1010.cx

  • Romanian Cybercriminal Admits Guilt in Scheme Selling Oregon State Government Network Access

    ·

    cyber security, Cyber Security News, vulnerability

    A Romanian national has pleaded guilty to charges related to unauthorized access and sale of network credentials belonging to an Oregon state government office and multiple other U.S. victims, the U.S. Department of Justice announced on February 20, 2026. Catalin Dragomir, 45, formerly of Constanta, Romania, admitted to breaking into the Oregon state government office’s […]

    The post Romanian Cybercriminal Admits Guilt in Scheme Selling Oregon State Government Network Access appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • UnsolicitedBooker Targets Central Asian Telecoms With LuciDoor and MarsSnake Backdoors

    ·

    The threat activity cluster known as UnsolicitedBooker has been observed targeting telecommunications companies in Kyrgyzstan and Tajikistan, marking a shift from prior attacks aimed at Saudi Arabian entities. The attacks involve the deployment of two distinct backdoors codenamed LuciDoor and MarsSnake, according to a report published by Positive Technologies last week. “The group used several

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Malicious OpenClaw Tactics Deceive Users into Manual Password Entry for AMOS Infection

    ·

    cyber security, Cyber Security News

    Malicious OpenClaw skills are being weaponized to coerce users into manually entering their passwords, enabling a new Atomic (AMOS) Stealer infection chain that abuses AI agent workflows as a social engineering channel. TrendAI™ Research has tracked Atomic (AMOS) Stealer’s evolution from crude “cracked” macOS software lures to a refined supply chain attack abusing OpenClaw’s skill […]

    The post Malicious OpenClaw Tactics Deceive Users into Manual Password Entry for AMOS Infection appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • ZeroDayRAT Targets Android and iOS Devices for Surveillance and Financial Data Theft

    ·

    Android, cyber security, Cyber Security News, iOS

    ZeroDayRAT targets Android and iOS devices, combining real-time surveillance with direct financial theft within a single browser panel. The Malware-as-a-Service (MaaS) ecosystem is entering a new phase, blending mobile surveillance and financial crime into one seamless platform. Active promotions for this RAT (Remote Access Trojan) began on Telegram channels on February 2, 2026, highlighting its dual purpose: real-time spying and direct financial […]

    The post ZeroDayRAT Targets Android and iOS Devices for Surveillance and Financial Data Theft appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Deserialization Flaw in Ruby Workers That Could Enable Full Compromise

    ·

    CVE/vulnerability, cyber security, Cyber Security News, vulnerability

    A severe Remote Code Execution (RCE) vulnerability has been identified in RubitMQ job workers, stemming from unsafe JSON deserialization practices. The issue arises not from memory corruption or complex undefined behavior, but from design-level trust assumptions regarding how data is processed in Ruby background systems. Security researcher NullSecurityX has demonstrated that this flaw allows attackers […]

    The post Deserialization Flaw in Ruby Workers That Could Enable Full Compromise appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • LUKS Encryption Compromised on Linux ICS Devices via TPM Bus Sniffing Exploit

    ·

    cyber security, Cyber Security News, Linux

    Security researchers Per Idenfeldt Okuyama and Sam Eizad have uncovered a critical physical attack vulnerability in the Moxa UC-1222A Secure Edition industrial computer, demonstrating that its LUKS full-disk encryption can be fully defeated by passively sniffing the SPI bus between the processor and the discrete TPM 2.0 chip during system boot. The flaw, tracked as […]

    The post LUKS Encryption Compromised on Linux ICS Devices via TPM Bus Sniffing Exploit appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Hackers Use Steganographic Images to Bypass Anti-Malware and Deploy Malware

    ·

    cyber security, Cyber Security News, Malware

    Hackers are abusing steganography in PNG images to smuggle a Pulsar Remote Access Trojan (RAT) into Windows systems through a malicious NPM package named buildrunner‑dev. The attack starts with a typosquatted NPM package, buildrunner‑dev, which impersonates the abandoned “buildrunner”/“build-runner” tools to catch developers who mistype or assume it is a maintained fork. Its package.json looks harmless but defines a postinstall hook […]

    The post Hackers Use Steganographic Images to Bypass Anti-Malware and Deploy Malware appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Pentagon’s spending plan doubles down on land, air, sea robots

    ·

    Policy
    The Pentagon will nearly double its innovation arm, expand the industrial base for cheap maritime and aerial drones, and develop new ways to ensure supplies of critical minerals, according to an unclassified spending strategy for the $151 billion in funding from the One Big Beautiful Bill Act.

