1010.cx

  • Why Secrets in JavaScript Bundles are Still Being Missed

    ·

    Leaked API keys are no longer unusual, nor are the breaches that follow. So why are sensitive tokens still being so easily exposed? To find out, Intruder’s research team looked at what traditional vulnerability scanners actually cover and built a new secrets detection method to address gaps in existing approaches.  Applying this at scale by scanning 5 million applications revealed over

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • New Study Finds GPT-5.2 Can Reliably Develop Zero-Day Exploits at Scale

    ·

    ChatGPT, cyber security, Cyber Security News, zeroday

    Advanced large language models can autonomously develop working exploits for zero-day vulnerabilities, marking a significant shift in the offensive cybersecurity landscape. The research demonstrates that artificial intelligence systems can now perform complex exploit development tasks that previously required specialized human expertise. The agents were challenged to develop exploits under realistic constraints, including modern security mitigations, […]

    The post New Study Finds GPT-5.2 Can Reliably Develop Zero-Day Exploits at Scale appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • WPair Scanner Released to Detect WhisperPair Flaw in Google’s Fast Pair Protocol

    ·

    Bluetooth, CVE/vulnerability, cyber security, Cyber Security News, Forensics Tools, Tools, vulnerability

    An open-source Android application designed to identify and test devices vulnerable to CVE-2025-36911, a critical authentication bypass flaw in Google’s Fast Pair Bluetooth protocol. The vulnerability, commonly referred to as WhisperPair, affects millions of Bluetooth audio devices worldwide, enabling unauthorised pairing and potentially granting access to microphoneswithout user consent. CVE-2025-36911 represents a significant cryptographic weakness […]

    The post WPair Scanner Released to Detect WhisperPair Flaw in Google’s Fast Pair Protocol appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • One Identity Unveils Major Upgrade to Identity Manager, Strengthening Enterprise Identity Security

    ·

    Press Release, Product Launch
    Alisa Viejo, United States, 20th January 2026, CyberNewsWire

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Critical WordPress Plugin Vulnerability Exposes 100,000+ Websites to Privilege Escalation Attacks

    ·

    cyber security, Cyber Security News, vulnerability, Wordpress

    A critical privilege escalation vulnerability discovered in the Advanced Custom Fields: Extended WordPress plugin threatens over 100,000 active installations. The vulnerability, identified as CVE-2025-14533 with a CVSS score of 9.8, allows unauthenticated attackers to elevate their privileges to administrative by exploiting a misconfigured user registration form. The Advanced Custom Fields: Extended plugin, an addon for […]

    The post Critical WordPress Plugin Vulnerability Exposes 100,000+ Websites to Privilege Escalation Attacks appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • VoidLink Debuts AI-Assisted, Server-Side Kernel Compilation Rootkit Technique

    ·

    AI, cyber security, Cyber Security News

    On January 13, 2026, Check Point Research published its analysis of VoidLink, a Chinese-developed Linux malware framework designed to target cloud environments. Following this disclosure, the Sysdig Threat Research Team (TRT) examined VoidLink’s binaries to understand its loader chain, rootkit internals, and control mechanisms. VoidLink’s most significant innovation addresses a persistent challenge in Linux malware: […]

    The post VoidLink Debuts AI-Assisted, Server-Side Kernel Compilation Rootkit Technique appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • TP-Link Router Flaw Enables Authentication Bypass Through Password Recovery Mechanism 

    ·

    CVE/vulnerability, Cyber Security News, Vulnerabilities, vulnerability

    TP-Link has disclosed a high-severity authentication bypass vulnerability affecting its VIGI security camera lineup, allowing attackers on local networks to reset administrator passwords without verification.   The flaw lies in the password recovery feature of the local web interface, which is exploited via client-side state manipulation.  The vulnerability (CVE-2026-0629) enables threat actors positioned on the same local area network (LAN) to gain […]

    The post TP-Link Router Flaw Enables Authentication Bypass Through Password Recovery Mechanism  appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Tudou Guarantee Marketplace Halts Telegram Transactions After Processing Over $12 Billion

    ·

    A Telegram-based guarantee marketplace known for advertising a broad range of illicit services appears to be winding down its operations, according to new findings from Elliptic. The blockchain intelligence company said Tudou Guarantee has effectively ceased transactions through its public Telegram groups following a period of significant growth. The marketplace is estimated to have processed

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Discord Exploited to Spread Clipboard Hijacker Stealing Cryptocurrency Funds

    ·

    cyber security, Cyber Security News, Discord

    CloudSEK’s STRIKE team has uncovered a sophisticated cryptocurrency theft operation orchestrated by the threat actor “RedLineCyber,” who deliberately impersonates the notorious RedLine Solutions to establish credibility within underground communities. Rather than collecting comprehensive system data, the malware employs a highly targeted approach: continuously monitoring the Windows clipboard for cryptocurrency wallet addresses and performing silent substitution […]

    The post Discord Exploited to Spread Clipboard Hijacker Stealing Cryptocurrency Funds appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • WhisperPair Vulnerability Allows Attackers to Pair Devices Without User Consent 

    ·

    Bluetooth, CVE/vulnerability, cyber security, Cyber Security News, vulnerability

    Google’s Fast Pair technology has revolutionised Bluetooth connectivity, enabling seamless one-tap pairing across supported accessories and account synchronisation for millions of users.  However, a critical vulnerability discovered in flagship audio accessories threatens the security of hundreds of millions of devices.  Attribute  Details  Vulnerability Name  WhisperPair – Unauthorized Device Pairing Without User Consent  CVE Identifier  CVE-2025-36911  Severity Rating  Critical  […]

    The post WhisperPair Vulnerability Allows Attackers to Pair Devices Without User Consent  appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

Previous Page
1 … 38 39 40 41 42 … 532
Next Page

1010.cx

cybersecurity / defense / intelligence