1010.cx

  • Iran-Linked Hackers Target U.S. Critical Infrastructure Amid Rising Cyber Threats

    ·

    cyber security, Cyber Security News

    Iran-linked threat actors are escalating cyber operations against U.S. and allied networks, with Seedworm recently deploying new backdoors against critical infrastructure and high-value organizations amid the current regional conflict. Activity associated with the Iranian APT group Seedworm (aka MuddyWater, Temp Zagros, Static Kitten) has been observed on the networks of multiple U.S. organizations since early […]

    The post Iran-Linked Hackers Target U.S. Critical Infrastructure Amid Rising Cyber Threats appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Cyber Espionage Group CL-UNK-1068 Linked to China Targets Asian Infrastructure

    ·

    cyber security, Cyber Security News, Hacks

    A highly sophisticated cyber espionage group, designated as CL-UNK-1068, has been actively targeting critical infrastructure across South, Southeast, and East Asia since at least 2020. Originating from China, the threat actors focus on high-value sectors, including aviation, energy, government, law enforcement, technology, and telecommunications. The attackers use a versatile mix of custom malware, open-source utilities, […]

    The post Cyber Espionage Group CL-UNK-1068 Linked to China Targets Asian Infrastructure appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Can the Security Platform Finally Deliver for the Mid-Market?

    ·

    Mid-market organizations are constantly striving to achieve security levels on a par with their enterprise peers. With heightened awareness of supply chain attacks, your customers and business partners are defining the security level you must meet. What if you could be the enabler for your organization to remain competitive — and help win business — by easily demonstrating that you meet these

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Vaultwarden Vulnerabilities Enable Privilege Escalation and Data Exposure

    ·

    CVE/vulnerability, cyber security, Cyber Security News, vulnerability

    Two high-severity vulnerabilities have been discovered in Vaultwarden, a widely used alternative Bitwarden server implementation written in Rust. These security flaws, tracked as CVE-2026-27803 and CVE-2026-27802, allow compromised Manager accounts to bypass authorization checks, escalate privileges, and expose sensitive stored credentials. Both vulnerabilities carry a High severity rating with network-based attack vectors that require low […]

    The post Vaultwarden Vulnerabilities Enable Privilege Escalation and Data Exposure appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • AI Bot Hackerbot-Claw Targets Microsoft, DataDog and CNCF GitHub Repos

    ·

    Aqua Security, Artificial Intelligence, Chaos Agent, Cyber Attack, cybersecurity, DataDog, Hackerbot-Claw, Microsoft, Pillar Security, Security, vulnerability
    Security firm Pillar reveals the Chaos Agent in which Hackerbot-Claw, an AI agent, used natural language to compromise major GitHub projects and hijack developer tools.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Apache ZooKeeper Flaw Exposes Sensitive Data to Attackers

    ·

    CVE/vulnerability, cyber security, Cyber Security News, vulnerability

    Apache ZooKeeper, a centralized service used for maintaining configuration information and naming in distributed systems, has received critical security updates. The Apache Software Foundation recently addressed two “Important” severity vulnerabilities that could expose sensitive data and allow server impersonation in production environments. Configuration and Hostname Verification Flaws The first vulnerability, identified as CVE-2026-24308, involves sensitive […]

    The post Apache ZooKeeper Flaw Exposes Sensitive Data to Attackers appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • MaaS VIP Keylogger Campaign Uses Steganography to Steal Credentials at Scale

    ·

    cyber security, Cyber Security News, Malware

    A large-scale spear-phishing campaign distributing a VIP Keylogger variant sold as Malware-as-a-Service (MaaS). The campaign employs steganography, in-memory execution, and modular payload design to evade defenses while harvesting credentials across browsers, email clients, and collaboration tools. Researchers observed fraudulent purchase-order emails that encouraged victims to open an attached RAR file. The compressed archive contained an executable disguised […]

    The post MaaS VIP Keylogger Campaign Uses Steganography to Steal Credentials at Scale appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • ClipXDaemon Malware Targets Crypto Users in Linux X11 Sessions

    ·

    cyber security, Cyber Security News, Malware

    ClipXDaemon is a new Linux malware family that hijacks cryptocurrency clipboard data in X11 sessions, operating fully offline without any command‑and‑control (C2) infrastructure. It reuses a ShadowHS-style loader built with the public bincrypter framework but delivers a completely different, autonomous financial payload. ShadowHS used an obfuscated shell loader to deploy an in‑memory hackshell for long‑term […]

    The post ClipXDaemon Malware Targets Crypto Users in Linux X11 Sessions appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Chrome Extension Turns Malicious After Ownership Transfer, Enabling Code Injection and Data Theft

    ·

    Two Google Chrome extensions have turned malicious after what appears to be a case of ownership transfer, offering attackers a way to push malware to downstream customers, inject arbitrary code, and harvest sensitive data. The extensions in question, both originally associated with a developer named “akshayanuonline@gmail.com” (BuildMelon), are listed below – QuickLens – Search Screen with

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Cybercrime Group in Vietnam Enables Massive Fraudulent Signups

    ·

    cyber security, Cyber Security News

    A wave of fraudulent account registrations to a cybercrime ecosystem operating out of Vietnam. These fake accounts are not just spam; they underpin large-scale financial fraud, phishing, and interpersonal scams that erode trust in online platforms. Attackers scripted mass “puppet” signups on victim services, triggered SMS messages to premium-rate numbers, and then monetized the telecom […]

    The post Cybercrime Group in Vietnam Enables Massive Fraudulent Signups appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

Previous Page
1 … 32 33 34 35 36 … 645
Next Page

1010.cx

cybersecurity / defense / intelligence