1010.cx

  • AI Agents Are Becoming Privilege Escalation Paths

    ·

    AI agents have quickly moved from experimental tools to core components of daily workflows across security, engineering, IT, and operations. What began as individual productivity aids, like personal code assistants, chatbots, and copilots, has evolved into shared, organization-wide agents embedded in critical processes. These agents can orchestrate workflows across multiple systems, for example:

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Hacker Claims Full Breach of Max Messenger, Threatens Public Data Leak

    ·

    Cyber Attack, Cyber-Attacks, cybersecurity, DarkForums, Data Breach, Encryption, Max Messenger, Privacy, Russia, Security, Teelgram, VK, vulnerability, WhatsApp
    A hacker using the alias CamelliaBtw has claimed responsibility for a major data breach involving Max Messenger, according…

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Hackers Exploit c-ares DLL Side-Loading to Bypass Security and Deploy Malware

    ·

    Security experts have disclosed details of an active malware campaign that’s exploiting a DLL side-loading vulnerability in a legitimate binary associated with the open-source c-ares library to bypass security controls and deliver a wide range of commodity trojans and stealers. “Attackers achieve evasion by pairing a malicious libcares-2.dll with any signed version of the legitimate ahost.exe (

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Survey: Rapid AI Adoption Causes Major Cyber Risk Visibility Gaps

    ·

    AI, Artificial Intelligence, cybersecurity, News, Security, Technology, vulnerability
    As software supply chains become longer and more interconnected, enterprises have become well aware of the need to…

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • AI-Powered Deepfake Scams Are A Pain In The Wallet

    ·

    Blogs
    This week in cybersecurity from the editors at Cybercrime Magazine

    Sausalito, Calif. – Jan. 14, 2026

    –Read the full story in Finextra

    With the democratization of artificial intelligence (AI) technology, deepfakes are becoming a popular tool among cybercriminals with which to scam consumers, businesses and even institutions, out of their cash.

    In Mastercard’s Cybersecurity Survey 2025 it was estimated that losses and damages from cyberattacks came to $9.5 trillion in 2024, according to Cybersecurity Ventures – making cybercrime the third-largest economy in the world. That figure was $10.5 trillion for 2025, and it’s predicted to hit more than $12 trillion in 2031.

    In one example, UK engineering firm Arup fell victim to a £20 million deepfake scam in which a Hong Kong employee was duped into sending cash to criminals, having joined a video call led by an AI-generated senior officer.

    A recent Medus survey found that the majority (53 percent) of finance professionals have been targeted by attempted deepfake schemes. Even more concerning is the fact that 43 percent admitted to ultimately falling victim to the attack.

    The good news is that with the right level of knowledge and awareness, organisations can protect themselves with little capital investment. A Finextra article shares some of the ways to spot the use of voice cloning, deepfake video, and social engineering.

    Read the Full Story



    Cybercrime Magazine is Page ONE for Cybersecurity. Go to any of our sections to read the latest:

    • SCAM. The latest schemes, frauds, and social engineering attacks being launched on consumers globally.
    • NEWS. Breaking coverage on cyberattacks and data breaches, and the most recent privacy and security stories.
    • HACK. Another organization gets hacked every day. We tell you who, what, where, when, and why.
    • VC. Cybersecurity venture capital deal flow with the latest investment activity from various sources around the world.
    • M&A. Cybersecurity mergers and acquisitions including big tech, pure cyber, product vendors and professional services.
    • BLOG. What’s happening at Cybercrime Magazine. Plus the stories that don’t make headlines (but maybe they should).
    • PRESS. Cybersecurity industry news and press releases in real time from the editors at Business Wire.
    • PODCAST. New episodes daily on the Cybercrime Magazine Podcast feature victims, law enforcement, vendors, and cybersecurity experts.
    • RADIO. Tune into WCYB Digital Radio at Cybercrime.Radio, the first and only round-the-clock internet radio station devoted to cybersecurity.

    Contact us to send story tips, feedback and suggestions, and for sponsorship opportunities and custom media productions.

    The post AI-Powered Deepfake Scams Are A Pain In The Wallet appeared first on Cybercrime Magazine.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Microsoft January 2026 Patch Tuesday: 115 Vulnerabilities Fixed

    ·

    0day, cybersecurity, Microsoft, Patch Tuesday, Security, vulnerability
    Microsoft kicks off 2026 with 115 security updates, including a fix for an actively exploited zero-day. Protect your Windows and Office systems today.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • DragonForce Ransomware Breakdown and Decryptor for ESXi & Windows

    ·

    cyber security, Cyber Security News, Ransomware

    Security researchers have published an in‑depth technical analysis of the DragonForce ransomware operation, along with details of working decryptors for both Windows and ESXi systems targeting specific victims. By the time its dedicated Data Leak Site (DLS) was identified later that month, 17 victim organizations had already been listed. DragonForce markets itself as a cartel […]

    The post DragonForce Ransomware Breakdown and Decryptor for ESXi & Windows appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • SpyCloud Launches Supply Chain Solution to Combat Rising Third-Party Identity Threats

    ·

    Monitoring, Press Release, Product Launch
    Austin, TX / USA, 14th January 2026, CyberNewsWire

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • North Korean Hackers Exploit Code Repositories in “Contagious Interview” Campaign

    ·

    cyber security, Cyber Security News

    A newly documented campaign dubbed “Contagious Interview” shows North Korean threat actors weaponising developer tooling and code-repository workflows to steal credentials, cryptocurrency wallets and establish remote access even when victims never “run” the code they are sent. In a recent case analysed by SEAL, a malicious Bitbucket repository (hxxps://bitbucket[.]org/0xmvptechlab/ctrading) was delivered as a take‑home technical […]

    The post North Korean Hackers Exploit Code Repositories in “Contagious Interview” Campaign appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • GitGuardian Closes 2025 with Strong Enterprise Momentum, Protecting Millions of Developers Worldwide

    ·

    Press Release
    New York, NY, 14th January 2026, CyberNewsWire

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

Previous Page
1 … 52 53 54 55 56 … 534
Next Page

1010.cx

cybersecurity / defense / intelligence