1010.cx

  • Malicious Go Crypto Module Steals Passwords, Deploys Rekoobe Backdoor

    ·

    Cybersecurity researchers have disclosed details of a malicious Go module that’s designed to harvest passwords, create persistent access via SSH, and deliver a Linux backdoor named Rekoobe. The Go module, github[.]com/xinfeisoft/crypto, impersonates the legitimate “golang.org/x/crypto” codebase, but injects malicious code that’s responsible for exfiltrating secrets entered via terminal password

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • WebcamGate 2009: A High School’s Laptop Initiative Turned Into A National Spying Scandal

    ·

    Blogs
    This week in cybersecurity from the editors at Cybercrime Magazine

    Sausalito, Calif. – Feb. 27, 2026

    – Watch the YouTube Short

    Cybercrime Magazine’s latest YouTube Short video, produced by Taylor Fox, looks back at a riveting privacy and surveillance story that gripped students, parents, and educators across the U.S.

    In 2009, a 15-year-old named Blake Robbins was called to the principal’s office and accused of taking drugs. The proof? A webcam photo… taken in his own bedroom.

    Blake was just a normal teen at Harriton High, in Philadelphia. But that year, the school gave every student a brand-new MacBook. It was supposed to be a dream—homework, AIM chats, video games—all at your fingertips.

    Except that dream came with a dark twist. The laptops had software called ‘Theft Track’ meant to locate lost or stolen computers. But instead, it secretly took thousands of photos of students at home. Without their knowledge. Without their consent.

    When a photo surfaced of Blake holding what appeared to be drugs, the school freaked out. But Blake hadn’t touched drugs. That ‘proof’? It was just a misshapen Mike and Ike candy from a video he sent to a friend.



    The case went viral. It was called WebcamGate. The FBI uncovered over 56,000 images taken on students’ laptops. 36 students were targeted at home. Many never had a missing laptop. And still… their privacy was stripped away.

    Blake and his family sued. Settlements were reached, but most of the money went to lawyers. His sister Paige sued later, fearing the photos could ruin her future. Meanwhile, the school defended itself, claiming it never ‘spied’ on students.

    What happened to Blake wasn’t an anomaly. It was a preview of how student surveillance could become normal. Is this just the beginning?

    Blake left Pennsylvania at 18. The school? Still denying wrongdoing.

    That laptop – that photo – changed how America thinks about privacy in schools today. (Here’s Blake’s current Instagram account)

    Watch the Video


    Cybercrime Magazine is Page ONE for Cybersecurity. Go to any of our sections to read the latest:

    • SCAM. The latest schemes, frauds, and social engineering attacks being launched on consumers globally.
    • NEWS. Breaking coverage on cyberattacks and data breaches, and the most recent privacy and security stories.
    • HACK. Another organization gets hacked every day. We tell you who, what, where, when, and why.
    • VC. Cybersecurity venture capital deal flow with the latest investment activity from various sources around the world.
    • M&A. Cybersecurity mergers and acquisitions including big tech, pure cyber, product vendors and professional services.
    • BLOG. What’s happening at Cybercrime Magazine. Plus the stories that don’t make headlines (but maybe they should).
    • PRESS. Cybersecurity industry news and press releases in real time from the editors at Business Wire.
    • PODCAST. New episodes daily on the Cybercrime Magazine Podcast feature victims, law enforcement, vendors, and cybersecurity experts.
    • RADIO. Tune into WCYB Digital Radio at Cybercrime.Radio, the first and only round-the-clock internet radio station devoted to cybersecurity.

    Contact us to send story tips, feedback and suggestions, and for sponsorship opportunities and custom media productions.

