1010.cx

  • LuxSci Launches Enterprise-Grade HIPAA-Compliant Email Security for Mid-Sized Healthcare Organizations

    ·

    Press Release
    Cambridge, MA, 5th May 2026, CyberNewswire

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • ScarCruft Targets Gaming Platform With Windows, Android Backdoors

    ·

    Android, cyber security, Cyber Security News, Windows

    A sophisticated multiplatform supply-chain attack orchestrated by the North Korea-aligned APT group ScarCruft, targeting ethnic Koreans in China’s Yanbian region through a compromised gaming platform. The attack, believed to have been ongoing since late 2024, weaponized both Windows and Android components of sqgame[.]net, a video game platform that hosts traditional Yanbian-themed card and board games. […]

    The post ScarCruft Targets Gaming Platform With Windows, Android Backdoors appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • QevlarAI: Moving SOC Teams From Reactive Mode To Proactive Defense

    ·

    Blogs
    This week in cybersecurity from the editors at Cybercrime Magazine

    Sausalito, Calif. – May. 5, 2026

    – Watch the YouTube video

    SOC teams are overwhelmed by the volume of threat alerts they must manage. A Forrester analysis found that just three attack scenarios can trigger thousands of alerts, and Gartner estimates that 70 percent of threat detection and response cycle time is spent in the triage and investigation phases. Without a corresponding rise in resources, SOC teams are facing a growing capacity gap.

    Qevlar AI, a leader in AI for transforming security operations centers (SOCs), has raised $30 million in funding for its autonomous AI SOC platform. The funding will be used to turn alert investigations into security insights that help SOC teams strengthen their overall security posture.

    Cybercrime Magazine recently produced a 2-minute video featuring QevlarAI’s co-founder and CEO Ahmed Achchak giving us the backstory on his company and their platform.

    “Today, most SOCs measure success by how many alerts they tackle and how quickly they are resolved,” Achchak said in a press release. “But this is a firefighting approach that tells you nothing about your security posture.”

    QevlarAI is moving from autonomous alert investigations to an intelligent AI SOC platform that uncovers insights that transform how teams not only deal with alerts, but stop them from recurring. “We’re putting out the fire and finding out what started it to make sure it doesn’t happen again,” added Achchak.

    Watch the Video



    Cybercrime Magazine is Page ONE for Cybersecurity. Go to any of our sections to read the latest:

    • SCAM. The latest schemes, frauds, and social engineering attacks being launched on consumers globally.
    • NEWS. Breaking coverage on cyberattacks and data breaches, and the most recent privacy and security stories.
    • HACK. Another organization gets hacked every day. We tell you who, what, where, when, and why.
    • VC. Cybersecurity venture capital deal flow with the latest investment activity from various sources around the world.
    • M&A. Cybersecurity mergers and acquisitions including big tech, pure cyber, product vendors and professional services.
    • BLOG. What’s happening at Cybercrime Magazine. Plus the stories that don’t make headlines (but maybe they should).
    • PRESS. Cybersecurity industry news and press releases in real time from the editors at Business Wire.
    • PODCAST. New episodes daily on the Cybercrime Magazine Podcast feature victims, law enforcement, vendors, and cybersecurity experts.
    • RADIO. Tune into WCYB Digital Radio at Cybercrime.Radio, the first and only round-the-clock internet radio station devoted to cybersecurity.

    Contact us to send story tips, feedback and suggestions, and for sponsorship opportunities and custom media productions.

    The post QevlarAI: Moving SOC Teams From Reactive Mode To Proactive Defense appeared first on Cybercrime Magazine.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Anti-ICE Site GTFO ICE Accused of Exposing Data of 17,000+ Activists

    ·

    cybersecurity, Data Breach, GTFO ICE, ICE, Leaks, Miles Taylor, Privacy, Security, vulnerability
    An anti-ICE website, GTFO ICE, linked to Miles Taylor, is accused of exposing the personal details of 17,662 activists, sparking concerns that the data may have reached government agencies.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Silver Fox Uses Fake Tax Notices to Drop ValleyRAT and ABCDoor Backdoor

    ·

    cyber security, Cyber Security News

    Silver Fox is running a tax‑themed phishing campaign that abuses fake notices from Indian and Russian tax authorities to drop ValleyRAT and a new Python backdoor dubbed ABCDoor, using a customized RustSL loader to evade detection and enforce strict geofencing controls. The campaign shows how the group is steadily evolving from commodity RAT delivery to […]

    The post Silver Fox Uses Fake Tax Notices to Drop ValleyRAT and ABCDoor Backdoor appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Critical Weaver E-cology RCE Exploit Raises Alarm for Enterprise Systems

    ·

    CVE/vulnerability, cyber security, Cyber Security News, vulnerability

    A critical unauthenticated remote code execution vulnerability in Weaver (Fanwei) E-cology is being actively exploited in the wild, with real-world intrusion activity traced back to mid-March 2026, weeks before public awareness. Tracked as CVE-2026-22679 with a CVSS score of 9.8, this flaw exposes enterprise office automation systems to full OS-level compromise without requiring any authentication. Vulnerability Overview CVE-2026-22679 […]

    The post Critical Weaver E-cology RCE Exploit Raises Alarm for Enterprise Systems appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Cisco Acquisition of Astrix Security Signals to Strengthen on Non-Human Identity Security

    ·

    Cisco, cyber security, Cyber Security News

    Networking and security leader Cisco has announced its intent to acquire Astrix Security, a pioneer in Non-Human Identity (NHI) management. Announced in May 2026, this acquisition is designed to help enterprises secure the rapidly expanding “agentic workforce”, the growing ecosystem of autonomous AI agents that operate alongside human employees. As organizations integrate AI into their […]

    The post Cisco Acquisition of Astrix Security Signals to Strengthen on Non-Human Identity Security appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Cerberus Stalkerware Hits Google Play, Abuses Accessibility and Firebase for Remote Control

    ·

    cyber security, Cyber Security News

    Cerberus Anti-theft, a long-running Android “security” app, is operating as full-featured stalkerware on Google Play, abusing accessibility services and Google Firebase to give abusers near-total remote control over victims’ phones. Once installed, Cerberus lets an abuser push a custom lock‑screen notification to the victim’s device from a web dashboard at cerberusapp.com or a paired smartwatch. […]

    The post Cerberus Stalkerware Hits Google Play, Abuses Accessibility and Firebase for Remote Control appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The Back Door Attackers Know About — and Most Security Teams Still Haven’t Closed

    ·

    Every AI tool, workflow automation, and productivity app your employees connected to Google or Microsoft this year left something behind: a persistent OAuth token with no expiration date, no automatic cleanup, and in most organizations, no one watching it. Your perimeter controls don’t see it. Your MFA doesn’t stop it. And when an attacker gets hold of one, they don’t need a password. OAuth

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • MetInfo CMS CVE-2026-29014 Exploited for Remote Code Execution Attacks

    ·

    Threat actors are actively exploiting a critical security flaw impacting an open-source content management system (CMS) known as MetInfo, according to new findings from VulnCheck. The vulnerability in question is CVE-2026-29014 (CVSS score: 9.8), a code injection flaw that could result in arbitrary code execution. “MetInfo CMS versions 7.9, 8.0, and 8.1 contain an unauthenticated PHP code

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

Previous Page
1 2 3 4 5 6 … 761
Next Page

1010.cx

cybersecurity / defense / intelligence