1010.cx

  • UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectors

    ·

    A previously unknown threat actor tracked as UAT-9921 has been observed leveraging a new modular framework called VoidLink in its campaigns targeting the technology and financial services sectors, according to findings from Cisco Talos. “This threat actor seems to have been active since 2019, although they have not necessarily used VoidLink over the duration of their activity,” researchers Nick

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Navigating the Digital Frontier: Inside the World of Cybercrime Magazine

    ·

    Blogs
    This week in cybersecurity from the editors at Cybercrime Magazine

    Sausalito, Calif. – Feb. 13, 2026

    –Read the full Orate AI story

    A blog post about Cybercrime Magazine was written by Oreate AI, who calls itself “your all-in-one assistant, helping you write essays, build presentations, and humanize your content—100 percent plagiarism-free.”

    It feels like just yesterday we were marveling at the sheer audacity of early hackers, the ones who could dial into phone systems with a whistle. Now, we’re staring down a future where cybercrime isn’t just a fringe activity, but a global economic force projected to cost the world a staggering $12.2 trillion annually by 2031. That’s a number that really makes you pause, isn’t it?

    This is the landscape that Cybercrime Magazine navigates. It’s not just about the sensational headlines of arrests and convictions, though the ‘Hack Blotter‘ section certainly keeps you informed on that front. It’s about understanding the deep currents shaping our digital lives. Think about the sheer volume of data we’re generating – 200 zettabytes by 2025. That’s an ocean of information, and where there’s data, there are always those looking to exploit it.

    What struck me while exploring their offerings is the breadth of their coverage. They’re not just reporting on the ‘what’ but delving into the ‘how’ and ‘why.’ Take the focus on AI-powered cybersecurity. It’s a fascinating duality: the same technology that can fortify our defenses is also being weaponized by attackers. The magazine seems to be at the forefront of these discussions, offering insights into ‘Breach Ready’ and ‘Board Ready’ strategies, which is crucial for any organization today.

    I was particularly drawn to the historical pieces. Hearing from pioneers like Steve Wozniak on the early days of phreaking, or Kevin Mitnick, the world’s most famous hacker, about the genesis of cybercrime, offers such a rich context. It’s like understanding the roots of a tree to truly appreciate its current growth. It reminds us that these aren’t new problems, just evolving ones.



    And it’s not all doom and gloom. There’s a clear emphasis on solutions and empowerment. From CISO guides on penetration testing to free data risk assessments and secure browser extensions, they’re providing tangible tools and knowledge. The focus on small businesses is particularly commendable, recognizing that cyber threats don’t discriminate by size.

    Then there are the reports on venture capital, and mergers and acquisitions in the cybersecurity space. This isn’t just for investors; it paints a picture of where the industry is heading, which companies are innovating, and what technologies are gaining traction. It’s a vital pulse check on the market.

    What truly sets Cybercrime Magazine apart, from what I gather, is its commitment to a holistic view. They cover everything from the latest SEC disclosure rules for public companies to the critical issue of credential theft and the state of open-source security. They even highlight women-owned cybersecurity companies and provide a calendar of industry conferences, fostering a sense of community and shared responsibility.

    It’s a complex, ever-shifting world, this digital frontier. But by offering a blend of hard-hitting facts, historical perspective, and practical guidance, Cybercrime Magazine seems to be doing a remarkable job of illuminating the path forward, making the daunting landscape of cyber threats a little more understandable, and a lot more navigable.

    Read the Full Story


    Cybercrime Magazine is Page ONE for Cybersecurity. Go to any of our sections to read the latest:

    • SCAM. The latest schemes, frauds, and social engineering attacks being launched on consumers globally.
    • NEWS. Breaking coverage on cyberattacks and data breaches, and the most recent privacy and security stories.
    • HACK. Another organization gets hacked every day. We tell you who, what, where, when, and why.
    • VC. Cybersecurity venture capital deal flow with the latest investment activity from various sources around the world.
    • M&A. Cybersecurity mergers and acquisitions including big tech, pure cyber, product vendors and professional services.
    • BLOG. What’s happening at Cybercrime Magazine. Plus the stories that don’t make headlines (but maybe they should).
    • PRESS. Cybersecurity industry news and press releases in real time from the editors at Business Wire.
    • PODCAST. New episodes daily on the Cybercrime Magazine Podcast feature victims, law enforcement, vendors, and cybersecurity experts.
    • RADIO. Tune into WCYB Digital Radio at Cybercrime.Radio, the first and only round-the-clock internet radio station devoted to cybersecurity.