    The post WebcamGate 2009: A High School’s Laptop Initiative Turned Into A National Spying Scandal appeared first on Cybercrime Magazine.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Researchers Unveil Aeternum C2 Infrastructure with Advanced Evasion and Persistence Tactics

    ·

    cyber security, Cyber Security News

    For years, defenders have relied on a simple strategy to dismantle botnets find and seize their command-and-control (C2) servers. That weakness enabled global law enforcement operations to disrupt massive botnets such as Emotet, TrickBot, and QakBot. But a newly identified C2 framework, Aeternum, may render those tactics obsolete. Instead of using centralized servers or domains, Aeternum […]

    The post Researchers Unveil Aeternum C2 Infrastructure with Advanced Evasion and Persistence Tactics appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Stored XSS Vulnerability in RustFS Console Puts S3 Admin Credentials at Risk

    ·

    CVE/vulnerability, cyber security, Cyber Security News, vulnerability, xss

    A critical security flaw has been identified in the RustFS Console, exposing administrators to a high risk of account takeover. Tracked as CVE-2026-27822, this Stored Cross-Site Scripting (XSS) vulnerability carries a critical CVSS v3 score of 10.0 and affects versions of the Rust package before 1.0.0-alpha.82. The vulnerability allows an attacker to execute arbitrary JavaScript […]

    The post Stored XSS Vulnerability in RustFS Console Puts S3 Admin Credentials at Risk appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • ScarCruft Uses Zoho WorkDrive and USB Malware to Breach Air-Gapped Networks

    ·

    The North Korean threat actor known as ScarCruft has been attributed to a fresh set of tools, including a backdoor that uses Zoho WorkDrive for command-and-control (C2) communications to fetch more payloads and an implant that uses removable media to relay commands and breach air-gapped networks. The campaign, codenamed Ruby Jumper by Zscaler ThreatLabz, involves the deployment of malware

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Study Finds 87% of Organizations Exposed to Attacks Due to Known Vulnerabilities

    ·

    CVE/vulnerability, cyber security, Cyber Security News, Vulnerabilities

    The 2026 State of DevSecOps report reveals a critical tension between development velocity and security. While organizations rapidly adopt AI-assisted coding, many fail to manage dependencies properly, leaving their software supply chains highly vulnerable to threat actors.​ Threat Intelligence Data Threat Vector Key Metric Security Impact Deployed Services 87% of organizations have known vulnerabilities ​. High […]

    The post Study Finds 87% of Organizations Exposed to Attacks Due to Known Vulnerabilities appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Dohdoor Malware Targets U.S. Schools and Healthcare with Multi-Stage Attack

    ·

    cyber security, Cyber Security News, Malware

    A new backdoor dubbed Dohdoor is actively targeting schools and health care organizations in the United States through a stealthy multi-stage attack chain. UAT-10027 focuses on education and health care entities in the U.S., sectors that handle highly sensitive personal and medical data but often have limited security budgets and legacy systems. Cisco Talos assesses with low […]

    The post Dohdoor Malware Targets U.S. Schools and Healthcare with Multi-Stage Attack appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Hackers Use 1Campaign to Hide Malicious Ads From Google Reviewers

    ·

    1Campaign, Cloaking, Google, Google ads, Malvertising, Phishing Kit, Phishing Scam, Scams and Fraud, Security, Varonis
    Varonis Threat Labs reveals 1Campaign, a platform used to trick Google Ads and hide phishing pages. Learn how this cloaking tool targets real users while evading security.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Trojanized Gaming Tools Spread Java-Based RAT via Browser and Chat Platforms

    ·

    Threat actors are luring unsuspecting users into running trojanized gaming utilities that are distributed via browsers and chat platforms to distribute a remote access trojan (RAT). “A malicious downloader staged a portable Java runtime and executed a malicious Java archive (JAR) file named jd-gui.jar,” the Microsoft Threat Intelligence team said in a post on X. “This downloader used PowerShell

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Upcoming Opportunities in Space Investment: What to Know About SpaceX

    ·

    Elon Musk, Fintech, IPO, Press Release, SpaceX, Technology
    Guide to the SpaceX IPO date, company profile, pricing method, risks, and how investors can prepare to buy shares when the company goes public soon.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

Previous Page
1 … 58 59 60 61 62 … 648
Next Page

1010.cx

cybersecurity / defense / intelligence