1010.cx

  • Critical Apache Struts 2 Flaw Could Let Attackers Steal Sensitive Data

    ·

    CVE/vulnerability, cyber security, Cyber Security News, vulnerability

    A newly disclosed vulnerability in Apache Struts 2’s XWork component could expose sensitive data and open the door to denial‑of‑service and server‑side request forgery (SSRF) attacks if left unpatched. The flaw, tracked as CVE-2025-68493, is rated Important and affects a wide range of Struts 2 versions, putting many Java web applications at risk. Field Details CVE ID CVE-2025-68493 […]

    The post Critical Apache Struts 2 Flaw Could Let Attackers Steal Sensitive Data appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • ValleyRAT_S2: Stealth Intrusions Aimed at Financial Data Exfiltration

    ·

    cyber security, Cyber Security News

    A sophisticated second-stage malware payload known as ValleyRAT_S2 has emerged as a critical threat to organizations across Chinese-speaking regions, including mainland China, Hong Kong, Taiwan, and Southeast Asia. This Remote Access Trojan (RAT), written in C++, is a modular, highly evasive cyber-espionage tool designed to infiltrate systems, maintain persistent access, and extract sensitive financial and […]

    The post ValleyRAT_S2: Stealth Intrusions Aimed at Financial Data Exfiltration appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Critical React Router Flaws Could Let Attackers Access or Modify Server Files

    ·

    CVE/vulnerability, cyber security, Cyber Security News, vulnerability

    A critical vulnerability has been discovered in React Router and Remix that could allow attackers to access or modify sensitive files on web servers. The flaw affects multiple packages and has received a severity rating of Critical with a CVSS score of 8.8/10. Field Details CVE ID CVE-2025-61686 Severity Critical CVSS Score 8.8/10 Vulnerability Overview The security issue stems from […]

    The post Critical React Router Flaws Could Let Attackers Access or Modify Server Files appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Anthropic Launches Claude AI for Healthcare with Secure Health Record Access

    ·

    Anthropic has become the latest Artificial intelligence (AI) company to announce a new suite of features that allows users of its Claude platform to better understand their health information. Under an initiative called Claude for Healthcare, the company said U.S. subscribers of Claude Pro and Max plans can opt to give Claude secure access to their lab results and health records by connecting to

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Lightning Lab gives Pacific Army division drone-building capabilities on the front lines

    ·

    Science & Tech
    SCHOFIELD BARRACKS, Hawaii—The 25th Infantry Division is all about drones: Drones that sense. Drones that shoot. Drones that get blown to smithereens for HIMARS target-practice. And more and more, drones built by soldiers themselves.

    Tucked away in the converted storage room of a former movie theater, a handful of soldiers are producing drones by the dozen as part of the division’s Lightning Lab, a 13-person unit borrowed from other parts of the division and rapidly trained to build drones, training aids and ad hoc solutions to problems encountered on the battlefield. 

    The Lightning Lab troops also take their 3D printers on the road. When the division was deploying to the Philippines last summer, the unit was tasked with producing drones to use during the training, said Chief Warrant Officer 2 John Crutcher. They decided to produce a 3D-printed unibody frame they called the kestrel, so they “went out to the Philippines, made 125 of them out there in the field, and took a lot of good feedback from the field,” including that soldiers needed to be able to fly the drones indoors, for training and room-clearing, Crutcher said.

    So, a week after they returned to Hawaii, they made a new model, dubbed the Falconette.

    The rapid—some might even say “lightning-fast”—speed at which the lab can gather feedback and adapt is a key component of the U.S. Army’s Transformation in Contact initiative, and a radical departure from the traditional yearslong defense acquisition process.

    Lt. Col. Eugene Miranda, spokesman for the 25th Infantry Division, said much of what the lab does is “soldier-driven innovation from the point of need.”

    “A lot of that innovation is being powered down to the soldiers who are actually the users of the things. So we get that real-time feedback, versus these age-old systems where it’s optimized only for the process of the planning, programming, budgeting and execution time horizon.”

