• NASHVILLE—The Army’s next-generation spy plane will begin flight tests this summer, then be delivered to the first units later this year—two years after the Army awarded Sierra Nevada Corporation $1 billion to turn its Bombarder 6500 business jet into an intelligence, surveillance, and reconnaissance platform that will replace the Army’s legacy turboprop fleet.

    The service wants to combine the inherent range of the High Accuracy Detection and Exploitation System—HADES for short—with launched effects, Andrew Evans, the director of strategy and transformation in the Army’s headquarters intelligence office, told reporters Friday at the Army Aviation Warfighting Summit

    A year ago, he said he wanted 1,000 kilometers of coverage, but after discussing with industry, “we aimed short,” he said, without disclosing precisely how far he thinks HADES will be able to see. 

    “We are on a campaign now to begin to do some service contracts where companies come in and they show us what they can do,” Evans said, with a demonstration planned for later this year.

    HADES’ eventual capabilities will stay open-ended, in line with the Army’s Continuous Transformation acquisition model, which favors getting basic prototypes into soldiers’ hands for feedback on all of the systems and capabilities a platform needs to be most useful.

    “What we're seeking in this portfolio is progress, not perfection. We understand that HADES is going to be an iterative program that over the next number of years will continue to change and evolve, because the threats that it's addressing are continuing to change and evolve,” Evans said. “So we're not looking to build a system that gets locked into time. We're looking to build a system to give us options to scale to the threat as a threat changes.”

    HADES will be delivered in three prototypes, Col. Joe Minor, the Army’s fixed-wing project manager, told reporters. 

    The first will have legacy sensors that have been built into previous ISR planes, and that iteration will be part of the initial testing to start this year. The next prototype will add advanced radar, and then third will be “combat credible,” Evans said, declining to offer details.

    “What I think is most important to understand about the HADES sensor strategy is it's going to be an ever-evolving sensor strategy, right?” Evans said. “So if you come back in three years from now, what does HADES have on it? And I tell you that it has the same thing that I told you right now, then shame on us, because we're not being resilient enough. So we will be dynamic in the way that we sensor this aircraft out.”

    ]]>

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Founders can access liquidity without exiting by selling shares via secondary deals, reducing financial pressure while staying focused on long-term growth.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • New research from Zimperium reveals four active Android malware campaigns, RecruitRat, SaferRat, Astrinox, and Massiv, targeting over 800 banking apps globally.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • NASHVILLE—When Army leaders talk about their new tiltrotor platform, the first thing they tout are its speed, range and load capacity, all eclipsing the UH-60 Black Hawk whose missions it’s destined to take over. 

    But bringing the MV-75 Cheyenne II online will also force changes upon the service’s aviation community—including, perhaps, an entirely new aircraft just to refuel it.

    “Certainly, you're not going to be able to take a conventional rotorcraft with an MV-75, but a fixed-wing can go with an MV-75,” Maj. Gen. Clair Gill, who leads the Army Aviation Center of Excellence, told reporters Thursday at the Army Aviation Warfighter Summit. “We're also thinking creatively about, if we put aerial refueling…on a conventional variant, then how do we refuel it? So we're thinking through, you know, do we need to develop a requirement for aerial refueling for ourselves now that we have really enhanced our capability?”

    The Army is the last service to add a tiltrotor to its aviation fleet, and it’s the only service that doesn’t have air tankers to refuel its aircraft. While Army units within U.S. Special Operations Command can rely on Air Force C-130s to refuel in the sky, the conventional units that are to start testing the MV-75 will have to rely on ground refueling like the rest of the helicopter fleet.

    But even in the short term, Gill said, MV-75 still reduces the logistical burden, because units don’t need to set up as many forward area refueling points for it as they would for a Black Hawk. 

    A Bell-Textron promotional video that accompanied the Cheyenne’s unveiling on Wednesday includes a vignette of an aerial refueling by drone. The unmanned system looks a lot like the Navy’s MQ-25 Stingray, a carrier-based tanker.

    “So I think we need to solve our own problems and think about, how do we do our own—let's call it logistical resupply—in the air, something that can keep up with an MV-75. So that's where that concept was pointing,” Gill said.

    But the Army doesn’t have a written requirement for a refueling drone, he added, so the idea is just an aspiration at this point. 

    What’s next for helicopters?

    Beyond refueling, there are some other considerations for how a tiltrotor will operate with existing Army aviation assets, and one of the biggest is how to protect it.

