1010.cx

  • China-Linked Evasive Panda Ran DNS Poisoning Campaign to Deliver MgBot Malware

    ·

    A China-linked advanced persistent threat (APT) group has been attributed to a highly-targeted cyber espionage campaign in which the adversary poisoned Domain Name System (DNS) requests to deliver its signature MgBot backdoor in attacks targeting victims in Türkiye, China, and India. The activity, Kaspersky said, was observed between November 2022 and November 2024. It has been linked to a

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Google Introduces Option to Change @gmail.com Email Addresses

    ·

    cyber security, Cyber Security News, Gmail, Google

    For years, Google users have been stuck with the email addresses they created when they first signed up. If you picked an embarrassing username years ago or simply want a more professional handle, the only previous solution was to create a brand-new account and migrate your data manually. Now, Google is rolling out a major […]

    The post Google Introduces Option to Change @gmail.com Email Addresses appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • 2025 in review: tech

    ·

    Science & Tech
    How the Army’s most tech-forward units are practicing for war
    A two-week exercise simulated island battles—and put some 75 new technologies to the test.
    November 23, 2025 | Jennifer Hlad

    Army wants to break ground for a microreactor on a US base by 2027
    The service is pushing to make bases energy-independent, but safety and fuel-supply concerns persist.
    October 14, 2025 | Thomas Novelly

    When China plays orbital hide-and-seek, Maui’s telescopes give the US an edge
    In an interview, Space Force’s Saltzman reveals what’s next for the key sensor site.
    September 19, 2025 | Jennifer Hlad

    Ukraine’s milestone shows drones prevent defeat, but don’t secure victory
    Drone innovation is speeding up, but war has not followed. Is this the future?
    September 3, 2025 | Patrick Tucker

    In the Pacific, Army leaders expect today’s fiction to be near-term reality
    Service secretary envisions drone-and-soldier teams within just a few years.
    July 25, 2025 | Jennifer Hlad

    The Pentagon will host a ‘Top Gun’ school for Ukraine-style attack drones
    The Defense Department is hoping for “American drone dominance”—but that’s easier said than done.
    July 18, 2025 | Patrick Tucker

    Army experiments with integrating attack drones into artillery formations
    New division formation design includes HIMARS, howitzers, and one-way UAVs.
    July 2, 2025 | Meghann Myers

    For DOD, the future of large language models is smaller
    Everyone loves big AI, but “maybe there is a smaller-parameter model that could run on a laptop.”
    May 22, 2025 | Patrick Tucker

    Wanted: counter-drone defenses that don't hurt surrounding neighborhoods
    Base defenders need to collect and analyze much more data from many more sources, DIU director says.
    May 5, 2025 | Patrick Tucker

    Marines say they’re ‘leading the way’ in battlefield autonomy
    But unique technical challenges and tech wariness keep robot trucks on a short leash.
    May 3, 2025 | Lauren C. Williams

    ]]>

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Critical LangChain Core Vulnerability Exposes Secrets via Serialization Injection

    ·

    A critical security flaw has been disclosed in LangChain Core that could be exploited by an attacker to steal sensitive secrets and even influence large language model (LLM) responses through prompt injection. LangChain Core (i.e., langchain-core) is a core Python package that’s part of the LangChain ecosystem, providing the core interfaces and model-agnostic abstractions for building

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Critical LangChain Vulnerability Allows Attackers to Steal Sensitive Secrets

    ·

    CVE/vulnerability, cyber security, Cyber Security News, vulnerability

    A critical security vulnerability in LangChain, one of the world’s most widely deployed AI frameworks, enables attackers to extract environment variable secrets and, through a serialization injection flaw, potentially achieve code execution. The vulnerability, identified as CVE-2025-68664, affects the core langchain-core library and was disclosed on December 25, 2024, by security researcher Yarden Porat from […]

    The post Critical LangChain Vulnerability Allows Attackers to Steal Sensitive Secrets appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • ZeroThreat Review: The Next-Gen Automated Pentesting s DAST Platform

    ·

    cyber security

    After spending the past few weeks hands-on with ZeroThreat, it’s clear this platform represents a significant step forward in automated security testing. In an era where web applications, APIs, and microservices ship faster than ever, automated pentesting and DAST have become essential—not optional—for modern security programs in 2025. ZeroThreat delivers a unified platform that blends […]

    The post ZeroThreat Review: The Next-Gen Automated Pentesting s DAST Platform appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • ThreatsDay Bulletin: Stealth Loaders, AI Chatbot Flaws AI Exploits, Docker Hack, and 15 More Stories

    ·

    It’s getting harder to tell where normal tech ends and malicious intent begins. Attackers are no longer just breaking in — they’re blending in, hijacking everyday tools, trusted apps, and even AI assistants. What used to feel like clear-cut “hacker stories” now looks more like a mirror of the systems we all use. This week’s findings show a pattern: precision, patience, and persuasion. The

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • LastPass 2022 Breach Led to Years-Long Cryptocurrency Thefts, TRM Labs Finds

    ·

    The encrypted vault backups stolen from the 2022 LastPass data breach have enabled bad actors to take advantage of weak master passwords to crack them open and drain cryptocurrency assets as recently as late 2025, according to new findings from TRM Labs. The blockchain intelligence firm said evidence points to the involvement of Russian cybercriminal actors in the activity, with one of the

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • 2025 in review: business

    ·

    Business
    Space Force's intelligence ‘marketplace’ gets funds to expand
    Military units post requests to TacSRT’s webpage, and industry competes to answer them.
    April 10, 2025 | Audrey Decker

    A closer look at the Chinese space company accused of helping the Houthis
    The ostensibly private Chang Guang Satellite Technology emerged from and benefited from state funding.
    May 7, 2025 | Matt Bruzzese and Peter W. Singer

    Lockheed has cleared backlog of stored F-35s
    The company had 72 jets stacked up due to software delays.
    July 15, 2025 | Audrey Decker

    Microsoft ends use of China-based engineers to patch DOD systems
    The move comes after a ProPublica report highlighted a Microsoft program that allows foreign engineers to indirectly interact with U.S. military systems through American “escort” intermediaries.
    July 20, 2025 | David DiMolfetta

    Anduril becomes third US supplier of rocket motors, company says
    Annual production will grow to 6,000 motors by the end of next year, they say.
    August 5, 2025 | Audrey Decker

    The jets were late. Lockheed got on-time bonuses anyway
    After nearly 20 years of F-35 production, the program continues to “overpromise and underdeliver,” GAO said.
    September 3, 2025 | Audrey Decker

    Silicon Valley in St. Louis?
    With the National Geospatial-Intelligence Agency as its north star, a non-profit is working to get defense tech to put down roots in the Midwest.
    October 1, 2025 | Lauren C. Williams

    Draft list of attendees for Hegseth acquisition-reform speech shows wide industry interest
    The guest list for the Pentagon’s new policy roll-out reveals the rapidly changing face of defense tech.
    November 5, 2025 | Patrick Tucker

    Unveiling acquisition overhaul, Hegseth tells industry to get with the program
    One expert said the reforms would sweep away Cold War processes—and draw backlash from established primes.
    November 7, 2025 | Lauren C. Williams

    Can partner nations help solve the Navy’s shipbuilding woes?
    On a trip through the Pacific, the chief of naval operations sought ways to get more warships faster.
    November 24, 2025 | Jennifer Hlad

    Gargantuan Golden Dome contract vehicle clears 1,000-plus firms to vie for slices of $151 billion
    One defense expert said it was one of the largest contract ceilings of all time.
    December 3, 2025 | Thomas Novelly

    ]]>

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

    ·

    Fortinet on Wednesday said it observed “recent abuse” of a five-year-old security flaw in FortiOS SSL VPN in the wild under certain configurations. The vulnerability in question is CVE-2020-12812 (CVSS score: 5.2), an improper authentication vulnerability in SSL VPN in FortiOS that could allow a user to log in successfully without being prompted for the second factor of authentication if the

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

Previous Page
1 … 96 97 98 99 100 … 538
Next Page

1010.cx

cybersecurity / defense / intelligence