1010.cx

  • RondoDoX Botnet Abuses React2Shell Vulnerability for Malware Deployment

    ·

    Botnet, cyber security, Cyber Security News, Malware

    CloudSEK has uncovered a sustained nine-month campaign by the RondoDoX botnet operation, revealing rapid exploitation of emerging vulnerabilities including the critical React2Shell vulnerability. Analysis of exposed command-and-control logs spanning March through December 2025 demonstrates how threat actors swiftly adapted attack infrastructure following public disclosure, pivoting from traditional IoT targets to weaponizing Next.js applications within days […]

    The post RondoDoX Botnet Abuses React2Shell Vulnerability for Malware Deployment appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Cardano Users Warned of Possible Phishing Attempt Posing as ‘Eternl Desktop’ Update

    ·

    cyber security, Cyber Security News, Phishing

    A sophisticated phishing campaign is currently circulating within the Cardano community, utilizing high-trust social engineering to distribute malware under the guise of a new wallet application. The campaign centers on a professionally crafted email announcement titled “Eternl Desktop Is Live Secure Execution for Atrium & Diffusion Participants,” which directs users to download a fraudulent software […]

    The post Cardano Users Warned of Possible Phishing Attempt Posing as ‘Eternl Desktop’ Update appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • GNU Wget2 Vulnerability Enables Remote File Overwrite Attacks

    ·

    CVE/vulnerability, cyber security, Cyber Security News, vulnerability

    A high-severity security flaw has been discovered in GNU Wget2, a popular command-line tool used for downloading files from the web. The vulnerability, tracked as CVE-2025-69194, allows remote attackers to overwrite files on a user’s computer without their permission. This issue is rated as Important with a CVSS score of 8.8 (High), indicating a significant risk to users who rely […]

    The post GNU Wget2 Vulnerability Enables Remote File Overwrite Attacks appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • CISA Issues Warning on WHILL Model C2 Wheelchair Takeover Vulnerabilities

    ·

    CVE/vulnerability, cyber security, Cyber Security News, vulnerability

    The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent warning about a severe security flaw in WHILL Model C2 electric wheelchairs and Model F power chairs that could allow attackers to hijack the devices via Bluetooth. The vulnerability, tracked as CVE-2025-14346, carries a CVSS v3 score of 9.8, indicating critical severity. Security researchers […]

    The post CISA Issues Warning on WHILL Model C2 Wheelchair Takeover Vulnerabilities appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Threat Actors Test a Highly Obfuscated, Modified Variant of the Shai Hulud Malware

    ·

    cyber security, Cyber Security News, Malware

    Security researchers have identified what appears to be the first instance of a newly modified Shai Hulud malware strain uploaded to the npm registry approximately 30 minutes ago, disguised within the package @vietmoney/react-big-calendar. The discovery suggests threat actors are testing updated payloads before launching widespread attacks, with significant code modifications indicating access to the original […]

    The post Threat Actors Test a Highly Obfuscated, Modified Variant of the Shai Hulud Malware appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Apache NuttX Flaw Allows Attackers to Crash Embedded Systems

    ·

    CVE/vulnerability, cyber security, Cyber Security News, vulnerability

    The Apache Software Foundation has released a security advisory addressing a memory corruption vulnerability in the Apache NuttX Real-Time Operating System (RTOS). Tracked as CVE-2025-48769, this flaw affects widely used embedded systems and could allow attackers to destabilize devices or manipulate files. The vulnerability stems from a “Use After Free” error located in the file system’s […]

    The post Apache NuttX Flaw Allows Attackers to Crash Embedded Systems appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Careto Hacker Group Resurfaces After a Decade, Unleashing New Attack Techniques

    ·

    cyber security, Cyber Security News

    The legendary Careto threat actor, also known as “The Mask,” has resurfaced after a decade-long disappearance, employing sophisticated new attack methods that demonstrate the group’s continued evolution and technical prowess. Kaspersky researchers unveiled these findings during the 34th Virus Bulletin International Conference in October, marking the first significant discovery of Careto activity since early 2014. […]

    The post Careto Hacker Group Resurfaces After a Decade, Unleashing New Attack Techniques appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • How Webflow Helps Companies Move Faster Without Sacrificing Brand Control

    ·

    AI, Artificial Intelligence, Business, Technology, Webflow
    Conventional development frequently results in a trade-off between speed and brand consistency, which harms reputation by causing delays…

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • ThreatsDay Bulletin: GhostAd Drain, macOS Attacks, Proxy Botnets, Cloud Exploits, and 12+ Stories

    ·

    The first ThreatsDay Bulletin of 2026 lands on a day that already feels symbolic — new year, new breaches, new tricks. If the past twelve months taught defenders anything, it’s that threat actors don’t pause for holidays or resolutions. They just evolve faster. This week’s round-up shows how subtle shifts in behavior, from code tweaks to job scams, are rewriting what “cybercrime” looks like in

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • 2025 in review: defense systems

    ·

    Science & Tech
    USAF plan to fly C-5, C-17s even longer elicits concern
    Service says it needs to hedge against delays to planned Next-Generation Airlift plane.
    November 25, 2025 | Thomas Novelly

    NATO has built a cloud for Ukraine’s classified battle data
    The last hurdle is figuring out information-sharing policies to keep it all safe.
    November 25, 2025 | Lauren C. Williams

    Air Force’s AI ambitions mean simplifying its tangle of networks
    Over the next year, battle-networks chief aims to reduce systems to a “rational number.”
    September 25, 2025 | Lauren C. Williams

    Pentagon stands up new task force to coordinate anti-drone efforts
    The Army will be in charge of the outfit, which will replace the Joint Counter-small Unmanned Aircraft Systems Office.
    August 28, 2025 | Meghann Myers

    How many drones does it take to replace a destroyer?
    Fresh off a summer of testing robotic boats, the Navy's Task Force 66 wants to turn lessons into metrics.
    August 27, 2025 | Lauren C. Williams

    Pentagon reductions set back critical AI-data platform
    After users flocked to Advana, DOD’s AI office laid out a plan to keep it growing. Then came DOGE.
    August 20, 2025 | Patrick Tucker

    Can COFFEE filters calm the spectrum tug-of-war?
    A DARPA project aims to help military and commercial gear squeeze more use out of hotly coveted frequencies.
    August 8, 2025 | Lauren C. Williams

    Space Force to launch ground target-tracking satellites in 2028
    The new capability will first go to forces in the Indo-Pacific first.
    August 4, 2025 | Audrey Decker

    Meet the ‘cobots’ that could lower the cost of building submarines
    A rare peek at Electric Boat’s production line finds robots cutting steel—and even welding.
    July 24, 2025 | Lauren C. Williams

    Secure comms with allies is hard. The Pentagon wants to change that
    The department is working on an effort to streamline a complex set of classified networks they use with allies and partners.
    June 28, 2025 | Lauren C. Williams

    ]]>

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

Previous Page
1 … 86 87 88 89 90 … 537
Next Page

1010.cx

cybersecurity / defense / intelligence