• NASHVILLEThe Army is continuing to name its airframes after Indigenous tribes with its first tiltrotor aircraft. The MV-75 is officially the Cheyenne II, the service’s undersecretary announced Wednesday at the Army Aviation Warfighting Summit.

    Members of the tribe have served in every U.S. armed service and during every major conflict, said Undersecretary Mike Obadal, a relationship that “evolved from warfare to mutual respect and finally into an unbroken legacy of patriotic service.”

    “In the Army, system names carry both history and expectations,” Obadal said. “With the MV-75, we honor a legacy forged in conflict, proven in battle, originally known to the U.S. Army as some of the most formidable and disciplined adversaries on the battlefield.”

    The II is a nod to the Army’s original Cheyenne, a Vietnam War-era attack helicopter program that was canceled before entering production in 1972.

    The new Cheyenne has been more than  a decade in the making, originally the Future Long-Range Assault Aircraft, part of the Army’s Future Vertical Lift program. The service’s then-chief of staff, Gen. Randy George, announced earlier this year that the latest prototypes, which have evolved from Bell-Textron’s V-280 Valor, will be fielded to units for testing by the end of the year.

    Envisioned as an eventual replacement for the UH-60 Black Hawk, the Cheyenne is the Army’s first foray into tiltrotor aviation, decades after the Marine Corps, Air Force and Navy all integrated the V-22 Osprey into their aviation communities. 

    It “carries the lessons of the past and the present into the future,” Obadal said.

    Bell-Textron and the Army are integrating some of the lessons learned at deadly cost from the Osprey, including a fixed engine rather than one that tilts with the rotors.

    “Now that may seem like a minor difference, but when it comes to maintenance, reliability, cost, impact from vibration or utilization, we found that fixed engine is likely to result in less maintenance requirements, less complexity,” Col. Tyler Partridge, who commands the 101st Combat Aviation Brigade at Fort Campbelly, Ky., told Defense One in March.

    The Army and Bell-Textron will officially unveil the aircraft Wednesday at the Army Aviation Warfighting Summit.

    ]]>

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • An unmanned helicopter concept being developed by Airbus for Marine Corps logistics missions may pave the way for an armed variant, company officials say.

    Airbus is working on an unmanned version of the MQ-72C Lakota for the Marines’ Aerial Logistics Connector competition; on Wednesday, the company said it had completed another autonomous flight test using its H145 helicopter and technology from Shield AI, L3Harris Technologies, and Parry Labs.

    Company officials said it’s possible that the Lakota could be armed.

    “Based on our discussions with other potential customers and partners, we believe there is an opportunity for mission expansion to include launched effects,” an Airbus official said. “Our primary focus remains providing the best aerial logistics platform for the Marine Corps. We believe the MQ-72C Lakota Connector can support a range of future missions thanks to its versatile design, [modular open system] architecture, and autonomous mission capabilities.”

    Airbus is among several defense companies working on autonomous aircraft intended to replace military aviators on logistics missions. Last year, Sikorsky unveiled a pilotless UH-60L Black Hawk to carry cargo into combat zones. Similarly, Boeing announced a concept for a tiltrotor drone-wingman concept to support the Army’s helicopter fleet. 

    Airbus’ latest test flights, conducted in recent weeks at its Grand Prairie, Texas, facility, refined the helicopter's perception, officials said. The H145, the commercial variant of the Lakota, scanned a landing zone in flight, detected obstacles, and found an alternative spot to land if necessary. The technology detected objects “ranging from the size of a SUV down to a pelican case,” an Airbus official said.

    “This test was vital for us to show the Lakota Connector’s development in performing aerial logistics missions for the U.S. Marine Corps,” said Rob Geckle, CEO of Airbus U.S. Space and Defense. “Perception systems can make or break the success of an unmanned mission in the field, and I am excited to see our aircraft perform so well under uncertain conditions.”

    Part of the effort’s fourth series of tests, the flights were conducted in recent weeks at the Airbus facility in Grand Prairie, Texas. Shield AI  contributed its Hivemind autonomy software, L3 Harris supplied modular and digital backbone, and Parry Lab provided edge-computing and ground-control stations for the tests, an official said. 

    “This H145 flight test proves Hivemind delivers scalable autonomy across rotary and fixed-wing aircraft without custom redesign,” said Christian Gutierrez, vice president of Hivemind Solutions at Shield AI. “That speed and flexibility are critical in contested logistics.”

    An Airbus official said “the next step is progressively improving perception to detect smaller, more operationally representative objects” and additional internal autonomy and integration flight tests are expected throughout the year.

    The Aerial Connector program is one of several Defense Department initiatives “aimed at delivering logistical support in distributed environments during peer or near- peer conflicts,” Airbus said in the news release. Other competitors in the program include 

    Those developments have made some aviators fearing for their careers, Defense One previously reported, especially as the push for autonomous choppers comes as some services shed helicopter units.