    Contact us to send story tips, feedback and suggestions, and for sponsorship opportunities and custom media productions.

    The post Navigating the Digital Frontier: Inside the World of Cybercrime Magazine appeared first on Cybercrime Magazine.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Phishing Campaigns Target Users with Fake Meeting Invites and Update Alerts via Zoom, Teams, and Google Meet

    ·

    cyber security, Cyber Security News, Phishing, Zoom

    An ongoing wave of phishing campaigns exploiting fake meeting invites from popular video conferencing platforms, including Zoom, Microsoft Teams, and Google Meet. The attacks use social engineering to lure corporate users into downloading malicious “software updates,” which are, in reality, digitally signed remote monitoring and management (RMM) tools that grant attackers full remote access to […]

    The post Phishing Campaigns Target Users with Fake Meeting Invites and Update Alerts via Zoom, Teams, and Google Meet appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • CVE-2025-64712 in Unstructured.io Puts Amazon, Google, and Tech Giants at Risk of Remote Code Execution

    ·

    AI, CVE/vulnerability, cyber security, Cyber Security News, vulnerability

    A newly disclosed critical flaw, CVE-2025-64712 (CVSS 9.8), in Unstructured.io’s “unstructured” ETL library could let attackers perform arbitrary file writes and potentially achieve remote code execution (RCE) on systems that process untrusted documents. Unstructured is widely used to convert messy business files into AI-ready text and embeddings, and the vendor’s ecosystem footprint is often cited as spanning […]

    The post CVE-2025-64712 in Unstructured.io Puts Amazon, Google, and Tech Giants at Risk of Remote Code Execution appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Malicious Chrome Extensions Caught Stealing Business Data, Emails, and Browsing History

    ·

    Cybersecurity researchers have discovered a malicious Google Chrome extension that’s designed to steal data associated with Meta Business Suite and Facebook Business Manager. The extension, named CL Suite by @CLMasters (ID: jkphinfhmfkckkcnifhjiplhfoiefffl), is marketed as a way to scrape Meta Business Suite data, remove verification pop-ups, and generate two-factor authentication (2FA) codes.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The $17 Billion Wake-Up Call: Securing Crypto in the Age of AI Scams

    ·

    AI, Artificial Intelligence, Blockchain, Crypto, Cyber Crime, cybersecurity, Fraud
    AI-driven crypto scams surge as cybercrime hits $17B, with deepfakes, fraud kits, and industrial social engineering reshaping digital asset threats and defenses.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Static Design to Adaptive Control: How Artificial Intelligence Improves Modern Material Handling Equipment Systems

    ·

    AI, Artificial Intelligence, Engineering, Equipment Systems, Technology
    AI enables material handling systems to adapt to demand volatility through predictive design, dynamic control, and smarter maintenance without replacing core engineering.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Chrome Extensions Infect 500K Users to Hijack VKontakte Accounts

    ·

    Chrome, cyber security, Cyber Security News

    A long-running Chrome extension malware campaign has silently hijacked more than 500,000 VKontakte (VK) accounts, forcing users into attacker-controlled groups, resetting their settings every 30 days, and abusing VK’s own infrastructure as command-and-control. What appeared to be harmless VK customization tools were in reality a tightly maintained malware project operated by a single threat actor […]

    The post Chrome Extensions Infect 500K Users to Hijack VKontakte Accounts appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • npm’s Update to Harden Their Supply Chain, and Points to Consider

    ·

    In December 2025, in response to the Sha1-Hulud incident, npm completed a major authentication overhaul intended to reduce supply-chain attacks. While the overhaul is a solid step forward, the changes don’t make npm projects immune from supply-chain attacks. npm is still susceptible to malware attacks – here’s what you need to know for a safer Node community. Let’s start with the original

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Malicious Chrome AI Extensions Target 260,000 Users with Injected Iframes

    ·

    AI, Chrome, cyber security, Cyber Security News

    As AI tools like ChatGPT, Claude, Gemini, and Grok gain mainstream adoption, cybercriminals are weaponizing their popularity to distribute malicious browser extensions. Security researchers have uncovered a coordinated campaign involving 30 Chrome extensions that masquerade as legitimate AI assistants while secretly deploying dangerous surveillance capabilities affecting over 260,000 users. The malicious extensions pose as AI-powered […]

    The post Malicious Chrome AI Extensions Target 260,000 Users with Injected Iframes appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

Previous Page
1 … 95 96 97 98 99 … 652
Next Page

1010.cx

cybersecurity / defense / intelligence