• This week in cybersecurity from the editors at Cybercrime Magazine

    Sausalito, Calif. – Feb. 23, 2026

    In 2024, Long Island Medium star Theresa Caputo slammed online scammers and begged fans not to send money to them. The reality star warned fans about many social media users impersonating her for financial gain.

    Caputo shared a video on Instagram, pleading with fans not to fall for the act. She showed a list of fake accounts claiming to be her and urged her followers not to interact with them.

    The TV star also assured fans that they can be sure to communicate with her or her team only through her fan club, stressing that she does not charge for her readings, according to a story in The U.S. Sun.

    Long Island Medium ended its 8-year run on TLC in Dec. 2019. In 2024, Caputo returned to reality TV with her new Lifetime series, Theresa Caputo: Raising Spirits. The show documents the star’s personal and professional life as a communicator with the dead and has featured many well-known celebrities.

    Caputo’s “The Experience” 2026 tour features live, emotional, and often humorous mediumship readings in cities across the U.S. Cybercrime Magazine’s Editor-in-Chief Steve Morgan interviewed Caputo at one of the venues last week for a riveting discussion on cybercrime, deepfakes, impersonation, scams, phishing, social engineering, Meta, Facebook, Instagram, TikTok, and a whole lot more.

    Stay tuned for a special video featuring Caputo on the award-winning Cybercrime Magazine YouTube channel.



    Cybercrime Magazine is Page ONE for Cybersecurity. Go to any of our sections to read the latest:

    • SCAM. The latest schemes, frauds, and social engineering attacks being launched on consumers globally.
    • NEWS. Breaking coverage on cyberattacks and data breaches, and the most recent privacy and security stories.
    • HACK. Another organization gets hacked every day. We tell you who, what, where, when, and why.
    • VC. Cybersecurity venture capital deal flow with the latest investment activity from various sources around the world.
    • M&A. Cybersecurity mergers and acquisitions including big tech, pure cyber, product vendors and professional services.
    • BLOG. What’s happening at Cybercrime Magazine. Plus the stories that don’t make headlines (but maybe they should).
    • PRESS. Cybersecurity industry news and press releases in real time from the editors at Business Wire.
    • PODCAST. New episodes daily on the Cybercrime Magazine Podcast feature victims, law enforcement, vendors, and cybersecurity experts.
    • RADIO. Tune into WCYB Digital Radio at Cybercrime.Radio, the first and only round-the-clock internet radio station devoted to cybersecurity.

    Contact us to send story tips, feedback and suggestions, and for sponsorship opportunities and custom media productions.

    The post Long Island Medium Star Theresa Caputo Meets Cybercrime Magazine – Live! appeared first on Cybercrime Magazine.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Top technology stacks for MVP development in 2026, best tools for fast launch, scalability, cost efficiency, and proven frameworks for startups building products.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • GrayCharlie is abusing compromised WordPress sites to silently load malicious JavaScript that pushes NetSupport RAT, often followed by Stealc and SectopRAT, via fake browser updates and ClickFix lures. Insikt Group tracks GrayCharlie as a financially motivated threat actor overlapping with SmartApeSG, active since mid‑2023, and specializing in turning legitimate WordPress sites into malware-delivery points. The […]

    The post GrayCharlie Hacks WordPress Sites, Spreads NetSupport RAT and Stealc Malware appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Security news rarely moves in a straight line. This week, it feels more like a series of sharp turns, some happening quietly in the background, others playing out in public view. The details are different, but the pressure points are familiar. Across devices, cloud services, research labs, and even everyday apps, the line between normal behavior and hidden risk keeps getting thinner. Tools

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • As more organizations run their own Large Language Models (LLMs), they are also deploying more internal services and Application Programming Interfaces (APIs) to support those models. Modern security risks are being introduced less from the models themselves and more from the infrastructure that serves, connects and automates the model. Each new LLM endpoint expands the attack surface, often in

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A new phishing campaign is spreading XWorm 7.2 via malicious Excel files, hiding the malware in Windows processes, and using AES encryption to steal passwords and Wi-Fi keys.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • New phishing framework Starkiller is enabling more convincing, scalable credential theft by proxying real login pages and bypassing multi-factor authentication (MFA), significantly raising the bar for defenders. Traditional phishing kits typically serve static HTML clones of popular login portals, which quickly become outdated when brands update their interfaces, creating telltale visual discrepancies. Starkiller takes a […]

    The post Starkiller Phishing Kit Clones Real Login Pages to Evade MFA Protections appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Cybersecurity researchers have disclosed what they say is an active “Shai-Hulud-like” supply chain worm campaign that has leveraged a cluster of at least 19 malicious npm packages to enable credential harvesting and cryptocurrency key theft. The campaign has been codenamed SANDWORM_MODE by supply chain security company Socket. As with prior Shai-Hulud attack waves, the malicious code embedded

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A General Atomics MQ-20 drone took orders from an F-22 pilot during a recent mock mission that demonstrated robot-wingman concepts, company officials said in a Monday statement.

    During a test flight earlier this month at Edwards Air Force Base in California, the pilot used Autonodyne’s Bashi pilot-vehicle interface to order the autonomous drone to “execute tactical maneuvers,” move waypoints, conduct combat patrols, and take on “threat engagement tasks,” the statement said. 

    “We appreciate the flawless execution of this mission using the government’s advanced autonomous systems,” said GA-ASI President David R. Alexander. “This demo featured the integration of mission elements and the ability of autonomy to utilize onboard sensors to make independent decisions and execute commands from the F-22.”

    The flight followed a November demo in which an F-22 pilot used a tablet to control an MQ-20 using L3Harris datalinks and software radios with Lockheed Martin’s open radio architectures.

    General Atomics, Anduril, and Northrop Grumman are all in the running to build the Air Force’s first collaborative combat aircraft. Earlier this month, the service announced that it had used the government-owned Autonomy Government Reference Architecture, or A-GRA, to integrate RTX Collins software aboard General Atomics’ YFQ-42 CCA aircraft and Shield AI’s technology on Anduril's YFQ-44 CCA. 

    General Atomics has since said it had logged another semi-autonomous flight on its YFQ-42 drone wingman with RTX Collins’ autonomy software onboard. Anduril and Shield AI, as of last week, had not had a joint CCA flight together. Northrop plans a first flight for its drone wingman this year.

    In a separate Monday statement, General Atomics said it had given the name “Dark Merlin” to the YFQ-42—a reference, it said, to deadly falcons and “the wizardry of Merlin from Arthurian legend.

    Anduril, whose company takes its name from a sword from J.R.R. Tolkien's “The Lord of The Rings” fantasy books, calls its CCA offering “Fury”—the original name given to the aircraft by Blue Force Technologies, which was acquired by Anduril in 2023. Northrop’s “Project Talon” CCA is reportedly a nod to the Air Force’s T-38 trainer.

    “Dark merlins are hunting machines, built for speed and aerodynamics,” Alexander said in an emailed statement. “They harass other falcons for fun, and they eat what they kill. The name sums up our new uncrewed fighter perfectly.”

    ]]>

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • On February 20, 2026, the Cybersecurity and Infrastructure Security Agency (CISA) updated its Known Exploited Vulnerabilities (KEV) Catalog by adding two critical flaws in Roundcube Webmail. These vulnerabilities, CVE-2025-49113 and CVE-2025-68461, are being actively exploited by threat actors. Roundcube, a popular open-source webmail client used by organizations worldwide, now faces heightened risks as attackers target […]

    The post CISA Warns of Actively Exploited Roundcube Vulnerabilities appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