1010.cx

  • Packagist Themes Deliver Trojanized jQuery in OphimCMS Supply Chain Attack

    ·

    cyber security, Cyber Security News

    A new OphimCMS supply chain attack in which six Packagist themes ship trojanized jQuery and other JavaScript to compromise site visitors rather than servers.​ Researchers found six malicious Composer packages under the “ophimcms” namespace on Packagist that pretend to be legitimate themes for OphimCMS, a Vietnamese-language Laravel CMS used for movie streaming sites. These packages […]

    The post Packagist Themes Deliver Trojanized jQuery in OphimCMS Supply Chain Attack appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • CISA Issues Alert on Wing FTP Server Vulnerability Used in Attacks

    ·

    CVE/vulnerability, cyber security, Cyber Security News, vulnerability

    The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent security alert regarding a critical vulnerability in the Wing FTP Server. On March 16, 2026, the agency officially added this security flaw to its Known Exploited Vulnerabilities (KEV) catalog. This addition serves as a clear warning to network defenders that cybercriminals are actively exploiting […]

    The post CISA Issues Alert on Wing FTP Server Vulnerability Used in Attacks appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • WebFiling Flaw at UK Companies House Exposed Director Data for Months

    ·

    cyber security, Cyber Security News

    The UK Companies House recently disclosed a significant security vulnerability in its WebFiling service that exposed sensitive director information for several months. Chief Executive Andy King confirmed that the flaw was initially introduced during a system update in October 2025. This vulnerability allowed authenticated users to potentially view and alter the private details of other […]

    The post WebFiling Flaw at UK Companies House Exposed Director Data for Months appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Hackers Leverage Safe Links and URL Rewriting to Evade Detection

    ·

    cyber security, Cyber Security News

    Threat actors were already abusing URL rewriting mechanisms in phishing campaigns to mask malicious domains. URL rewriting is designed to protect users by replacing original links with security-vendor URLs that scan destinations at click time. These rewritten links route traffic through the provider’s infrastructure so they can analyze the page in real time, block known […]

    The post Hackers Leverage Safe Links and URL Rewriting to Evade Detection appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Payload ransomware hits Windows and ESXi with Babuk-style encryption

    ·

    cyber security, Cyber Security News, Ransomware, Windows

    A new ransomware operation called Payload is rapidly emerging as a serious threat to both Windows and VMware ESXi environments, combining Babuk-style cryptography with aggressive anti-forensics and a working double-extortion model. The group claims to have been active since at least February 17, 2026. It is already hitting mid-to-large organizations across multiple sectors and countries. The hospital […]

    The post Payload ransomware hits Windows and ESXi with Babuk-style encryption appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Researchers Uncover Ways to Decrypt Palo Alto Cortex XDR BIOC Rules for Evasion

    ·

    CVE/vulnerability, cyber security, Cyber Security News, vulnerability

    Cybersecurity researchers have discovered a critical evasion technique in Palo Alto Networks’ Cortex XDR agent that allowed attackers to completely bypass behavioral detections. The research demonstrates how predefined Behavioral Indicators of Compromise (BIOC) rules, shipped encrypted by Palo Alto, could be decrypted and analyzed. By reverse-engineering these rules, analysts identified hardcoded global whitelists that provided […]

    The post Researchers Uncover Ways to Decrypt Palo Alto Cortex XDR BIOC Rules for Evasion appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Malicious NPM Packages Spread PylangGhost RAT in Supply Chain Attack

    ·

    cyber security, Cyber Security News

    Malicious npm packages are delivering the North Korean–linked PylangGhost remote access trojan (RAT) in a new software supply chain campaign that targets developers across Windows, Linux, and macOS systems. The first malicious versions appeared in late February 2026 (@jaime9008/math-service 1.0.1–1.0.2), followed by react-refresh-update 1.0.1–1.0.4 published on March 1, 2026. Earlier 1.0.0 versions in both families were benign, a […]

    The post Malicious NPM Packages Spread PylangGhost RAT in Supply Chain Attack appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Hackers Abuse Trusted Websites in New Attacks on Microsoft Teams Users

    ·

    cyber security, Cyber Security News, Microsoft

    Threat actors are increasingly turning to trusted infrastructure to launch their attacks, making it harder for automated security tools to flag malicious activity. A newly identified phishing campaign highlights this growing trend by abusing compromised websites to harvest valuable corporate credentials. Cybersecurity researchers have uncovered a sophisticated new phishing campaign where attackers hijack legitimate websites […]

    The post Hackers Abuse Trusted Websites in New Attacks on Microsoft Teams Users appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • LiveChat Support Tools Abused in SaaS Phishing Scheme

    ·

    cyber security, Cyber Security News, Phishing

    A newly identified campaign shows how Software-as-a-Service (SaaS) platforms like LiveChat are being weaponized to steal sensitive data in real time. Unlike traditional phishing attacks that rely on fake login pages or static forms, this tactic uses live chat conversations to extract credentials, financial data, and personally identifiable information (PII). The campaign begins with phishing […]

    The post LiveChat Support Tools Abused in SaaS Phishing Scheme appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • CISA Flags Actively Exploited Wing FTP Vulnerability Leaking Server Paths

    ·

    The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added a medium-severity security flaw impacting Wing FTP to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. The vulnerability, CVE-2025-47813 (CVSS score: 4.3), is an information disclosure vulnerability that leaks the installation path of the application under certain conditions

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

Previous Page
1 … 11 12 13 14 15 … 645
Next Page

1010.cx

cybersecurity / defense / intelligence