    That money is $8.3 billion more than the $144 billion the Defense Department requested. But unlike normal discretionary funds, the spending is mandatory. The allocation plan obtained by Defense One shows a push to put more of the money to work quickly, despite the fact that the Pentagon has until September of 2029 to spend it. Large portions of the plan are hidden from the public due to classification.

    The largest allocations—some $24.4 billion—are for new missile defense systems as part of the Golden Dome missile shield. That includes approximately $2 billion for ground-based radars and $2.2 billion for the "acceleration of hypersonic defense systems." Space-based weapons to shoot down hypersonic missiles during the boost phase receive $5.6 billion. Additionally, the document identifies $250 million to develop lasers or other directed energy weapons that can take down new missile threats, and $40 million to develop cheaper air and missile defense interceptors.

    The strategy puts $4.6 billion toward a second Virginia-class submarine and $5.4 billion toward new guided missile destroyers, as expected. It also includes $2 billion to improve the U.S. production of critical minerals.

    The plan also includes multiple measures to address what many agree is a key shortcoming the department must overcome as it prepares for high-intensity conflict: getting enough low-cost, highly autonomous drones to the front lines quickly. The spending plan increases the Defense Innovation Unit’s budget to $2 billion—up from $1.3 billion enacted last year. It also includes $1.4 billion to expand the industrial base for drones, $500 million for the Defense Autonomous Warfare Group to prevent delays in the delivery of critical drones, and $650 million for joint innovation programs, such as multi-domain collaborative autonomy—getting sea, air, and land drones to communicate with one another and execute missions with minimal human involvement.

    The document illustrates that the department is looking to fund robots across land, sea, and air. The Army will receive $74 million for its Autonomous Ground Fighting Vehicle program, while the Navy will get $1.5 billion for small surface drones, $2.1 billion to expand the deployment of medium drone boats such as the Sea Hunter, and $1.3 billion to build and buy new underwater drones and payloads for them.

    In terms of artificial intelligence, the spending plan shows a $450 million plan to apply autonomy and artificial intelligence to shipbuilding and build out a unified "digital architecture" for shipyards and suppliers. The goal is to make it easier for the Navy to forecast needed materials, predict maintenance, optimize construction, and plan workforces. Additionally, the plan includes $145 million for the "development of artificial intelligence to enable one-way attack unmanned aerial systems and naval systems," and $1 billion for the X-37B military spacecraft program.

    Additionally, the plan allocates $250 million to advance an AI "ecosystem" and $124 million for "Improvements to Test Resource Management Center artificial intelligence capabilities.”

    ]]>

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Fake Huorong Site Delivers ValleyRAT Backdoor in Targeted Malware Campaign

    ·

    cyber security, Cyber Security News, Malware

    A typosquatted copy of the popular Huorong Security antivirus site is being used to deliver ValleyRAT, a modular remote access trojan (RAT) built on the Winos4.0 framework, to users who believe they are downloading legitimate protection software. The attackers registered huoronga[.]com adding a single “a” to the legitimate huorong.cn domain as part of a typosquatting strategy designed […]

    The post Fake Huorong Site Delivers ValleyRAT Backdoor in Targeted Malware Campaign appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Anthropic Facing Allegations from Musk Over Large‑Scale Data Misuse

    ·

    AI, Cyber Security News

    Tech billionaire Elon Musk has publicly condemned the artificial intelligence firm Anthropic, accusing the company of massive data theft and hypocrisy. This confrontation follows Anthropic’s recent claims that competing Chinese artificial intelligence models unlawfully extracted training data from its flagship Claude model. The Distillation Controversy Earlier this week, Anthropic published a report accusing Chinese AI […]

    The post Anthropic Facing Allegations from Musk Over Large‑Scale Data Misuse appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

Previous Page
1 … 72 73 74 75 76 … 650
Next Page

1010.cx

cybersecurity / defense / intelligence