadership roles across Malaysia and ASEAN member states.

    Watch the Video



    Cybercrime Magazine is Page ONE for Cybersecurity. Go to any of our sections to read the latest:

    • SCAM. The latest schemes, frauds, and social engineering attacks being launched on consumers globally.
    • NEWS. Breaking coverage on cyberattacks and data breaches, and the most recent privacy and security stories.
    • HACK. Another organization gets hacked every day. We tell you who, what, where, when, and why.
    • VC. Cybersecurity venture capital deal flow with the latest investment activity from various sources around the world.
    • M&A. Cybersecurity mergers and acquisitions including big tech, pure cyber, product vendors and professional services.
    • BLOG. What’s happening at Cybercrime Magazine. Plus the stories that don’t make headlines (but maybe they should).
    • PRESS. Cybersecurity industry news and press releases in real time from the editors at Business Wire.
    • PODCAST. New episodes daily on the Cybercrime Magazine Podcast feature victims, law enforcement, vendors, and cybersecurity experts.
    • RADIO. Tune into WCYB Digital Radio at Cybercrime.Radio, the first and only round-the-clock internet radio station devoted to cybersecurity.

    Contact us to send story tips, feedback and suggestions, and for sponsorship opportunities and custom media productions.

    The post Women In Cybersecurity Report, Winter 2025 appeared first on Cybercrime Magazine.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Kimsuky Hackers Use Weaponized QR Codes to Distribute Malicious Mobile Apps

    ·

    cyber security, Cyber Security News

    Threat researchers have uncovered a sophisticated mobile malware campaign attributed to North Korea-linked threat actor Kimsuky, leveraging weaponized QR codes and fraudulent delivery service impersonations to trick users into installing remote access trojans on their smartphones. The ENKI WhiteHat Threat Research Team identified the latest iteration of “DOCSWAP” malware being distributed through an intricate social […]

    The post Kimsuky Hackers Use Weaponized QR Codes to Distribute Malicious Mobile Apps appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Hackers Claim Stealing 94GB of Pornhub Premium User Watch Histories

    ·

    Cyber Attack, Cyber Crime, Cyber-Attacks, cybersecurity, Data Breach, Extortion, Mixpanel, Pornhub, Privacy, ShinyHunters
    Cybercriminal group ShinyHunters targets former Pornhub Premium users in a massive 94GB data extortion campaign. Learn about the stolen data details, the involvement of a smishing attack, and the conflicting reports on the breach.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • ForumTrol Operation Uses Chrome Zero-Day in Fresh Phishing Attacks

    ·

    Chrome, cyber security, Cyber Security News, Phishing, Zero-Day

    The ForumTroll APT group has resurfaced with a sophisticated phishing campaign targeting Russian academics, marking a significant escalation in their ongoing operations against entities in Russia and Belarus. While the group initially gained notoriety for exploiting CVE-2025-2783, a zero-day vulnerability in Google Chrome, their latest offensive relies on refined social engineering tactics and commercial red […]

    The post ForumTrol Operation Uses Chrome Zero-Day in Fresh Phishing Attacks appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Microsoft Desktop Window Manager Flaw Allows Privilege Escalation

    ·

    CVE/vulnerability, Cyber Security News, vulnerability

    A critical vulnerability has been discovered in the Windows Desktop Window Manager (DWM) that could allow attackers to escalate privileges to system level. The flaw, tracked as CVE-2025-55681, resides in the dwmcore.dll component and was disclosed during the TyphoonPWN Windows security competition, where it earned second place recognition. The Vulnerability The vulnerability exists within the CBrushRenderingGraphBuilder::AddEffectBrush function in the DWM […]

    The post Microsoft Desktop Window Manager Flaw Allows Privilege Escalation appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Fix SOC Blind Spots: See Threats to Your Industry & Country in Real Time

    ·

    Modern security teams often feel like they’re driving through fog with failing headlights. Threats accelerate, alerts multiply, and SOCs struggle to understand which dangers matter right now for their business. Breaking out of reactive defense is no longer optional. It’s the difference between preventing incidents and cleaning up after them. Below is the path from reactive firefighting to a

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • China-Linked Ink Dragon Hacks Governments Using ShadowPad and FINALDRAFT Malware

    ·

    The threat actor known as Jewelbug has been increasingly focusing on government targets in Europe since July 2025, even as it continues to attack entities located in Southeast Asia and South America. Check Point Research is tracking the cluster under the name Ink Dragon. It’s also referenced by the broader cybersecurity community under the names CL-STA-0049, Earth Alux, and REF7707. The

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Hackers Can Seize Control of Car Dashboards Through Modem Vulnerabilities

    ·

    cyber security, Cyber Security News

    Imagine cruising down the highway in your brand-new electric car when suddenly the multimedia display fills with Doom, the iconic 3D shooter game completely replacing your navigation map and vehicle controls. Shockingly, this isn’t science fiction. Security researchers have demonstrated that this scenario is entirely possible in today’s connected vehicles, exposing a critical vulnerability in […]

    The post Hackers Can Seize Control of Car Dashboards Through Modem Vulnerabilities appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Chinese Hackers Turn Compromised Servers Into ShadowPad Nodes

    ·

    cyber security, Cyber Security News

    A sophisticated Chinese threat actor tracked as Ink Dragon has been weaponizing a custom ShadowPad IIS Listener module to convert compromised servers into distributed relay nodes, according to research by Check Point Research. The tactic represents a significant escalation in the group’s operational capabilities, enabling attackers to establish persistent, multi-layered command-and-control infrastructure that spans victim […]

    The post Chinese Hackers Turn Compromised Servers Into ShadowPad Nodes appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Singularity Linux Kernel Rootkit with klogctl Detection Evasion

    ·

    cyber security, Cyber Security News, Linux

    Singularity, a stealth-focused Linux Kernel Module (LKM) rootkit targeting modern 6.x kernels, has added a powerful log‐evasion capability that prevents its detection through traditional kernel logging interfaces such as klogctl. Designed as a “final boss” rootkit for defenders, Singularity notes deep kernel hooking, advanced log sanitization, and EDR evasion techniques to stay invisible on compromised systems. […]

    The post Singularity Linux Kernel Rootkit with klogctl Detection Evasion appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

Previous Page
1 … 114 115 116 117 118 … 539
Next Page

1010.cx

cybersecurity / defense / intelligence