    ]]>

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Apple approved a fake Ledger Live app on its App Store, allowing scammers to steal $9.5 million from more than 50 users. Did you install this app?

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • In the intricate tapestry of the modern digital world, Application Programming Interfaces (APIs) are the invisible threads that connect everything. They power mobile applications, enable seamless third-party integrations, facilitate microservices communication, and drive the functionality of countless web applications. From fetching live weather data to processing financial transactions, APIs are the foundational glue of our […]

    The post Top 10 Best API Security Providers Protecting Web Apps in 2026 appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • In the rapidly evolving digital landscape of 2026, applications are the backbone of every enterprise. From customer-facing web portals and mobile apps to intricate internal systems and APIs, software drives business operations, innovation, and customer engagement. However, this ubiquity also makes applications a prime target for cyber attackers. A single vulnerability can lead to devastating […]

    The post Top 10 Best Application Security Testing Companies in 2026 appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A recent independent audit conducted by privacy technology firm webXray has revealed that major technology companies, including Google, Microsoft, and Meta, are actively tracking users who have explicitly opted out of data sharing. The findings suggest widespread, industrial-scale non-compliance with the California Consumer Privacy Act (CCPA), potentially exposing these corporations and website publishers to billions […]

    The post Google, Microsoft, Meta Accused of Tracking Users Even After Privacy Opt-Out appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A recently disclosed critical security flaw impacting nginx-ui, an open-source, web-based Nginx management tool, has come under active exploitation in the wild. The vulnerability in question is CVE-2026-33032 (CVSS score: 9.8), an authentication bypass vulnerability that enables threat actors to seize control of the Nginx service. It has been codenamed MCPwn by Pluto Security. “

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A threat group resembling MuddyWater has conducted a large-scale reconnaissance and intrusion operation targeting critical sectors in the Middle East, including aviation, energy, and government entities. The attackers reportedly scanned over 12,000 internet-facing systems before launching selective exploitation attempts that led to the confirmed theft of sensitive data. The incident followed a structured, multi-phase workflow, beginning with mass vulnerability scanning and […]

    The post MuddyWater-Style Hackers Probe 12,000+ Systems Ahead of Middle East appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • This week in cybersecurity from the editors at Cybercrime Magazine

    Sausalito, Calif. – Apr. 15, 2026

    Read the full story from RSAC

    The top line on chief information security officer pay packages in 2026 is that CISOs are earning more than ever, writes Steve Morgan, founder of Cybersecurity Ventures and Editor-in-Chief at Cybercrime Magazine, in a new blog post for RSAC Conference.

    But, with an 11 percent turnover rate for the position, the bottom line is that no matter how much a CISO earns, there’s always the chance they will bolt out the door.

    In 2026, CISO annual pay packages range from $150,000 to $1 million and more. The bigger the company, the higher the pay. Fortune 100 CISOs often far exceed reported averages, with a select few hauling in as much as $5 million per year.

    One survey reports that CISOs in the technology and services sector earn the highest total compensation on average, largely driven by equity and long-term incentives.

    For more information on the HR side of security chiefs, the 2026 CISO Report from Cybersecurity Ventures in partnership with Sophos reports on burnout, certifications, job satisfaction, and more.

    Read the Full Story



    Cybercrime Magazine is Page ONE for Cybersecurity. Go to any of our sections to read the latest:

    • SCAM. The latest schemes, frauds, and social engineering attacks being launched on consumers globally.
    • NEWS. Breaking coverage on cyberattacks and data breaches, and the most recent privacy and security stories.
    • HACK. Another organization gets hacked every day. We tell you who, what, where, when, and why.
    • VC. Cybersecurity venture capital deal flow with the latest investment activity from various sources around the world.
    • M&A. Cybersecurity mergers and acquisitions including big tech, pure cyber, product vendors and professional services.
    • BLOG. What’s happening at Cybercrime Magazine. Plus the stories that don’t make headlines (but maybe they should).
    • PRESS. Cybersecurity industry news and press releases in real time from the editors at Business Wire.
    • PODCAST. New episodes daily on the Cybercrime Magazine Podcast feature victims, law enforcement, vendors, and cybersecurity experts.
    • RADIO. Tune into WCYB Digital Radio at Cybercrime.Radio, the first and only round-the-clock internet radio station devoted to cybersecurity.

    Contact us to send story tips, feedback and suggestions, and for sponsorship opportunities and custom media productions.

    The post CISO Salaries In 2026: $150K to $1M; Stock Grants, Bonuses, Other Compensation appeared first on Cybercrime Magazine.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A number of critical vulnerabilities impacting products from Adobe, Fortinet, Microsoft, and SAP have taken center stage in April’s Patch Tuesday releases. Topping the list is an SQL injection vulnerability impacting SAP Business Planning and Consolidation and SAP Business Warehouse (CVE-2026-27681, CVSS score: 9.9) that could result in the execution of arbitrary database 

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