    [[Related Posts]]

    In addition to the Kestrel and Falconette, the lab also makes one-way attack drones that cost just $12 in components to make, and is working with a company that won an Army innovation competition on swarm tech. The company brought its winning tech here and “in 24 hours, we had redesigned our Kestrel frame to be able to fit their components to be able to get up and fly a swarm,” Crutcher said.

    It’s not just drones. During the Philippines trip, Crutcher said, they printed 110 new buttstocks for rifles, because the scopes were sitting too high to easily and comfortably use them with the original buttstocks. They also print training aids. 

    So how much training do the soldiers need before they can build drones? Crutcher said his expertise came from “YouTube University, Google University, Reddit University.” 

    One soldier who showed up on a Tuesday morning had built his first drone by the afternoon, and was building drones unsupervised by Thursday, he said.

    The lab also teaches other units how to use the printers and build drones, because “we don’t want to be the single point of failure for the 25th ID,” Crutcher said. “You can’t rely on a 13-person shop to mass-manufacture at scale, right? Anybody who knows how to do math is going to be able to figure that out pretty quickly.”

    ]]>

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Fake Employee Performance Reports Deliver Guloader Malware

    ·

    cyber security, Cyber Security News, Malware

    Organizations are being warned about a new phishing campaign that weaponizes fake employee performance reports to deploy the Guloader malware and ultimately install Remcos RAT on compromised systems. In the observed cases, threat actors send phishing emails that purport to share an employee performance report for October 2025. The email body claims that management is […]

    The post Fake Employee Performance Reports Deliver Guloader Malware appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Researchers Uncover Service Providers Fueling Industrial-Scale Pig Butchering Fraud

    ·

    Cybersecurity researchers have shed light on two service providers that supply online criminal networks with the necessary tools and infrastructure to fuel the pig butchering-as-a-service (PBaaS) economy. At least since 2016, Chinese-speaking criminal groups have erected industrial-scale scam centers across Southeast Asia, creating special economic zones that are devoted to fraudulent investment

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Hacking Group “Everest” Allegedly Claims Nissan Motor Breach

    ·

    cyber security, Cyber Security News

    The Everest hacking group has allegedly claimed responsibility for a major cyberattack on Nissan Motor Co., Ltd., one of Japan’s leading automotive manufacturers. According to threat intelligence reports observed on January 10, 2026, the cybercriminal organization claims to have exfiltrated approximately 900 GB of sensitive data from the company’s systems, though the breach remains under […]

    The post Hacking Group “Everest” Allegedly Claims Nissan Motor Breach appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Critical InputPlumber Flaw Enables UI Input Injection and Denial-of-Service

    ·

    CVE/vulnerability, cyber security, Cyber Security News, Vulnerabilities, vulnerability

    Security researchers have discovered critical vulnerabilities in InputPlumber, a Linux input device utility used in SteamOS, that could allow attackers to inject keystrokes, leak sensitive information, and cause denial-of-service conditions. The flaws, tracked as CVE-2025-66005 and CVE-2025-14338, affect InputPlumber versions before v0.69.0 and stem from inadequate D-Bus authorization checks. CVE ID Description Affected Versions Impact […]

    The post Critical InputPlumber Flaw Enables UI Input Injection and Denial-of-Service appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Researchers Uncover 28 Unique IPs and 85 Domains Hosting Carding Markets

    ·

    cyber security, Cyber Security News

    Between July and December 2025, cybersecurity firm Team Cymru conducted an extensive analysis of carding infrastructure, revealing a sophisticated network comprising 28 unique IP addresses and 85 domains that actively host illicit carding markets and forums. The research employed technical fingerprinting methods crucial for financial institutions, law enforcement agencies, and fraud fusion centers working to […]

    The post Researchers Uncover 28 Unique IPs and 85 Domains Hosting Carding Markets appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

Previous Page
1 … 65 66 67 68 69 … 535
Next Page

1010.cx

cybersecurity / defense / intelligence