1010.cx

  • Palo Alto Networks to Acquire Koi Security for Enhanced Agentic Endpoint Security

    ·

    Acquisition, cyber security, Cyber Security News

    Palo Alto Networks announced on February 17, 2026, that it has entered a definitive agreement to acquire Koi Security, a pioneer in Agentic Endpoint Security. The acquisition aims to address a critical security gap created by AI agents and tools that operate with extensive permissions and data access while bypassing traditional security controls. AI agents […]

    The post Palo Alto Networks to Acquire Koi Security for Enhanced Agentic Endpoint Security appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Malware Campaign Targets Crypto Users with Fake MetaMask Wallet and Remote Access Backdoor

    ·

    cyber security, Cyber Security News, Malware

    An aggressive malware campaign targeting IT professionals in cryptocurrency, Web3, and AI to steal sensitive data and live crypto funds from victim wallets. The attackers pose as recruiters and use trojanized coding tasks to deliver two core malware families, BeaverTail and InvisibleFerret, which have been steadily upgraded with new data theft and wallet-targeting features. The […]

    The post Malware Campaign Targets Crypto Users with Fake MetaMask Wallet and Remote Access Backdoor appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • New SysUpdate Variant Malware Discovered, Decryption Tool for Linux C2 Traffic Released

    ·

    cyber security, Cyber Security News, Malware

    A new Linux malware sample that strongly aligns with the SysUpdate malware family used by APT27/Iron Tiger. Initially detected on a client’s system, the binary behaved like a system service and executed the GNU/Linux id command when run without specific arguments, returning the output as part of its basic functionality. Closer inspection showed that the sample was […]

    The post New SysUpdate Variant Malware Discovered, Decryption Tool for Linux C2 Traffic Released appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • CISA Flags Actively Exploited Windows Video ActiveX Control RCE in KEV List

    ·

    CVE/vulnerability, cyber security, Cyber Security News, vulnerability

    The Cybersecurity and Infrastructure Security Agency (CISA) has officially added a critical vulnerability affecting Microsoft Windows to its Known Exploited Vulnerabilities (KEV) catalog. This specific security flaw, identified as CVE-2008-0015, impacts the Windows Video ActiveX Control and allows for remote code execution (RCE). The agency updated the catalog on February 17, 2026, confirming that evidence […]

    The post CISA Flags Actively Exploited Windows Video ActiveX Control RCE in KEV List appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • MetaMask Users Targeted by Phishing Emails with Fake Security Report to Bypass Detection

    ·

    cyber security, Cyber Security News, Phishing

    A new phishing campaign is targeting MetaMask users with cleverly crafted emails designed to trick recipients into enabling a fake Two-Factor Authentication (2FA) setup. The lure includes a forged “security report” PDF meant to mimic a legitimate notification about unusual login activity, adding credibility and emotional urgency to the scam. The attack blends social engineering […]

    The post MetaMask Users Targeted by Phishing Emails with Fake Security Report to Bypass Detection appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Notepad++ Fixes Hijacked Update Mechanism Used to Deliver Targeted Malware

    ·

    Notepad++ has released a security fix to plug gaps that were exploited by an advanced threat actor from China to hijack the software update mechanism to selectively deliver malware to targets of interest. The version 8.9.2 update incorporates what maintainer Don Ho calls a “double lock” design that aims to make the update process “robust and effectively unexploitable.” This includes verification

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • CISA Warns of Actively Exploited Google Chromium 0‑Day Vulnerability

    ·

    Chrome, CVE/vulnerability, cyber security, Cyber Security News, Google, vulnerability, Zero-Day, zeroday

    The Cybersecurity and Infrastructure Security Agency (CISA) has officially added a critical vulnerability affecting the Google Chromium engine to its Known Exploited Vulnerabilities (KEV) catalog. Tracking as CVE-2026-2441, this security flaw is currently being actively exploited in the wild. The agency’s inclusion of this bug serves as a mandate for federal agencies to apply necessary […]

    The post CISA Warns of Actively Exploited Google Chromium 0‑Day Vulnerability appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Foxveil Malware Loader Uses Cloudflare, Netlify, and Discord to Bypass Detection

    ·

    cyber security, Cyber Security News, Malware

    A new malware loader, dubbed Foxveil, that abuses trusted platforms such as Cloudflare Pages, Netlify, and Discord to stage and deliver malicious payloads while evading traditional detection methods. Active since at least August 2025, the loader is used as an initial-stage component, establishing a foothold on victim machines, executing shellcode in memory, and preparing the […]

    The post Foxveil Malware Loader Uses Cloudflare, Netlify, and Discord to Bypass Detection appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • CISA Flags Four Security Flaws Under Active Exploitation in Latest KEV Update

    ·

    The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added four security flaws to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation in the wild. The list of vulnerabilities is as follows – CVE-2026-2441 (CVSS score: 8.8) – A use-after-free vulnerability in Google Chrome that could allow a remote attacker to potentially exploit heap

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Critical Flaw in Windows Admin Center Exposes Systems to Privilege Escalation Attacks

    ·

    CVE/vulnerability, cyber security, Cyber Security News, vulnerability, Windows

    Microsoft has officially released a security update addressing a severe vulnerability found within the Windows Admin Center. Tracking under the identifier CVE-2026-26119, this critical flaw presents a significant risk to enterprise environments relying on the platform for server management. The vulnerability, described as an Elevation of Privilege issue, allows authorised attackers to escalate their permissions […]

    The post Critical Flaw in Windows Admin Center Exposes Systems to Privilege Escalation Attacks appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

Previous Page
1 … 86 87 88 89 90 … 652
Next Page

1010.cx

cybersecurity / defense / intelligence