1010.cx

  • Disney Fined $10M for Violating Children’s Privacy Laws on YouTube

    ·

    Children, COPPA, cybersecurity, Disney, Laws & Legalities, lawsuit, Privacy, Youtube
    Disney agrees to a $10M settlement with the DOJ and FTC over YouTube privacy violations. Learn how the COPPA ruling affects kids’ data and Disney’s new rules.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Bitfinex Hack Convict Ilya Lichtenstein Released Early Under U.S. First Step Act

    ·

    Ilya Lichtenstein, who was sentenced to prison last year for money laundering charges in connection with his role in the massive hack of cryptocurrency exchange Bitfinex in 2016, said he has been released early. In a post shared on X last week, the 38-year-old announced his release, crediting U.S. President Donald Trump’s First Step Act. According to the Federal Bureau of Prisons’ inmate locator

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Kimwolf Botnet Exploits 2 Million Devices to Build a Global Proxy Infrastructure

    ·

    Botnet, cyber security, Cyber Security News

    A massive new botnet dubbed “Kimwolf” has infected over 2 million devices globally, transforming innocent users’ home internet connections into secret proxy nodes for cybercriminals. According to a new report by security firm Synthient, the botnet has grown explosively by exploiting unsecured Android TV boxes and a critical vulnerability in major residential proxy networks. The […]

    The post Kimwolf Botnet Exploits 2 Million Devices to Build a Global Proxy Infrastructure appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • ProfileHound: Post-Escalation Tool Designed to Achieve Red Team Objectives

    ·

    cyber security, Cyber Security News, Security Tools, Tools

    ProfileHound emerges as a specialized post-exploitation instrument for offensive security professionals seeking to identify high-value targets within Active Directory environments. The tool addresses a critical gap in red-team reconnaissance by enumerating domain user profiles stored on compromised machines, enabling operators to make data-driven decisions about which systems warrant focused exploitation.​ The fundamental innovation behind ProfileHound […]

    The post ProfileHound: Post-Escalation Tool Designed to Achieve Red Team Objectives appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • GHOSTCREW: AI-Powered Red Team Toolkit Integrating Metasploit, Nmap, and More

    ·

    cyber security, Cyber Security News, Security Tools

    A new open-source tool is bridging the gap between artificial intelligence and offensive security operations.  GHOSTCREW is an advanced AI red team assistant that leverages Large Language Models (LLMs), Model Context Protocol (MCP), and Retrieval-Augmented Generation (RAG) to automate complex penetration testing tasks through simple natural language commands. Unlike standard chatbots that simply provide code snippets, […]

    The post GHOSTCREW: AI-Powered Red Team Toolkit Integrating Metasploit, Nmap, and More appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • New VVS Stealer Malware Targets Discord Accounts via Obfuscated Python Code

    ·

    Cybersecurity researchers have disclosed details of a new Python-based information stealer called VVS Stealer (also styled as VVS $tealer) that’s capable of harvesting Discord credentials and tokens. The stealer is said to have been on sale on Telegram as far back as April 2025, according to a report from Palo Alto Networks Unit 42. “VVS stealer’s code is obfuscated by Pyarmor,” researchers

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Crimson Collective Claims Alleged Breach of Brightspeed Fiber Network

    ·

    cyber security, Cyber Security News

    A threat actor group operating under the name “Crimson Collective” has publicly claimed responsibility for a significant data breach targeting Brightspeed, the United States’ third-largest fiber broadband infrastructure builder. The threat group has presented what it claims to be evidence of the intrusion, including sample data containing personally identifiable information (PII) of both customers and […]

    The post Crimson Collective Claims Alleged Breach of Brightspeed Fiber Network appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • PyArmor Obfuscation as a Method to Hinder Static and Signature-Based Analysis

    ·

    cyber security, Cyber Security News

    Malware authors continue to adopt legitimate software protection tools to shield their malicious code from security researchers. A prime example is the “VVS Stealer,” a Python-based malware family actively targeting Discord users. By leveraging Pyarmor, a tool designed to protect Python scripts, VVS Stealer employs complex obfuscation to evade static analysis and signature-based detection, making reverse […]

    The post PyArmor Obfuscation as a Method to Hinder Static and Signature-Based Analysis appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Threat Actors Abuse Trusted Business Infrastructure to Host Infostealers

    ·

    cyber security, Cyber Security News

    In a disturbing evolution of the cybercrime landscape, a self-sustaining cycle of infection has emerged in which victims of malware are being unwillingly conscripted into the ranks of attackers. New research from the Hudson Rock Threat Intelligence Team, in collaboration with the newly released ClickFix Hunter platform, reveals that a significant portion of domains hosting […]

    The post Threat Actors Abuse Trusted Business Infrastructure to Host Infostealers appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Eaton Vulnerabilities Allow Attackers to Execute Arbitrary Code on Host Systems

    ·

    CVE/vulnerability, cyber security, Cyber Security News, Vulnerabilities, vulnerability

    Eaton has issued a critical security advisory warning users about multiple high-severity vulnerabilities in its UPS Companion software that could allow attackers to execute arbitrary code on affected systems. The power management company released patches addressing two significant security flaws that pose substantial risks to organizations using the software for uninterruptible power supply management.​ The […]

    The post Eaton Vulnerabilities Allow Attackers to Execute Arbitrary Code on Host Systems appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

Previous Page
1 … 82 83 84 85 86 … 536
Next Page

1010.cx

cybersecurity / defense / intelligence