-
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added a recently disclosed security flaw impacting various Linux distributions to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation in the wild. The vulnerability, tracked as CVE-2026-31431 (CVSS score: 7.8), is a case of local privilege escalation (LPE) flaw that could allow an
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Scammers are abusing Google AppSheet and Google Drive to bypass security filters and steal thousands of Facebook Business accounts globally.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Two US cybersecurity experts jailed for aiding BlackCat ransomware group, extorting victims worldwide and exploiting insider access for profit.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Cybersecurity company Trellix has announced that it suffered a breach that enabled unauthorized access to a “portion” of its source code. It said it “recently identified” the compromise of its source code repository and that it began working with “leading forensic experts” to resolve the matter immediately. It also said it has notified law enforcement of the matter. Trellix did not disclose the
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Cybersecurity researchers at Guardio Labs have uncovered a massive phishing operation dubbed AccountDumpling that has compromised more than 30,000 Facebook accounts worldwide. Unlike conventional phishing campaigns that rely on spoofed domains or compromised SMTP servers, this Vietnamese-linked operation abuses Google AppSheet to deliver fully authenticated malicious emails. Because the messages originate from legitimate Google infrastructure, […]
The post Massive Facebook Phishing Operation Leverages AppSheet, Netlify, and Telegram appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
A critical zero-day vulnerability in cPanel and WebHost Manager (WHM) is under massive active exploitation following the public release of a sophisticated proof-of-concept exploit. Tracked as CVE-2026-41940, this flaw has already compromised tens of thousands of servers worldwide. The vulnerability, identified as CVE-2026-41940, is a severe authentication bypass flaw affecting cPanel and WHM. It carries […]
The post cPanelSniper PoC Exploit Disclosed as 44,000 Servers Reportedly Compromised appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
SOCRadar researchers have uncovered a massive Chinese cybercrime operation using the OpenClaw and Paperclip systems to automate global attacks.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
President Trump’s April 21 decision on to extend his original two-week ceasefire with Iran, less than 12 hours after he expressed reluctance to do precisely that, is giving the U.S. and Iran more time to salvage a diplomatic process defined by misleading statements, rhetorical chest-thumping, and conflicting agendas.
While shooting has stopped for the time being, the standoff over the Strait of Hormuz remains. The good news is that neither the United States’ nor Iran’s best interests are served by a long-term conflict, which suggests both sides are at the very least keen to keep the diplomatic option open in order to determine whether a settlement to the nearly two-month long war is possible. The bad news is that Trump’s poor assumptions about how Iran would react to U.S. pressure tactics have led to poor decisions and a conflict in the Persian Gulf whose outcome remains in doubt. Far from squeezing Iranian leaders into concessions, the U.S. president has repeatedly ceded leverage in negotiation.
Trump is notoriously unpredictable on a lot of subjects, but he’s been quite consistent on Iran throughout his presidency. His objective is clear: to prevent the country from acquiring a nuclear weapon. Presidents George W. Bush, Barack Obama, and Joe Biden all had a similar policy, even if they adopted different strategies for getting there. The difference is Trump’s unwillingness to adapt, his propensity to wield the stick without the carrot, and most of all, his unwarranted confidence in his assumptions.
Trump’s blunders have made the goal harder. The first occurred in 2018, when he withdrew the United States from the 2015 Iran nuclear deal negotiated by the Obama administration. Trump, who said JCPOA offered too much relief from sanctions while imposing too few limits on Tehran’s nuclear activity, launched a “maximum-pressure” strategy on Iran’s leaders that sought to prevent Iranian oil from reaching the global market and to cut off Iranian-linked banks from the international financial system. The hope was that Ali Khamenei, the Iranian supreme leader at the time, would come back to the table on U.S. terms.
This calculation was mistaken. Instead of capitulating, Iran took advantage of the U.S. withdrawal by freeing itself from the deal's nuclear restrictions. More and faster centrifuges were manufactured, installed, and used. Iranian scientists began growing Tehran’s stockpile of enriched uranium. Enrichment, which was capped at 3.67 percent under the deal, moved closer to weapons-grade. And the International Atomic Energy Agency’s access became limited as the Iranians retaliated to U.S. sanctions and IAEA censure.
By November 2023, Iran’s stockpile of enriched uranium was roughly 22 times larger than the deal had allowed. Today, despite last June’s U.S. airstrikes on Iranian nuclear facilities and the thousands since Feb. 28, Iran still has roughly 1,000 pounds of 60-percent enriched uranium—leverage that Tehran wouldn’t have if Trump had chosen to stay in the agreement.
Some would call this ancient history. If so, it’s ancient history that has repeated itself. Trump’s war strategy against Iran leans on the same assumptions and theories at play during his first term: with enough coercion, the Iranian regime will be weakened to the point where the United States can run the table and dictate terms the Iranians will have no choice but to accept. Yet Trump’s war of choice in the Persian Gulf has merely afforded Iran more chips to play with.
Look no further than the Strait of Hormuz. Before the war, the international waterway was open for business. About 120 tankers transited the narrow chokepoint into the Gulf of Oman on a daily basis, servicing approximately one-fifth of the world’s crude oil supply.
The U.S. and Israeli military campaign changed the status quo virtually overnight. Trump, inexplicably, believed Iran would give up before closing the strait. This proved to be a massive error of judgment. Perceiving the war as an existential one, Iran effectively closed the chokepoint, picking and choosing which vessels could enter and interdicting those that tried to bypass its rules.
Traffic through the waterway has since plunged by 95 percent, resulting in price hikes on everything from fuel to fertilizer. Meanwhile, the ongoing U.S. blockade of Iranian ports has merely incentivized Tehran to drag out its own closure. Tehran has since offered to re-open the waterway if Washington ends the war, lifts the blockade and guarantees not to bomb in the future. Once again, the Iranians successfully exploited Trump’s strategy, using it as an excuse to turn the strait into a de facto Iranian lake, which before the war was a non-issue.
Unplugging the strait is now at least as important to the Trump administration as accounting for Iran’s nuclear material, a reality Tehran no doubt understands as it continues deliberating internally about how to manage diplomacy with Washington. Whatever tactics the regime does use, it’s highly unlikely it will agree to Trump’s wishes without a whole host of U.S. concessions in return. Some of those concessions, such as an internationally guaranteed security commitment that the United States will refrain from going to war against Iran in the future, will be difficult for Trump to swallow. Either way, any settlement is bound to be more satisfying to the regime than it needed to be.
There is a fundamental lesson in all of this, one U.S. officials present and future should take heed of: if you’re unwilling to recognize your mistakes out of stubbornness or genuine belief, then they risk exacerbating the very problems you seek to solve. This is why a robust, operational inter-agency process is so important and why Trump himself would do well to expand an inner circle that has thus far been highly restricted. Different departments and agencies will have different opinions on how a particular problem should be managed, what the policy should be and how it should be enacted. Presidents in the past may view these conflicting viewpoints as hindrances to effective decision-making at best and obstructionism at worst. In reality, a full-fledged debate and the existence of a constant feedback loop over what is and isn’t working is precisely how the process should function.
The principals need to speak truth to power. And the president needs to be smart enough to listen.
Daniel R. DePetris is a fellow at Defense Priorities and a syndicated foreign affairs columnist for the Chicago Tribune.
]]>¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
A newly discovered Vietnamese-linked operation has been observed using a Google AppSheet as a “phishing relay” to distribute phishing emails with an aim to compromise Facebook accounts. The activity has been codenamed AccountDumpling by Guardio, with the scheme selling the stolen accounts back through an illicit storefront run by the threat actors. In all, roughly 30,000 Facebook accounts are
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Torrance, United States / California, May 1st, 2026, CyberNewswire Criminal IP partners with Securonix to integrate Criminal IP’s Threat Intelligence into ThreatQ, allowing organizations to incorporate external IP intelligence into their existing workflows, helping security teams accelerate analysis and response with more actionable context. Unlike traditional intelligence feeds, Criminal IP provides visibility into how assets […]
The post Criminal IP and Securonix ThreatQ Collaborate to Enhance Threat Intelligence Operations appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶


