1010.cx

  • Raaga Confirms Major Data Breach Exposing Personal Information of 10.2Million Users 

    ·

    cyber security, Cyber Security News, Data Breach, Malware, vulnerability

    Indian music streaming platform Raaga has become the latest victim of a significant cybersecurity incident after sensitive user data was posted for sale on a popular hacking forum in December 2025.   The breach has exposed personal information from over 10 million users, raising serious concerns about account security and the risk of identity theft.   The compromised database contains approximately […]

    The post Raaga Confirms Major Data Breach Exposing Personal Information of 10.2Million Users  appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • RansomHouse Claims Data Breach at Major Apple Contractor Luxshare

    ·

    Apple, Cyber Attack, Cyber Crime, Cyber-Attacks, cybersecurity, Dark Web, Data Breach, Extortion, Luxshare, Meta, Nvidia, Qualcomm, Ransom, Ransomware, SaaS, Security
    RansomHouse claims to have breached Apple contractor Luxshare, but no evidence has been released. Links are offline and the breach remains unverified.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Gootloader Malware With Low Detection Rate Evades Most Security Tools

    ·

    cyber security, Cyber Security News, Malware

    Gootloader malware has resurfaced, employing sophisticated evasion techniques to exploit malformed ZIP archives and obfuscation mechanisms to bypass security detection systems. The Gootloader malware campaign, tracked as a partnership between Storm-0494 and Vanilla Tempest, has returned in late 2025 with an alarming ability to evade detection. The threat operates through a specialized delivery mechanism a […]

    The post Gootloader Malware With Low Detection Rate Evades Most Security Tools appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Apache Airflow Flaws Expose Sensitive Workflow Data to Potential Attackers 

    ·

    CVE/vulnerability, cyber security, Cyber Security News, vulnerability

    Apache Airflow has patched two separate credential-exposure vulnerabilities in versions before 3.1.6.   The flaws could allow attackers to extract sensitive authentication data embedded in proxy configurations and templated workflow fields through log files and the web UI, potentially compromising network infrastructure and sensitive data pipelines.  The first vulnerability affects Apache Airflow versions before 3.1.6 and stems from […]

    The post Apache Airflow Flaws Expose Sensitive Workflow Data to Potential Attackers  appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The Hidden Risk of Orphan Accounts

    ·

    The Problem: The Identities Left Behind As organizations grow and evolve, employees, contractors, services, and systems come and go – but their accounts often remain. These abandoned or “orphan” accounts sit dormant across applications, platforms, assets, and cloud consoles. The reason they persist isn’t negligence – it’s fragmentation.  Traditional IAM and IGA systems are designed

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Spear-Phishing Campaign Abuses Argentine Federal Court Rulings to Deliver Covert RAT

    ·

    cyber security, Cyber Security News

    Seqrite Labs has uncovered a sophisticated spear-phishing campaign targeting Argentina’s judicial sector with a multi-stage infection chain designed to deploy a stealthy Rust-based Remote Access Trojan (RAT). The campaign primarily targets Argentina’s judicial institutions, legal professionals, justice-adjacent government bodies, and academic legal organizations. Attackers abuse legitimate Argentine federal court rulings specifically, preventive detention review documents […]

    The post Spear-Phishing Campaign Abuses Argentine Federal Court Rulings to Deliver Covert RAT appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Evelyn Stealer Malware Abuses VS Code Extensions to Steal Developer Credentials and Crypto

    ·

    Cybersecurity researchers have disclosed details of a malware campaign that’s targeting software developers with a new information stealer called Evelyn Stealer by weaponizing the Microsoft Visual Studio Code (VS Code) extension ecosystem. “The malware is designed to exfiltrate sensitive information, including developer credentials and cryptocurrency-related data. Compromised developer

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Cloudflare Fixes ACME Validation Bug Allowing WAF Bypass to Origin Servers

    ·

    Cloudflare has addressed a security vulnerability impacting its Automatic Certificate Management Environment (ACME) validation logic that made it possible to bypass security controls and access origin servers.  “The vulnerability was rooted in how our edge network processed requests destined for the ACME HTTP-01 challenge path (/.well-known/acme-challenge/*),” the web infrastructure

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • OPNsense 25.7.11 Enhances Network Visibility With Host Discovery Feature

    ·

    cyber security, Cyber Security News, New Post, vulnerability, what is New

    The OPNsense team has started the new year with the release of version 25.7.11, bringing a notable networking enhancement: a native host discovery service that deepens visibility into connected devices and tightens policy control across the firewall.  Native host discovery improves network visibility. The headline feature in 25.7.11 is the new host discovery service, built on the hostwatch component.  It automatically […]

    The post OPNsense 25.7.11 Enhances Network Visibility With Host Discovery Feature appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Why Secrets in JavaScript Bundles are Still Being Missed

    ·

    Leaked API keys are no longer unusual, nor are the breaches that follow. So why are sensitive tokens still being so easily exposed? To find out, Intruder’s research team looked at what traditional vulnerability scanners actually cover and built a new secrets detection method to address gaps in existing approaches.  Applying this at scale by scanning 5 million applications revealed over

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

Previous Page
1 … 37 38 39 40 41 … 532
Next Page

1010.cx

cybersecurity / defense / intelligence