1010.cx

  • Ericsson US Hit by Cyber Attack, Hackers Steal Personal Data of Employees and Customers

    ·

    Cyber Attack, cyber security, Cyber Security News

    Ericsson Inc., the United States subsidiary of the Swedish telecommunications giant, has confirmed a data breach affecting 15,661 of its employees and customers. The security incident did not breach Ericsson’s own networks but instead compromised a third-party service provider responsible for handling the company’s sensitive personal data.​​ Incident Details and Attack Vector The breach traces […]

    The post Ericsson US Hit by Cyber Attack, Hackers Steal Personal Data of Employees and Customers appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Six Android Malware Families Target Pix Payments, Banking Apps, and Crypto Wallets

    ·

    Cybersecurity researchers have discovered half-a-dozen new Android malware families that come with capabilities to steal data from compromised devices and conduct financial fraud. The Android malware range from traditional banking trojans like PixRevolution, TaxiSpy RAT, BeatBanker, Mirax, and Oblivion RAT to full-fledged remote administration tools such as SURXRAT. PixRevolution, according to

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • CastleRAT Attack Leverages Deno JavaScript Runtime to Bypass Enterprise Defenses

    ·

    cyber security, Cyber Security News, JavaScript

    A sophisticated malware campaign that abuses the Deno JavaScript runtime to deliver CastleRAT, a powerful remote access trojan designed for espionage and data theft. The campaign demonstrates how attackers are increasingly combining social engineering, trusted development tools, and stealth techniques to bypass traditional enterprise defenses. Instead of relying on conventional malware loaders, the attackers hide […]

    The post CastleRAT Attack Leverages Deno JavaScript Runtime to Bypass Enterprise Defenses appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Splunk RCE Vulnerability Exposes Systems to Arbitrary Shell Command Execution by Attackers

    ·

    CVE/vulnerability, cyber security, Cyber Security News, vulnerability

    A high-severity Remote Command Execution (RCE) vulnerability has been discovered in Splunk Enterprise and Splunk Cloud Platform, exposing systems to severe security risks. Tracked officially as CVE-2026-20163 with a CVSS score of 8.0, this critical flaw allows malicious actors to execute arbitrary shell commands directly on the host operating system. Classified under CWE-77, this bug […]

    The post Splunk RCE Vulnerability Exposes Systems to Arbitrary Shell Command Execution by Attackers appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Cisco IOS XR Vulnerability Exposes Systems to Root Command Execution by Attackers

    ·

    CVE/vulnerability, cyber security, Cyber Security News, vulnerability

    Cisco has issued high-severity software updates to address two high-severity privilege escalation vulnerabilities in its IOS XR Software. Network administrators must take immediate action, as these security flaws could allow an authenticated, local attacker to execute arbitrary commands as the root user or gain complete administrative control over affected devices. Because these routers often serve […]

    The post Cisco IOS XR Vulnerability Exposes Systems to Root Command Execution by Attackers appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Iran‑Linked Hackers Tap Criminal Ecosystem to Bolster State Cyber Ops

    ·

    cyber security, Cyber Security News

    Iran-linked cyber actors are increasingly working with the broader cybercrime ecosystem, using criminal tools, infrastructure, and business models to support state-backed operations and hide their involvement. For years, Iranian intelligence services have relied on criminal intermediaries in the physical world to conduct surveillance, kidnappings, and assassination plots, gaining reach and plausible deniability. The U.S. Treasury, […]

    The post Iran‑Linked Hackers Tap Criminal Ecosystem to Bolster State Cyber Ops appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Stryker Faces Cyber Attack as Hackers Report System Breach and Device Destruction

    ·

    Cyber Attack, cyber security, Cyber Security News

    On March 11, 2026, the global medical technology giant Stryker suffered a devastating cyberattack that brought its worldwide IT operations to a sudden halt. Iranian-linked threat actors breached the company’s network. They deployed highly destructive wiper malware designed to permanently erase critical corporate data. The breach heavily impacted Stryker’s global operations, particularly at its headquarters […]

    The post Stryker Faces Cyber Attack as Hackers Report System Breach and Device Destruction appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Chrome Update Addresses 29 Vulnerabilities, Mitigating Remote Code Execution Threats

    ·

    Chrome, CVE/vulnerability, cyber security, Cyber Security News, Vulnerabilities, vulnerability

    Google has officially rolled out a crucial update for its Chrome browser, promoting version 146 to the stable channel for Windows, Mac, and Linux users. Many of these flaws involve deep-seated memory corruption issues that, if left unpatched, could allow remote attackers to execute arbitrary code and fully compromise affected systems. Users are strongly advised […]

    The post Chrome Update Addresses 29 Vulnerabilities, Mitigating Remote Code Execution Threats appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Meta Unveils New Anti-Scam Tools for WhatsApp, Facebook, and Messenger

    ·

    cyber security, Cyber Security News, FACEBOOK, WhatsApp

    Meta has rolled out a new wave of anti‑scam protections across WhatsApp, Facebook, and Messenger, combining AI‑driven detection, stricter advertiser controls, and public awareness campaigns to tackle fast‑evolving online fraud at scale. The new tools are designed to warn users at the moment they are about to interact with potentially malicious accounts, links or messages, […]

    The post Meta Unveils New Anti-Scam Tools for WhatsApp, Facebook, and Messenger appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • CISA Flags Actively Exploited n8n RCE Bug as 24,700 Instances Remain Exposed

    ·

    The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added a critical security flaw impacting n8n to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The vulnerability, tracked as CVE-2025-68613 (CVSS score: 9.9), concerns a case of expression injection that leads to remote code execution. The security shortcoming was patched

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

Previous Page
1 … 22 23 24 25 26 … 645
Next Page

1010.cx

cybersecurity / defense / intelligence