    Traditionally, the Army uses AH-64 Apaches to escort its helicopters on missions, and that will continue with MV-75. But the Apache, which tops out around 185 mph, is far slower than the MV-75, which is built to cruise faster than 300 mph. To protect a Cheyenne, the Army may have to launch multiple Apaches from different locations; it is also looking into ways to give Apaches a longer reach. 

    “We haven't updated the requirement document since 2017, so we're very focused on updating that requirement,” Maj. Gen. Cain Baker, who leads the Future Vertical Lift cross-functional team. 

    Launched effects from an Apache will help it extend its range, Baker said, with drones that can extend the Apache’s ability to see threats and also fire on them. 

    Then there’s the matter of the Army’s trusty workhorse, the Black Hawk, which the service selected to replace the UH-1 Iroquois in 1976. At least theoretically, the Cheyenne II was developed as an eventual replacement for the Black Hawk.

    In practice, that will be a slow transition, if a complete replacement even happens at all.

    “We're going to be modernizing every formation with the latest generation of Black Hawks, as we can and our budget allows,” Gill said. “We're going to be flying the Black Hawk for decades, I can assure you.”

    At least into the 2050s, Col. Ryan Nesrsta, the Army’s program manager for utility helicopters told reporters Thursday. At least in the near term, the Cheyenne will probably free up the Black Hawk to do some more complex missions than just ferrying troops.

    “So I think, before, there was a focus on troop movement, battlefield circulation, associated with the aircraft. I think what it's actually doing is, it's opening up the aperture for the aircraft to appreciate its multi-role capability,” Nesrsta said. That has led to “substantive conversations and activity on employing launched effects on the aircraft,” including equipping it with autonomous systems.

    Not only that, but Sikorsky, who makes the Black Hawk, is working on a completely unmanned variant to pick up the helicopter’s supply mission. 

    “I think the Black Hawk will continue to do what it does so well, which is, you know, the same air-assault capability, the same medevac capability, the same logistical support capability, but probably closer in, to what we call the ‘close fight,’ ” Gill said.

    ]]>

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The race to quantum-proof the internet is underway as experts warn of “harvest now, decrypt later” risks and slow migration to post-quantum security.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Cyberattacks against critical infrastructure from groups sympathetic to Iran appear to be ticking up, as the federal government warns that hackers may exploit vulnerabilities.

    Last week, pro-Iranian hacking group Ababil of Minab claimed responsibility for a March hack on the Los Angeles County Metropolitan Transportation Authority, publishing claims on Telegram that they said showed them accessing LA Metro’s internal systems. The transit agency shut down access to some of its network after its security team found unauthorized activity, although officials said bus and rail service was unaffected.

    The group's claims may be false. It is an “emerging” group “with a limited public profile and little verifiable prior activity in threat intelligence reporting — making any definitive capability or intent assessment premature at this stage,” said a blog post by Tim Miller, field chief technology officer for public sector at Dataminr, an artificial intelligence-backed platform that helps leaders track events, threats and risks in real time.

    Still, Miller wrote, “What can be cautiously observed from available evidence is that their explicit pro-Iran messaging and targeting of a major US public transit authority is broadly consistent with Iranian-aligned actors’ known pattern of targeting US critical infrastructure."

    Other experts that track such events are similarly cautious. “There is no clear evidence that the claim is legitimate,” said a spokesperson for the Multi-State Information Sharing and Analysis Center, which has warned of attacks on critical infrastructure by pro-Iran hackers.

    Still, it is a worrying time for state and local governments and critical infrastructure operators, who have been waiting to see whether the ongoing U.S. war on Iran would draw retaliation by Iran-linked hacker groups.

    "The threat of cyber-attack from Iran is real,” Andrew Chipman, governance, risk and compliance manager at cybersecurity company ProCircular, said in an email. “At this time, we expect to see that threat realized through proxies, hacktivists, and other allies to the Iranian regime. If Iran is able to build back their regime, we may see direct retaliation from Iran in the form of cyber-attacks against highly visible targets. History teaches us that hospitals and medical service providers are prime targets for the regime and its supporters. However, any critical infrastructure is a potential target.”

    The alleged Iran-backed hack in Los Angeles preceded a April 7 warning from the Cybersecurity and Infrastructure Security Agency and a slew of other federal agencies that various operational technology devices used in critical infrastructure, including programmable logic controllers, have been exploited by bad actors linked to Iran.

    The agencies said those efforts, which have at times “resulted in operational disruption and financial loss,” have been designed to “cause disruptive effects within the United States.” CISA and its fellow agencies said the targets have included government services and facilities, water and wastewater systems and energy.

