• OpenAI unveils GPT-5.4-Cyber, a cybersecurity-focused model built to help defenders analyze malware and fix software bugs. The company is also expanding its Trusted Access for Cyber (TAC) program to thousands of verified experts.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Since the United States began to blockade Iran’s ports on Tuesday, 13 ships have heeded warnings from U.S. warships to turn back, the chairman of the Joint Chiefs of Staff said Thursday.

    The Abraham Lincoln carrier strike group is leading the blockade, Gen. Dan Caine said at a Pentagon press briefing with sailors prepared to board any commercial vessels that attempt to cross the blockade line.

    In addition to ships, there is a “massive, massive force of fighters, intelligence aircraft, helicopters, and other embarked forces, to include aerial refueling tankers that are up overhead this blockade area,” Caine said, indicating a chart of U.S. presence in the region.

    Adm. Brad Cooper, the head of U.S. Central Command, joined the briefing to talk about two recent trips to the Middle East, where he said he “had the privilege of personally recognizing more than 100 servicemen and women for their extraordinary valor, their courage and their initiative under fire.”

    Cooper also said he met with teams who had recovered downed Iranian one-way attack drones and rebuilt them.

    “We brought them back to America, took the guts out, put a ‘made in America’ stamp on them, and fired them right back to Iran,” he said. 

    Defense Secretary Pete Hegseth addressed Iran’s government directly in his remarks, asserting that Tehran can attempt to “dig out” of its destroyed military and defense industrial base facilities, “but you can’t reconstitute.”

    Hegseth also challenged Iran’s control of the Strait of Hormuz, saying they “don’t have a real navy or real domain awareness,” though Iran’s mines have effectively kept the waterway closed. 

    Hegseth then turned his ire upon the press.

    “I just can't help but notice the endless stream of garbage, the relentlessly negative coverage you cannot resist peddling, despite the historic and important success of this effort and the success of our troops,” he said. “Sometimes it's hard to figure out what side some of you are actually on. It's incredibly unpatriotic.”

    He compared coverage of the Iran war to that of the Afghanistan withdrawal, accusing the media of bending “over backwards to explain away” the chaos of the American airlift out of Kabul’s airport as Taliban forces took over the country.

    In reality, news organizations at the time asked the Pentagon in its daily briefings how and why the withdrawal effort had been left to the last minute and allowed to get so out of control. Pentagon officials deferred questions about planning and decision-making to the State Department.

    Hegseth then turned his attention to recruiting efforts by the Air Force and Space Force, which announced Tuesday they had met their fiscal year 2026 goals five months ahead of deadline.

    “Where are the reports on that? Where's the coverage of the new spirit in the country? The new spirit in the ranks, the surge of Americans wanting to join the greatest military in the world,” he said. “Nothing from the fake news.”

    In fact, ABC News reported on the story on Wednesday, becoming the latest of several news organizations to do so.

    ]]>

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • You know that feeling when you open your feed on a Thursday morning and it’s just… a lot? Yeah. This week delivered. We’ve got hackers getting creative in ways that are almost impressive if you ignore the whole “crime” part, ancient vulnerabilities somehow still ruining people’s days, and enough supply chain drama to fill a season of television nobody asked for. Not all bad though. Some 

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A surge of targeted cyberattacks was detected against local governments and municipal healthcare institutions particularly clinical and ambulance hospitals. The campaign has been attributed to threat cluster UAC-0247, known for advanced data theft, persistence, and lateral movement methods. The attack chain begins with well-crafted phishing emails that appear to discuss humanitarian aid proposals. These emails typically […]

    The post UAC-0247 Hits Hospitals, Governments With Browser and WhatsApp Data Theft appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • In 2024, compromised service accounts and forgotten API keys were behind 68% of cloud breaches. Not phishing. Not weak passwords. Unmanaged non-human identities that nobody was watching. For every employee in your org, there are 40 to 50 automated credentials: service accounts, API tokens, AI agent connections, andOAuth grants. When projects end or employees leave, most

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Cisco has announced patches to address four critical security flaws impacting Identity Services and Webex Services that could result in arbitrary code execution and allow an attacker to impersonate any user within the service. The details of the vulnerabilities are below – CVE-2026-20184 (CVSS score: 9.8) – An improper certificate validation in the integration of single sign-on (SSO)

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Virtual assistants boost productivity but add cybersecurity risks. Poor access control, weak devices, and credential sharing can expose sensitive business data.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Multiple ongoing malware campaigns are distributing a powerful information-stealing trojan, tracked as NWHStealer, through fake VPN installers, gaming mods, and system tools. Unlike typical phishing campaigns, these attacks exploit users’ trust in popular software. Threat actors are disguising malicious payloads as legitimate installers for tools such as Proton VPN, OhmGraphite, Sidebar Diagnostics, Pachtop, and HardwareVisualizer. The files are hosted […]

    The post Fake ProtonVPN, game mod sites spread NWHStealer in new Windows malware campaign appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A “novel” social engineering campaign has been observed abusing Obsidian, a cross-platform note-taking application, as an initial access vector to distribute a previously undocumented Windows remote access trojan called PHANTOMPULSE in attacks targeting individuals in the financial and cryptocurrency sectors. Dubbed REF6598 by Elastic Security Labs, the activity has been found to leverage

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Private Fiverr user documents, including tax records and IDs, were reportedly found in Google search results due to a storage configuration issue. Read more about the findings and the company’s response to the data exposure.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