1010.cx

  • Researchers Uncover 28 Unique IPs and 85 Domains Hosting Carding Markets

    ·

    cyber security, Cyber Security News

    Between July and December 2025, cybersecurity firm Team Cymru conducted an extensive analysis of carding infrastructure, revealing a sophisticated network comprising 28 unique IP addresses and 85 domains that actively host illicit carding markets and forums. The research employed technical fingerprinting methods crucial for financial institutions, law enforcement agencies, and fraud fusion centers working to […]

    The post Researchers Uncover 28 Unique IPs and 85 Domains Hosting Carding Markets appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • New “Penguin” Platform Sells Pig-Butchering Kits, PII, and Stolen Accounts

    ·

    cyber security, Cyber Security News

    The industrialization of pig butchering scams has reached a critical tipping point. A sprawling Pig Butchering-as-a-Service (PBaaS) economy has emerged across Southeast Asia, offering turnkey scam platforms, stolen identities, pre-registered SIM cards, mobile applications, payment infrastructure, and shell company formation services. PBaaS enable fraudsters to scale romance and investment fraud operations with unprecedented ease and minimal […]

    The post New “Penguin” Platform Sells Pig-Butchering Kits, PII, and Stolen Accounts appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Critical zlib Flaw Let Attackers Can Trigger a Buffer Overflow via untgz

    ·

    CVE/vulnerability, cyber security, Cyber Security News, vulnerability

    A severe buffer overflow vulnerability has been discovered in the zlib untgz utility, affecting version 1.3.1.2, allowing attackers to trigger memory corruption via maliciously crafted command-line arguments. The vulnerability resides in the TGZfname() function, where an unbounded strcpy() call copies user-supplied archive names directly into a fixed-size global buffer of 1024 bytes without any length […]

    The post Critical zlib Flaw Let Attackers Can Trigger a Buffer Overflow via untgz appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • EDRStartupHinder: Blocks Antivirus & EDR at Windows 11 25H2 Startup (Defender Included)

    ·

    Anti Virus, cyber security, Cyber Security News, Tools, Windows

    A cybersecurity researcher has unveiled EDRStartupHinder, a proof-of-concept tool that prevents antivirus and endpoint detection and response (EDR) solutions from launching during Windows startup, including Microsoft Defender on Windows 11 25H2. The technique exploits Windows Bindlink API functionality through the bindflt.sys driver to interfere with security software initialization. The tool builds on previous research into Bindlink […]

    The post EDRStartupHinder: Blocks Antivirus & EDR at Windows 11 25H2 Startup (Defender Included) appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Instagram’s “17 Million User Data Leak” Was Just Scraped Records from 2022

    ·

    BreachForums, cybersecurity, Data Breach, Instagram, LeakBase, Leaks, Malwarebytes, Meta, Privacy, Security
    Instagram’s 17 million user data leak wasn’t a new breach – Hackread.com’s in-depth analysis shows it was scraped in 2022, leaked in 2023, and falsely repackaged in 2026.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Europol Raids Disrupt Black Axe Cybercrime Ring in Spain

    ·

    Black Axe, Cyber Crime, cybersecurity, europe, Europol, Romance Scam, Scams and Fraud, Spain
    Authorities caught 34 members of the notorious Black Axe gang in Spain known for stealing millions of Euros through online romance scams and email fraud.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Database of 323,986 BreachForums Users Leaked as Admin Disputes Scope

    ·

    BreachForums, Cyber Attack, Cyber Crime, cybersecurity, Data Breach, Leaks, Privacy, Scattered LAPSUS$ Hunters, Security, ShinyHunters
    Database of 323,986 BreachForums users leaked online as forum admins claim the exposed data is partial and dates back to August 2025.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • CISA Urges Emergency Patching for Actively Exploited HPE OneView Flaw

    ·

    CISA, Cyber Attack, cybersecurity, Hewlett Packard Enterprise, HPE, KEV, Security, vulnerability
    CISA adds a critical HPE OneView flaw (CVE-2025-37164) to its KEV catalogue with a Jan 28 deadline. Learn how this 10.0 RCE bug puts server infrastructure at risk.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Massive Instagram Data Breach Exposes Personal Details of 17.5 Million Users

    ·

    cyber security, Cyber Security News, Data Breach

    A staggering cybersecurity incident has come to light, with 17.5 million Instagram users’ personal information exposed in a data breach advertised on dark web marketplaces. Cybersecurity firm Malwarebytes first alerted the public via X (formerly Twitter), confirming the leak’s severity as stolen data, including usernames, emails, phone numbers, and partial locations, circulates for sale. Affected […]

    The post Massive Instagram Data Breach Exposes Personal Details of 17.5 Million Users appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

    ·

    The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting diplomatic, maritime, financial, and telecom entities in the Middle East with a Rust-based implant codenamed RustyWater. “The campaign uses icon spoofing and malicious Word documents to deliver Rust based implants capable of asynchronous C2, anti-analysis, registry persistence, and modular

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

Previous Page
1 … 66 67 68 69 70 … 535
Next Page

1010.cx

cybersecurity / defense / intelligence