    “Iran using cyberattacks to probe and impact American utilities should come as no surprise,” Lt. Gen. Ross Coffman (Ret.), president of artificial intelligence company Forward Edge-AI, said in an email. “Iran is using its long-range targeting tools to fight in every domain possible. We must continue to harden our cyber defenses and remind employees that they are the first line of defense. Our government's cyber professionals are the best in the world, so Iran is probing daily to find an exposed flank.”

    Ababil of Minab warned that their “forthcoming actions will exact sterner pain,” although Miller said in the blog post that those pronouncements should be “treated as unverified rhetoric until corroborated by additional intelligence.” Chipman said some form of escalation could happen.

    “Iran is not currently in a position to wage large scale cyber warfare against the United States or its allies, but hacktivists and proxy attackers are plentiful — expect attacks to come and prepare appropriately," he said.

    ]]>

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Cybersecurity researchers at Fortinet have discovered Nexcorium, a new Mirai-based malware targeting TBK DVR systems to turn them into a botnet for DDoS attacks.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • This week in cybersecurity from the editors at Cybercrime Magazine

    Sausalito, Calif. – Apr. 17, 2026

    Listen to the podcast episode

    Kerem Albayrak from north London threatened to wipe 319 million accounts unless Apple gave him iTunes gift cards worth $100,000 (£76,000), BBC reported in a Dec. 2019 story.

    An investigation found that Albayrak had not compromised Apple’s systems. He was given a two year suspended jail sentence and ordered to do 300 hours of unpaid work.

    In Mar. 2017, Albayrak emailed Apple’s security team, claiming to have breached millions of iCloud accounts. He posted a video on YouTube that appeared to show him breaking into two accounts. He threatened to sell the account information, dump his database online and reset the accounts, unless Apple paid his iTunes gift card demand. Albayrak also said he would accept $75,000 worth of cryptocurrency, but later increased this to $100,000.

    He was arrested at his home in north London about two weeks after sending his threat. Apple investigated his claims but could not find evidence that its systems had been compromised. In addition to the 300 hours of unpaid work, he was given a six month electronic curfew.

    The incident was later deemed to be part of a publicity stunt to promote a tool Albayrak was developing.

    In a new Cybercrime Magazine Podcast episode Albayrak publicly discusses his side of the story for the first time; he has since gone on to work in cybersecurity.

    Listen to the Podcast episode



    Cybercrime Magazine is Page ONE for Cybersecurity. Go to any of our sections to read the latest:

    • SCAM. The latest schemes, frauds, and social engineering attacks being launched on consumers globally.
    • NEWS. Breaking coverage on cyberattacks and data breaches, and the most recent privacy and security stories.
    • HACK. Another organization gets hacked every day. We tell you who, what, where, when, and why.
    • VC. Cybersecurity venture capital deal flow with the latest investment activity from various sources around the world.
    • M&A. Cybersecurity mergers and acquisitions including big tech, pure cyber, product vendors and professional services.
    • BLOG. What’s happening at Cybercrime Magazine. Plus the stories that don’t make headlines (but maybe they should).
    • PRESS. Cybersecurity industry news and press releases in real time from the editors at Business Wire.
    • PODCAST. New episodes daily on the Cybercrime Magazine Podcast feature victims, law enforcement, vendors, and cybersecurity experts.
    • RADIO. Tune into WCYB Digital Radio at Cybercrime.Radio, the first and only round-the-clock internet radio station devoted to cybersecurity.

    Contact us to send story tips, feedback and suggestions, and for sponsorship opportunities and custom media productions.

    The post He Pled Guilty To Blackmailing Apple. What Really Happened. appeared first on Cybercrime Magazine.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Hackers are actively scanning for vulnerable TP-Link home routers to push Mirai-style malware, abusing CVE-2023-33538 in a new wave of automated attacks. While the current exploit attempts are technically flawed, researchers warn that the underlying bug is real and dangerous when combined with default credentials and end‑of‑life firmware. It affects TL‑WR940N v2/v4, TL‑WR740N v1/v2 and […]

    The post TP-Link Routers Hit by Mirai in CVE-2023-33538 Attacks appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Huntress is warning that threat actors are exploiting three recently disclosed security flaws in Microsoft Defender to gain elevated privileges in compromised systems. The activity involves the exploitation of three vulnerabilities that are codenamed BlueHammer (requires GitHub sign-in), RedSun, and UnDefend, all of which were released as zero-days by a researcher known as Chaotic Eclipse (

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