1010.cx

  • Handala Hackers Breach Telegram Accounts Linked to Israeli Officials

    ·

    cyber security, Cyber Security News, Telegram

    In December 2025, the Iran-linked hacking group known as Handala escalated its influence operations against Israel’s political establishment by publishing material it claimed was pulled from the fully “compromised” mobile devices of two high-profile officials. A technical review by threat intelligence firm KELA, however, indicates the intrusions were far narrower in scope centered on unauthorized […]

    The post Handala Hackers Breach Telegram Accounts Linked to Israeli Officials appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Google Tasks Feature Exploited in New Sophisticated Phishing Campaign

    ·

    cyber security, Cyber Security News, Google, vulnerability

    Over 3,000 organisations, predominantly in manufacturing, fell victim to a sophisticated phishing campaign in December 2025 that leveraged Google’s own application infrastructure to bypass enterprise email security controls. Attackers sent deceptive messages from noreply-application-integration@google.com, marking a critical shift in how threat actors exploit trusted platforms. Unlike traditional phishing attempts that rely on domain spoofing or compromised […]

    The post Google Tasks Feature Exploited in New Sophisticated Phishing Campaign appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • 2025 in review: Ideas

    ·

    Ideas
    Trump’s new ‘battleship’ should not carry nukes
    Producing a new nuclear missile for the Navy would leave us less safe.
    December 24, 2025 12:37 AM ET | Andrew C. Weber

    A killing at sea marks America’s descent into lawless power
    The peremptory strike on a speedboat is a warning to all who serve. Remember your oath.
    September 8, 2025 | Jon Duffy

    Don’t give up the shipyards
    Trump’s first shipbuilding deal must not derail America’s bipartisan strategy to revive the foundations of its seapower.
    October 28, 2025 | Hunter Stires

    ‘Fund first, ask questions later’ is a bad way to go
    Handing $156 billion to the Pentagon with no clear plan invites not just waste but danger. Here's why.
    July 31, 2025 | Gabe Murphy

    What is Pete Hegseth so scared of?
    The Navy needs leaders like Buzz Donnelly.
    July 11, 2025 | Jon Duffy

    Our nation requires three ARG/MEUs
    The Marine Corps commandant underscores the necessity of the Amphibious Ready Group/Marine Expeditionary Unit for projecting American strength and sustaining deterrence.
    November 16, 2025 | Gen. Eric Smith

    Sinking speedboats with a supercarrier: the lopsided cost of Operation Southern Spear
    History suggests what happens when the U.S. military outspends a foe by orders of magnitude.
    December 7, 2025 | Peter W. Singer

    'Shadow economies' are growing. Military planners and operators must take them into account
    Black markets prolong wars, defang sanctions, fray alliances, and help rogue governments and groups survive and thrive.
    October 2, 2025 | Maj. Benjamin Backsmeier

    Military AI needs guardrails—not to slow it down, but to keep it useful
    Modifying commercial models isn’t as easy as removing the parts that discourage users from killing people.
    September 29, 2025 | Mieke Eoyang

    RIP, JCIDS. Let’s stop writing requirements and start solving problems
    Time to move from procedural compliance to championing ingenuity and results.
    August 25, 2025 | Peter A. Newell

    Trump's terror-prevention cuts leave Americans exposed
    Since February, at least five government offices devoted to countering violent or terrorist groups have been slashed or shuttered.
    August 10, 2025 | Kris Inman

    ]]>

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Hacker Group Claims Responsibility for Alleged Tokyo FM Broadcasting Breach

    ·

    Cyber Attack, cyber security, Cyber Security News, Data Breach

    A threat actor operating under the alias “victim” has claimed responsibility for a significant data breach targeting Tokyo FM Broadcasting Co., Ltd., a central radio broadcasting station in Japan. The alleged intrusion, which was observed on January 1, 2025, reportedly exposed the personal information of millions of individuals. The Alleged Breach According to cybersecurity monitoring […]

    The post Hacker Group Claims Responsibility for Alleged Tokyo FM Broadcasting Breach appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Cybercriminals Abuse Google Cloud Email Feature in Multi-Stage Phishing Campaign

    ·

    Cybersecurity researchers have disclosed details of a phishing campaign that involves the attackers impersonating legitimate Google-generated messages by abusing Google Cloud’s Application Integration service to distribute emails. The activity, Check Point said, takes advantage of the trust associated with Google Cloud infrastructure to send the messages from a legitimate email address (“

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Cognizant Faces Multiple US Class-Action Lawsuits After TriZetto Data Breach

    ·

    cyber security, Cyber Security News, Data Breach

    Cognizant Technology Solutions is facing a wave of legal challenges in the United States following a significant data breach at its subsidiary, TriZetto Provider Solutions (TPS). The IT services giant has been hit with at least three class-action lawsuits alleging that it failed to protect sensitive healthcare data and delayed notifying victims for nearly a […]

    The post Cognizant Faces Multiple US Class-Action Lawsuits After TriZetto Data Breach appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • RondoDoX Botnet Abuses React2Shell Vulnerability for Malware Deployment

    ·

    Botnet, cyber security, Cyber Security News, Malware

    CloudSEK has uncovered a sustained nine-month campaign by the RondoDoX botnet operation, revealing rapid exploitation of emerging vulnerabilities including the critical React2Shell vulnerability. Analysis of exposed command-and-control logs spanning March through December 2025 demonstrates how threat actors swiftly adapted attack infrastructure following public disclosure, pivoting from traditional IoT targets to weaponizing Next.js applications within days […]

    The post RondoDoX Botnet Abuses React2Shell Vulnerability for Malware Deployment appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Cardano Users Warned of Possible Phishing Attempt Posing as ‘Eternl Desktop’ Update

    ·

    cyber security, Cyber Security News, Phishing

    A sophisticated phishing campaign is currently circulating within the Cardano community, utilizing high-trust social engineering to distribute malware under the guise of a new wallet application. The campaign centers on a professionally crafted email announcement titled “Eternl Desktop Is Live Secure Execution for Atrium & Diffusion Participants,” which directs users to download a fraudulent software […]

    The post Cardano Users Warned of Possible Phishing Attempt Posing as ‘Eternl Desktop’ Update appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • GNU Wget2 Vulnerability Enables Remote File Overwrite Attacks

    ·

    CVE/vulnerability, cyber security, Cyber Security News, vulnerability

    A high-severity security flaw has been discovered in GNU Wget2, a popular command-line tool used for downloading files from the web. The vulnerability, tracked as CVE-2025-69194, allows remote attackers to overwrite files on a user’s computer without their permission. This issue is rated as Important with a CVSS score of 8.8 (High), indicating a significant risk to users who rely […]

    The post GNU Wget2 Vulnerability Enables Remote File Overwrite Attacks appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • CISA Issues Warning on WHILL Model C2 Wheelchair Takeover Vulnerabilities

    ·

    CVE/vulnerability, cyber security, Cyber Security News, vulnerability

    The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent warning about a severe security flaw in WHILL Model C2 electric wheelchairs and Model F power chairs that could allow attackers to hijack the devices via Bluetooth. The vulnerability, tracked as CVE-2025-14346, carries a CVSS v3 score of 9.8, indicating critical severity. Security researchers […]

    The post CISA Issues Warning on WHILL Model C2 Wheelchair Takeover Vulnerabilities appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

Previous Page
1 … 85 86 87 88 89 … 536
Next Page

1010.cx

cybersecurity / defense / intelligence