1010.cx

  • Storm-2755 Uses AiTM Hijacking to Divert Employee Salaries

    ·

    cyber security, Cyber Security News

    Hackers are abusing adversary-in-the-middle (AiTM) session hijacking to steal employee salaries in a new “payroll pirate” campaign tracked by Microsoft as Storm-2755 and targeting Canadian users. By hijacking live Microsoft 365 sessions, the group redirects payroll deposits to attacker-controlled bank accounts while bypassing multifactor authentication (MFA) and blending in with normal user activity. The group’s […]

    The post Storm-2755 Uses AiTM Hijacking to Divert Employee Salaries appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • EngageSDK Vulnerability puts millions of crypto wallets at risk

    ·

    cyber security, Cyber Security News, vulnerability

    A newly disclosed vulnerability in the widely used Android library EngageSDK has raised serious concerns across the cryptocurrency ecosystem, potentially exposing millions of users to data theft and unauthorized access. Security researchers identified a critical “intent redirection” vulnerability in EngageSDK, a third-party Android SDK commonly used for push notifications and in-app messaging. The issue allows […]

    The post EngageSDK Vulnerability puts millions of crypto wallets at risk appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • GlassWorm Campaign Uses Zig Dropper to Infect Multiple Developer IDEs

    ·

    Cybersecurity researchers have flagged yet another evolution of the ongoing GlassWorm campaign, which employs a new Zig dropper that’s designed to stealthily infect all integrated development environments (IDEs) on a developer’s machine. The technique has been discovered in an Open VSX extension named “specstudio.code-wakatime-activity-tracker,” which masquerades as WakaTime, a

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Hackers Exploit GitHub Copilot Flaw to Exfiltrate Sensitive Data

    ·

    CVE/vulnerability, cyber security, Cyber Security News, GitHub, vulnerability

    A high-severity flaw in GitHub Copilot Chat recently allowed attackers to silently steal sensitive data like API keys and private source code. Tracked as CVE-2025-59145 with a critical CVSS score of 9.6, this vulnerability required no malicious code execution. Instead, hackers used a clever prompt injection technique known as “CamoLeak.” A security researcher publicly disclosed […]

    The post Hackers Exploit GitHub Copilot Flaw to Exfiltrate Sensitive Data appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Cybercrime Is An Industrialized Economy

    ·

    Blogs
    This week in cybersecurity from the editors at Cybercrime Magazine

    Sausalito, Calif. – Apr. 10, 2026

    – Read the full story in BusinessWorld

    Cybercrime operates like a legitimate, profit-driven economy, writes Subhalakshmi Ganapathy, chief IT security evangelist at ManageEngine, in a BusinessWorld article. Organized groups mirror corporate structures and have specialized roles such as research and development, marketing, and customer support. As a result, cyberattacks are more scalable, efficient, and accessible than ever, transforming the threat landscape for businesses.

    An example of this transformation is the rise of subscription-style cybercrime offerings such as ransomware-as-a-service (RaaS). The ready-made attack tools sold on underground marketplaces offer structured pricing tiers, user dashboards, and technical support that have effectively lowered the traditional entry barriers confronting budding cybercriminals.

    While individuals with limited technical expertise can purchase exploit kits, stolen data, or phishing services to immediately launch attacks, the developers of these tools relentlessly refine their products, similar to legitimate technology companies.

    This growing industrialization was predicted to drive global cybercrime losses to around $10.5 trillion annually by 2025 (and $12.2 trillion annually by 2031) according to Cybersecurity Ventures. Meanwhile, Deloitte’s Center for Financial Services estimates that synthetic identity fraud alone could generate global losses of at least $23 billion by 2030.

    Read the Full Story



    Cybercrime Magazine is Page ONE for Cybersecurity. Go to any of our sections to read the latest:

    • SCAM. The latest schemes, frauds, and social engineering attacks being launched on consumers globally.
    • NEWS. Breaking coverage on cyberattacks and data breaches, and the most recent privacy and security stories.
    • HACK. Another organization gets hacked every day. We tell you who, what, where, when, and why.
    • VC. Cybersecurity venture capital deal flow with the latest investment activity from various sources around the world.
    • M&A. Cybersecurity mergers and acquisitions including big tech, pure cyber, product vendors and professional services.
    • BLOG. What’s happening at Cybercrime Magazine. Plus the stories that don’t make headlines (but maybe they should).
    • PRESS. Cybersecurity industry news and press releases in real time from the editors at Business Wire.
    • PODCAST. New episodes daily on the Cybercrime Magazine Podcast feature victims, law enforcement, vendors, and cybersecurity experts.
    • RADIO. Tune into WCYB Digital Radio at Cybercrime.Radio, the first and only round-the-clock internet radio station devoted to cybersecurity.

    Contact us to send story tips, feedback and suggestions, and for sponsorship opportunities and custom media productions.

    The post Cybercrime Is An Industrialized Economy appeared first on Cybercrime Magazine.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • UNC6783 Hackers Use Fake Okta Pages in Corporate Breach Campaign

    ·

    Austin Larsen, BPO, Cyber Attack, Cyber Crime, Cyber-Attacks, cybersecurity, Extortion, Google, Okta, SCAM, Scams and Fraud, Security, UNC6783
    UNC6783 hackers and extortionists impersonate support staff, using fake Okta login pages and social engineering to access corporate systems and steal sensitive data.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Fake BTS Tour Ticket Scams Target Fans Worldwide

    ·

    cyber security, Cyber Security News

    Cybercriminals are exploiting the massive hype around BTS’s return to the global stage by launching a wave of fake ticketing websites targeting fans across multiple countries. The K-pop group recently reunited after nearly four years, during which members completed mandatory military service in South Korea. Their upcoming “ARIRANG” world tour has triggered overwhelming demand and […]

    The post Fake BTS Tour Ticket Scams Target Fans Worldwide appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Browser Extensions Are the New AI Consumption Channel That No One Is Talking About

    ·

    While much of the discussion on AI security centers around protecting ‘shadow’ AI and GenAI consumption, there’s a wide-open window nobody’s guarding: AI browser extensions.  A new report from LayerX exposes just how deep this blind spot goes, and why AI extensions may be the most dangerous AI threat surface in your network that isn’t on anyone’s 

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Iranian APT alert: 5,219 Rockwell PLCs exposed online

    ·

    APT, cyber security, Cyber Security News

    Censys has warned that more than 5,000 Rockwell Automation/Allen-Bradley PLCs are currently exposed to the internet as Iranian-affiliated APT actors actively target these devices across U.S. critical infrastructure. The same operators were previously associated with a November 2023 campaign that compromised at least 75 Unitronics PLCs in U.S. water and wastewater facilities, showing a continuing […]

    The post Iranian APT alert: 5,219 Rockwell PLCs exposed online appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Middle East Espionage Attack Uses Fake Secure Messaging Apps to Deliver ProSpy

    ·

    cyber security, Cyber Security News

    Hackers are impersonating popular secure messaging apps to deploy a sophisticated Android spyware tool called ProSpy against journalists, activists, and political figures across the Middle East, in a hack‑for‑hire campaign linked to the BITTER APT group. The campaign has been active since at least 2022. It primarily targets civil society members and potentially government officials in countries […]

    The post Middle East Espionage Attack Uses Fake Secure Messaging Apps to Deliver ProSpy appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

Previous Page
1 … 68 69 70 71 72 … 768
Next Page

1010.cx

cybersecurity / defense / intelligence