1010.cx

  • Fake YouTube Downloads Spread Vidar Malware to Steal Corporate Logins

    ·

    cyber security, Cyber Security News, Malware, Youtube

    A new Vidar infostealer campaign is abusing fake software download links on YouTube to compromise corporate employees and sell their stolen credentials on Russian cybercrime marketplaces. In the investigated case, the victim was searching for software on YouTube and likely followed a link in the video description that led to a third‑party file‑sharing service. From […]

    The post Fake YouTube Downloads Spread Vidar Malware to Steal Corporate Logins appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Microsoft Releases Enterprise Policy Option to Disable Windows 11 Copilot

    ·

    cyber security, Cyber Security News, Microsoft, Windows

    Microsoft has introduced a new enterprise policy setting that allows IT administrators to silently uninstall the Microsoft Copilot app from managed Windows 11 devices, marking a significant shift in how organizations can control AI tool deployment across their fleets. The new RemoveMicrosoftCopilotApp policy setting became broadly available following the April 2026 Patch Tuesday security updates. It is […]

    The post Microsoft Releases Enterprise Policy Option to Disable Windows 11 Copilot appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Cybercrime Magazine YouTube Shorts On The History of Hacking

    ·

    Blogs
    This week in cybersecurity from the editors at Cybercrime Magazine

    Sausalito, Calif. – Apr. 27, 2026

    – Cybercrime Magazine YouTube Shorts

    The award-winning Cybercrime Magazine YouTube Channel, which has more than 1.2 million subscribers and many more viewers globally, released its first Short last month, and the video has racked up more than 720,000 Views.

    In 1989, a U.S. Secret Service Agent told the New Computer Express that Leslie Lynne Doucette was the leader of a national conspiracy that was the largest hacking network he’d ever come across. “We call her the Queen of the Hackers,” said another Secret Service Agent. Taylor Fox, senior social media manager at Cybercrime Magazine, told the story in our first in a new series covering the history of hacking.

    Earlier this month, we released another Short produced by Fox, the backstory of the 1986 Brain computer virus, a video with more than half a million views.

    “Around two years ago, we produced a 4-minute and 30-second video “Phone Phreaking: Hacking Before The Internet” and the feedback was incredible, says Steve Morgan, Editor-in-Chief at Cybercrime Magazine. “People kept talking about it and asked us for more throwback media, and our new YouTube Shorts brings that.

    Next up? Fox took a deep dive into the 1986 Morris Worm, one of the oldest computer worms distributed via the Internet, and the first to gain significant mainstream media attention. Stay tuned for this Short and more to come.

    Watch the Cybercrime Magazine YouTube Shorts



    Cybercrime Magazine is Page ONE for Cybersecurity. Go to any of our sections to read the latest:

    • SCAM. The latest schemes, frauds, and social engineering attacks being launched on consumers globally.
    • NEWS. Breaking coverage on cyberattacks and data breaches, and the most recent privacy and security stories.
    • HACK. Another organization gets hacked every day. We tell you who, what, where, when, and why.
    • VC. Cybersecurity venture capital deal flow with the latest investment activity from various sources around the world.
    • M&A. Cybersecurity mergers and acquisitions including big tech, pure cyber, product vendors and professional services.
    • BLOG. What’s happening at Cybercrime Magazine. Plus the stories that don’t make headlines (but maybe they should).
    • PRESS. Cybersecurity industry news and press releases in real time from the editors at Business Wire.
    • PODCAST. New episodes daily on the Cybercrime Magazine Podcast feature victims, law enforcement, vendors, and cybersecurity experts.
    • RADIO. Tune into WCYB Digital Radio at Cybercrime.Radio, the first and only round-the-clock internet radio station devoted to cybersecurity.

    Contact us to send story tips, feedback and suggestions, and for sponsorship opportunities and custom media productions.

    The post Cybercrime Magazine YouTube Shorts On The History of Hacking appeared first on Cybercrime Magazine.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • UNC6692 Hackers Exploit Microsoft Teams to Deploy SNOW Malware

    ·

    Cyber Attack, cybersecurity, Google, Malware, Mandiant, Microsoft, Security, Snow, UNC6692, Windoes
    UNC6692 hackers exploit Microsoft Teams with fake IT alerts to deploy SNOW malware, steal credentials, and breach corporate networks in advanced attacks.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Mythos Changed the Math on Vulnerability Discovery. Most Teams Aren’t Ready for the Remediation Side

    ·

    Anthropic’s Claude Mythos Preview has dominated security discussions since its April 7 announcement. Early reporting describes a powerful cybersecurity-focused AI system capable of identifying vulnerabilities at scale and raising serious questions about how quickly organizations can validate, prioritize, and remediate what it finds. The debate that followed has mostly focused on the right

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Fake Income Tax Notices Used to Spread Malware

    ·

    cyber security, Cyber Security News, Malware

    Cybercriminals are exploiting India’s tax season by launching sophisticated phishing campaigns that impersonate the Income Tax Department to deliver dangerous malware to unsuspecting taxpayers. The malicious operation uses fake assessment notices and tax compliance warnings to trick victims into downloading malware-laden files that grant attackers persistent access to compromised systems. The phishing campaign, which has […]

    The post Fake Income Tax Notices Used to Spread Malware appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • PhantomCore Exploits TrueConf Vulnerabilities to Breach Russian Networks

    ·

    A pro-Ukrainian hacktivist group called PhantomCore has been attributed to attacks actively targeting servers running TrueConf video conferencing software in Russia since September 2025. That’s according to a report published by Positive Technologies, which found the threat actors to be leveraging an exploit chain comprising three vulnerabilities to execute commands remotely on susceptible

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Researchers Uncover 73 Fake VS Code Extensions Delivering GlassWorm v2 Malware

    ·

    Cybersecurity researchers have flagged dozens of Microsoft Visual Studio Code (VS Code) extensions on the Open VSX repository that are linked to a persistent information-stealing campaign dubbed GlassWorm. The cluster of 73 extensions has been identified as cloned versions of their legitimate counterparts. Of these, six have been confirmed to be malicious, with the remaining acting as seemingly

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Itron Discloses Data Breach After Hackers Access Internal Systems

    ·

    cyber security, Cyber Security News, Data Breach

    Itron, Inc., a leading smart metering and energy infrastructure technology company, has disclosed a cybersecurity incident after an unauthorized third party gained access to certain of its internal systems, according to a Form 8-K filing submitted to the U.S. Securities and Exchange Commission (SEC) on April 13, 2026. Itron was notified on April 13, 2026, […]

    The post Itron Discloses Data Breach After Hackers Access Internal Systems appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Linux ELF Malware Generator Evades ML Detection With Semantic-Preserving Changes

    ·

    cyber security, Cyber Security News, Linux, Linux malware, Malware

    As Linux continues to dominate high-performance computing, cloud services, and Internet of Things (IoT) devices, it has become a prime target for cybercriminals. However, while much research has focused on manipulating Windows executables to bypass security, the Linux Executable and Linkable Format (ELF) has largely been ignored. To address this gap, researchers at the Czech […]

    The post Linux ELF Malware Generator Evades ML Detection With Semantic-Preserving Changes appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

Previous Page
1 … 24 25 26 27 28 … 763
Next Page

1010.cx

cybersecurity / defense / intelligence