-
A previously unknown threat actor tracked as UAT-9921 has been observed leveraging a new modular framework called VoidLink in its campaigns targeting the technology and financial services sectors, according to findings from Cisco Talos. “This threat actor seems to have been active since 2019, although they have not necessarily used VoidLink over the duration of their activity,” researchers Nick
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
This week in cybersecurity from the editors at Cybercrime Magazine
Sausalito, Calif. – Feb. 13, 2026A blog post about Cybercrime Magazine was written by Oreate AI, who calls itself “your all-in-one assistant, helping you write essays, build presentations, and humanize your content—100 percent plagiarism-free.”
It feels like just yesterday we were marveling at the sheer audacity of early hackers, the ones who could dial into phone systems with a whistle. Now, we’re staring down a future where cybercrime isn’t just a fringe activity, but a global economic force projected to cost the world a staggering $12.2 trillion annually by 2031. That’s a number that really makes you pause, isn’t it?
This is the landscape that Cybercrime Magazine navigates. It’s not just about the sensational headlines of arrests and convictions, though the ‘Hack Blotter‘ section certainly keeps you informed on that front. It’s about understanding the deep currents shaping our digital lives. Think about the sheer volume of data we’re generating – 200 zettabytes by 2025. That’s an ocean of information, and where there’s data, there are always those looking to exploit it.
What struck me while exploring their offerings is the breadth of their coverage. They’re not just reporting on the ‘what’ but delving into the ‘how’ and ‘why.’ Take the focus on AI-powered cybersecurity. It’s a fascinating duality: the same technology that can fortify our defenses is also being weaponized by attackers. The magazine seems to be at the forefront of these discussions, offering insights into ‘Breach Ready’ and ‘Board Ready’ strategies, which is crucial for any organization today.
I was particularly drawn to the historical pieces. Hearing from pioneers like Steve Wozniak on the early days of phreaking, or Kevin Mitnick, the world’s most famous hacker, about the genesis of cybercrime, offers such a rich context. It’s like understanding the roots of a tree to truly appreciate its current growth. It reminds us that these aren’t new problems, just evolving ones.
And it’s not all doom and gloom. There’s a clear emphasis on solutions and empowerment. From CISO guides on penetration testing to free data risk assessments and secure browser extensions, they’re providing tangible tools and knowledge. The focus on small businesses is particularly commendable, recognizing that cyber threats don’t discriminate by size.
Then there are the reports on venture capital, and mergers and acquisitions in the cybersecurity space. This isn’t just for investors; it paints a picture of where the industry is heading, which companies are innovating, and what technologies are gaining traction. It’s a vital pulse check on the market.
What truly sets Cybercrime Magazine apart, from what I gather, is its commitment to a holistic view. They cover everything from the latest SEC disclosure rules for public companies to the critical issue of credential theft and the state of open-source security. They even highlight women-owned cybersecurity companies and provide a calendar of industry conferences, fostering a sense of community and shared responsibility.
It’s a complex, ever-shifting world, this digital frontier. But by offering a blend of hard-hitting facts, historical perspective, and practical guidance, Cybercrime Magazine seems to be doing a remarkable job of illuminating the path forward, making the daunting landscape of cyber threats a little more understandable, and a lot more navigable.
Cybercrime Magazine is Page ONE for Cybersecurity. Go to any of our sections to read the latest:
- SCAM. The latest schemes, frauds, and social engineering attacks being launched on consumers globally.
- NEWS. Breaking coverage on cyberattacks and data breaches, and the most recent privacy and security stories.
- HACK. Another organization gets hacked every day. We tell you who, what, where, when, and why.
- VC. Cybersecurity venture capital deal flow with the latest investment activity from various sources around the world.
- M&A. Cybersecurity mergers and acquisitions including big tech, pure cyber, product vendors and professional services.
- BLOG. What’s happening at Cybercrime Magazine. Plus the stories that don’t make headlines (but maybe they should).
- PRESS. Cybersecurity industry news and press releases in real time from the editors at Business Wire.
- PODCAST. New episodes daily on the Cybercrime Magazine Podcast feature victims, law enforcement, vendors, and cybersecurity experts.
- RADIO. Tune into WCYB Digital Radio at Cybercrime.Radio, the first and only round-the-clock internet radio station devoted to cybersecurity.
Contact us to send story tips, feedback and suggestions, and for sponsorship opportunities and custom media productions.
The post Navigating the Digital Frontier: Inside the World of Cybercrime Magazine appeared first on Cybercrime Magazine.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
An ongoing wave of phishing campaigns exploiting fake meeting invites from popular video conferencing platforms, including Zoom, Microsoft Teams, and Google Meet. The attacks use social engineering to lure corporate users into downloading malicious “software updates,” which are, in reality, digitally signed remote monitoring and management (RMM) tools that grant attackers full remote access to […]
The post Phishing Campaigns Target Users with Fake Meeting Invites and Update Alerts via Zoom, Teams, and Google Meet appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
A newly disclosed critical flaw, CVE-2025-64712 (CVSS 9.8), in Unstructured.io’s “unstructured” ETL library could let attackers perform arbitrary file writes and potentially achieve remote code execution (RCE) on systems that process untrusted documents. Unstructured is widely used to convert messy business files into AI-ready text and embeddings, and the vendor’s ecosystem footprint is often cited as spanning […]
The post CVE-2025-64712 in Unstructured.io Puts Amazon, Google, and Tech Giants at Risk of Remote Code Execution appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Cybersecurity researchers have discovered a malicious Google Chrome extension that’s designed to steal data associated with Meta Business Suite and Facebook Business Manager. The extension, named CL Suite by @CLMasters (ID: jkphinfhmfkckkcnifhjiplhfoiefffl), is marketed as a way to scrape Meta Business Suite data, remove verification pop-ups, and generate two-factor authentication (2FA) codes.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
AI-driven crypto scams surge as cybercrime hits $17B, with deepfakes, fraud kits, and industrial social engineering reshaping digital asset threats and defenses.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
AI enables material handling systems to adapt to demand volatility through predictive design, dynamic control, and smarter maintenance without replacing core engineering.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
A long-running Chrome extension malware campaign has silently hijacked more than 500,000 VKontakte (VK) accounts, forcing users into attacker-controlled groups, resetting their settings every 30 days, and abusing VK’s own infrastructure as command-and-control. What appeared to be harmless VK customization tools were in reality a tightly maintained malware project operated by a single threat actor […]
The post Chrome Extensions Infect 500K Users to Hijack VKontakte Accounts appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
In December 2025, in response to the Sha1-Hulud incident, npm completed a major authentication overhaul intended to reduce supply-chain attacks. While the overhaul is a solid step forward, the changes don’t make npm projects immune from supply-chain attacks. npm is still susceptible to malware attacks – here’s what you need to know for a safer Node community. Let’s start with the original
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
As AI tools like ChatGPT, Claude, Gemini, and Grok gain mainstream adoption, cybercriminals are weaponizing their popularity to distribute malicious browser extensions. Security researchers have uncovered a coordinated campaign involving 30 Chrome extensions that masquerade as legitimate AI assistants while secretly deploying dangerous surveillance capabilities affecting over 260,000 users. The malicious extensions pose as AI-powered […]
The post Malicious Chrome AI Extensions Target 260,000 Users with Injected Iframes appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶


