1010.cx

  • OpenAI Revokes macOS App Certificate After Malicious Axios Supply Chain Incident

    ·

    OpenAI revealed a GitHub Actions workflow used to sign its macOS apps, which downloaded the malicious Axios library on March 31, but noted that no user data or internal system was compromised. “Out of an abundance of caution, we are taking steps to protect the process that certifies our macOS applications are legitimate OpenAI apps,” OpenAI said in a post last week. “We found

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • WordPress Plugin Vulnerability Enables Admin Takeover via Auth Bypass

    ·

    cyber security, Cyber Security News, vulnerability, Wordpress

    A newly disclosed vulnerability, tracked as CVE-2026-1492, has been identified in the User Registration & Membership plugin for WordPress, exposing websites to critical authentication bypass and privilege escalation risks. Affecting versions up to 5.1.2, the vulnerability allows remote attackers to gain full administrative access without valid credentials. The affected plugin, widely used to manage user registration and membership […]

    The post WordPress Plugin Vulnerability Enables Admin Takeover via Auth Bypass appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • EDR Killers Broaden Ransomware Tactics, ESET Warns

    ·

    cyber security, Cyber Security News, Ransomware

    Ransomware gangs are rapidly expanding their use of EDR killers, moving beyond vulnerable drivers to a broader mix of scripts, anti‑rootkits, and driverless techniques. The company’s latest telemetry-backed study tracks almost 90 distinct EDR killers actively used in the wild. It warns that these tools have become a predictable, standard stage in modern ransomware operations. In […]

    The post EDR Killers Broaden Ransomware Tactics, ESET Warns appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Elon Musk Announces XChat Launch With Self-Destructing Messages

    ·

    Chatbots, cyber security, Cyber Security News

    Elon Musk has officially announced the launch of XChat, a new secure messaging application scheduled to release on iOS devices on April 17. The platform builds upon the existing direct messaging infrastructure of X (formerly Twitter) but introduces a dedicated environment with advanced privacy controls. This launch represents a significant milestone in Musk’s long-term vision […]

    The post Elon Musk Announces XChat Launch With Self-Destructing Messages appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Google Brings End-to-End Encrypted Gmail to Android and iPhone

    ·

    cyber security, Cyber Security News, Gmail, Google

    Google has officially expanded Gmail’s end-to-end encryption (E2EE) feature to Android and iOS devices, empowering organizations and users to protect the confidentiality of email content directly from their mobile devices. This enhancement is part of Gmail’s client-side encryption (CSE) program, enabling stricter compliance controls and preserving data sovereignty across regulated industries. With this new rollout, Gmail users can […]

    The post Google Brings End-to-End Encrypted Gmail to Android and iPhone appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • WhatsApp’s “End-to-End Encryption by Default” Claim Called Consumer Fraud by Pavel Durov

    ·

    cyber security, Cyber Security News, WhatsApp

    Telegram founder Pavel Durov has publicly criticized WhatsApp, labeling its “end-to-end encryption by default” claim as a massive consumer fraud. He argues that while messages may be encrypted during transit, the default backup settings leave the vast majority of user conversations completely unprotected. In a recent statement on the social media platform X, Durov highlighted […]

    The post WhatsApp’s “End-to-End Encryption by Default” Claim Called Consumer Fraud by Pavel Durov appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Adobe Fixes Actively Exploited Zero-Day in Acrobat Reader

    ·

    CVE/vulnerability, cyber security, Cyber Security News, vulnerability

    Adobe has released an emergency security update to address a critical zero-day vulnerability in Acrobat and Reader for Windows and macOS. According to Adobe’s APSB26-43 bulletin, the flaw is currently being exploited in the wild, prompting a Priority 1 rating from the company. Designated as CVE-2026-34621, this vulnerability is an Improperly Controlled Modification of Object […]

    The post Adobe Fixes Actively Exploited Zero-Day in Acrobat Reader appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Hacker Used Claude Code, GPT-4.1 to Exfiltrate Hundreds of Millions of Mexican Records

    ·

    AI, Artificial Intelligence, ChatGPT, Claude, Claude Code, Cyber Attack, Cyber Crime, Cyber-Attacks, cybersecurity, Data Breaches, Mexico, OpenAI, Security
    A lone hacker used Claude Code and GPT-4.1 to exfiltrate hundreds of millions of Mexican citizen records from 9 government agencies.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • FBI Atlanta and Indonesian National Police Take Down W3LLSTORE Phishing Marketplace

    ·

    Cyber Crime, FBI, FBI Atlanta, Fraud, Indonesia, Indonesian National Police, Microsoft 365, Phishing, Phishing Kit, Phishing Scam, SCAM, W3LLSTORE
    FBI Atlanta and Indonesian National Police dismantle W3LLSTORE phishing market linked to $20M fraud, seizing domains and detaining developer.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • CPUID Breach Distributes STX RAT via Trojanized CPU-Z and HWMonitor Downloads

    ·

    Unknown threat actors compromised CPUID (“cpuid[.]com”), a website that hosts popular hardware monitoring tools like CPU-Z, HWMonitor, HWMonitor Pro, and PerfMonitor, for less than 24 hours to serve malicious executables for the software and deploy a remote access trojan called STX RAT. The incident lasted from approximately April 9, 15:00 UTC, to about April 10, 10:00 UTC, with

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

Previous Page
1 … 65 66 67 68 69 … 767
Next Page

1010.cx

cybersecurity / defense / intelligence