-
New START expires: The treaty limits on the world’s largest nuclear arsenals are gone. The 15-year-old New START treaty expired at midnight, the last vestige of an arms-control regime that reduced the combined nuclear stockpiles of Moscow an…
·
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Fading U.S. leadership has countries from Poland to South Korea thinking about nuclear-weapons programs of their own.
·
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
A U.S. F-35 shot down an Iranian drone on Tuesday: a Shahed-139 that was flying toward the carrier Abraham Lincoln in the Arabian Sea, military officials told Reuters. The Shahed-139 is a medium-altitude long-endurance UAV that looks a lot like a MQ-1B…
·
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
American munitions makers are working to increase production capacity. Although Congress didn’t much bend to the White House’s last-minute request for a munitions-funding boost, defense executives say it’s enough to persuade them to p…
·
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
A new phishing campaign is tricking people with fake party invitations that secretly install remote access software on Windows computers. The attack uses social engineering to deliver ScreenConnect, a legitimate remote support tool, allowing threat actors to gain complete control of victim systems. What appears to be a harmless invitation from a friend turns into […] The post Beware of Malicious Party Invitations that Tricks Users into Installing Remote Access Tools appeared first on Cyber Security News.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
The Ricochet Chollima advanced persistent threat group has launched a targeted campaign against activists and organizations focused on North Korea, beginning in March 2025. The operation, named “Operation: ToyBox Story” by Genians Security Center, relies on a clever combination of social engineering and malware delivery tactics. Attackers send spear-phishing emails that appear to come from […] The post Chollima APT Hackers Weaponize LNK File to Deploy Sophisticated Malware appeared first on Cyber Security News.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
APT28, the Russia-linked advanced persistent threat group, has launched a sophisticated campaign targeting Central and Eastern Europe using a zero-day vulnerability in Microsoft Office. The threat actors leveraged specially crafted Microsoft Rich Text Format (RTF) files to exploit the vulnerability and deliver malicious backdoors through a multi-stage infection chain. The campaign, tracked as Operation Neusploit, […] The post APT28 Hackers Exploiting Microsoft Office 0-Day in the Wild to Deploy Malware appeared first on Cyber Security News.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
A dangerous banking malware called Anatsa has been discovered spreading through the Google Play Store, reaching more than fifty thousand downloads before detection. The malicious application was cleverly hidden as a document reader, making it appear harmless to unsuspecting users searching for legitimate file management tools. This discovery highlights how cybercriminals continue to exploit official […] The post Malicious App on The Google Play with 50K+ Downloads Deploy Anatsa Banking Malware appeared first on Cyber Security News.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Shutdown begins as Congress hopes to keep duration minimal. The Senate on Friday evening approved a spending package that ensures nearly all agencies are funded through fiscal 2026, but the agreement came too late to stave off an appropriations lapse, …
·
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
The U.S. may be headed for another government shutdown. Lawmakers are tussling over terms to keep the government open ahead of a funding deadline this evening at midnight. A bipartisan deal had been reached Thursday afternoon after the White House and …
·
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶


