1010.cx

  • Visual Studio Code Abused in Sophisticated Multistage Malware Attacks

    ·

    cyber security, Cyber Security News, Malware

    A newly analyzed campaign dubbed “Evelyn Stealer” is turning the Visual Studio Code (VSC) extension ecosystem into an attack delivery platform, enabling threat actors to compromise software developers and pivot deeper into enterprise environments. The campaign abuses seemingly legitimate extensions including a “Bitcoin Black” theme and a “Codo AI” coding assistant as the initial lure. […]

    The post Visual Studio Code Abused in Sophisticated Multistage Malware Attacks appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Computer History, 1989: The Queen Of The Hackers Tracked Down By U.S. Secret Service

    ·

    Blogs
    This week in cybersecurity from the editors at Cybercrime Magazine

    Sausalito, Calif. – Jan. 19, 2026

    –Watch the YouTube video

    On Aug. 17, 1990, a federal judge sentenced a Chicago woman to 27 months in prison for masterminding a nationwide ring of computer hackers that stole more than $1.6 million of telephone and computer service from various companies, according to the Chicago Tribune. Leslie Lynne Doucette, 35 at the time, was given credit for the 14 months she had already served in prison since her arrest in 1989.

    Doucette was accused of setting up a network of 60 teenagers throughout the U.S. who were employed to hack into computers and obtain people’s credit card numbers which they then used to access services. Doucette then pocketed some $1.5 million raised by the teenagers, some of whom were as young as 14.

    In 1989, a U.S. Secret Service Agent told the New Computer Express that Doucette was the leader of a national conspiracy that was the largest hacking network he’d ever come across. “We call her the Queen of the Hackers,” said another Secret Service Agent.

    A new 2-minute video produced by Cybercrime Magazine featuring our social media manager, Taylor Fox, recounting Doucette’s story was released on TikTok and YouTube.

    Watch the Video



    Cybercrime Magazine is Page ONE for Cybersecurity. Go to any of our sections to read the latest:

    • SCAM. The latest schemes, frauds, and social engineering attacks being launched on consumers globally.
    • NEWS. Breaking coverage on cyberattacks and data breaches, and the most recent privacy and security stories.
    • HACK. Another organization gets hacked every day. We tell you who, what, where, when, and why.
    • VC. Cybersecurity venture capital deal flow with the latest investment activity from various sources around the world.
    • M&A. Cybersecurity mergers and acquisitions including big tech, pure cyber, product vendors and professional services.
    • BLOG. What’s happening at Cybercrime Magazine. Plus the stories that don’t make headlines (but maybe they should).
    • PRESS. Cybersecurity industry news and press releases in real time from the editors at Business Wire.
    • PODCAST. New episodes daily on the Cybercrime Magazine Podcast feature victims, law enforcement, vendors, and cybersecurity experts.
    • RADIO. Tune into WCYB Digital Radio at Cybercrime.Radio, the first and only round-the-clock internet radio station devoted to cybersecurity.

    Contact us to send story tips, feedback and suggestions, and for sponsorship opportunities and custom media productions.

    The post Computer History, 1989: The Queen Of The Hackers Tracked Down By U.S. Secret Service appeared first on Cybercrime Magazine.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Google Gemini AI Tricked Into Leaking Calendar Data via Meeting Invites

    ·

    AI, Artificial Intelligence, cybersecurity, Gemini, Google, Google Calendar, Privacy, Security, Technology, vulnerability
    Cybersecurity researchers at Miggo Security found a flaw in Google Gemini that uses calendar invites to steal private data. Learn how this silent attack bypasses security.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Remcos RAT Campaign Uses Trojanized VeraCrypt Installers to Steal Credentials

    ·

    cyber security, Cyber Security News

    AhnLab Security Intelligence Center (ASEC) has identified an active Remcos RAT campaign targeting users in South Korea. The malware is being spread through multiple channels. It often masquerades as VeraCrypt utilities or tools used within illegal online gambling ecosystems. Once installed, the RAT can steal login credentials, monitor user activity, and give attackers remote control […]

    The post Remcos RAT Campaign Uses Trojanized VeraCrypt Installers to Steal Credentials appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Pulsar RAT Abuses Memory-Only Execution and HVNC for Stealthy Remote Takeover 

    ·

    cyber security, Cyber Security News, Malware

    Pulsar RAT, an advanced evolution of the open-source Quasar RAT, is actively targeting Windows systems with enhanced stealth capabilities and fileless execution techniques.  This modular remote access trojan combines memory-only loading, hidden virtual network computing (HVNC), and cryptocurrency wallet clipping to establish persistent backdoor access while evading traditional security defenses.  Advanced Evasion Through Memory-Only Deployment  The malware distinguishes itself through sophisticated anti-analysis […]

    The post Pulsar RAT Abuses Memory-Only Execution and HVNC for Stealthy Remote Takeover  appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • ⚡ Weekly Recap: Fortinet Exploits, RedLine Clipjack, NTLM Crack, Copilot Attack & More

    ·

    In cybersecurity, the line between a normal update and a serious incident keeps getting thinner. Systems that once felt reliable are now under pressure from constant change. New AI tools, connected devices, and automated systems quietly create more ways in, often faster than security teams can react. This week’s stories show how easily a small mistake or hidden service can turn into a real

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Unmasked by Leaks: The Hidden Backbone of a Ransomware Operation

    ·

    cyber security, Cyber Security News, Ransomware

    The leaks tied to the BlackBasta ransomware group and Russian hosting company Media Land pulled back the curtain on something defenders rarely get to see: the internal machinery and people behind a major ransomware operation. In February 2025, an unknown individual using the handle ExploitWhispers appeared on Telegram and published a massive archive of BlackBasta’s internal chats […]

    The post Unmasked by Leaks: The Hidden Backbone of a Ransomware Operation appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Hackers Exploiting PDF24 App to Deploy Stealthy PDFSIDER Backdoor

    ·

    backdoor, Cyber Attack, cybersecurity, LOTUSLITE, Malware, Mustang Panda, PDF24, PDFSIDER, Phishing, Phishing Scam, Security
    Resecurity has identified PDFSIDER malware that exploits the legitimate PDF24 App to covertly steal data and allow remote access. Learn how this APT-level campaign targets corporate networks through spear-phishing and encrypted communications.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • CIRO Confirms Data Breach Impacting 750,000 Canadian Investors 

    ·

    cyber security, Cyber Security News, Data Breach

    The Canadian Investment Regulatory Organization (CIRO) has officially confirmed a significant data breach affecting approximately 750,000 Canadian investors, stemming from a sophisticated phishing attack initially detected in August 2025.   The organization publicly disclosed the incident on January 14, 2026, following a comprehensive forensic investigation spanning over 9,000 hours.  CIRO traced the breach to unauthorized access gained through a targeted […]

    The post CIRO Confirms Data Breach Impacting 750,000 Canadian Investors  appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Windows SMB Client Vulnerability Exposes Organizations to Full Active Directory Compromise 

    ·

    CVE/vulnerability, cyber security, Cyber Security News, Windows

    A severe vulnerability in Windows Server Message Block (SMB) client authentication has emerged as a critical threat to Active Directory environments.  CVE-2025-33073, a logical flaw in NTLM reflection handling, enables authenticated attackers to escalate to SYSTEM-level privileges and compromise domain controllers, potentially allowing them to take over entire Active Directory forests.  Field  Value  CVE ID  CVE-2025-33073  Vulnerability […]

    The post Windows SMB Client Vulnerability Exposes Organizations to Full Active Directory Compromise  appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

Previous Page
1 … 40 41 42 43 44 … 532
Next Page

1010.cx

cybersecurity / defense / intelligence