• A newly discovered malware campaign is exploiting user trust in Telegram by distributing a trojanized installer through a typosquatted website, telegrgam[.]com. The site closely mimics the official Telegram download portal and delivers a malicious executable named tsetup-x64.6.exe, making it appear legitimate to unsuspecting users. Once downloaded and executed, the installer initiates a multi-stage attack chain while […]

    The post Fake Telegram Download Site Delivers Stealthy In-Memory Malware Loader appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Cybersecurity researchers have a detailed a critical security flaw in Fortinet’s FortiClient Enterprise Management Server (EMS). Tracked as CVE-2026-21643, this severe pre-authentication SQL injection vulnerability carries a near-maximum CVSS severity score of 9.1. It allows unauthenticated attackers to execute arbitrary SQL commands and gain total control over the underlying database. The flaw specifically targets multi-tenant […]

    The post FortiClient Hit by Severe SQL Injection Vulnerability Enabling Database Intrusion appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A newly disclosed vulnerability in AWS Bedrock AgentCore Code Interpreter allows threat actors to bypass network isolation and establish stealthy command-and-control (C2) channels. AWS originally advertised this mode as providing complete isolation without external access, researchers found that it permits outbound DNS queries for A and AAAA records. This structural allowance enables attackers to exfiltrate […]

    The post AWS Bedrock AgentCore Sandbox Bypass Enables Stealthy C2 and Data Exfiltration appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Cybersecurity researchers have disclosed a critical security flaw impacting the GNU InetUtils telnet daemon (telnetd) that could be exploited by an unauthenticated remote attacker to execute arbitrary code with elevated privileges. The vulnerability, tracked as CVE-2026-32746, carries a CVSS score of 9.8 out of 10.0. It has been described as a case of out-of-bounds write in the LINEMODE Set

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Attackers are abusing fake court documents and GitHub‑hosted payloads in a focused spear‑phishing campaign that deploys a stealthy Rust‑based COVERT RAT against Argentina’s judicial sector. This operation chains Windows LNK shortcuts, BAT loaders, and PowerShell to quietly fetch and execute a masqueraded payload, msedge_proxy.exe, from GitHub infrastructure. The operation, tracked as “Operation Covert Access,” uses […]

    The post Judicial Targets Hit by COVERT RAT via Court Docs and GitHub Payloads appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Virtually all of the giant reconciliation fund has been doled out, the Pentagon’s acting chief financial officer said Tuesday. 

    “Everything except for $1.3 billion in the $153 billion that's been given to the Department of Defense by the One Big, Beautiful Bill Act has been apportioned and [has] been released to the services and program managers. And so that money is all starting to flow,” Jules Hurst, who is performing the duties of Pentagon comptroller and chief financial officer, said at the McAleese annual defense programs conference in Arlington, Va.

    As Hurst spoke, lawmakers are mulling a $50 billion supplemental to pay for U.S. strikes on Iran and Trump-administration officials were finishing its 2027 budget proposal.

    Asked about reports that some offices hadn’t received reconciliation funds yet, he said, “It's all been released to the services of the program offices. Sometimes it takes time for money to trickle down.”

    Hurst declined to preview any details on the upcoming White House budget request, which will reportedly ask for $1.5 trillion in defense spending—half again as much as the current year’s record budget

    But he did say the entity known as DOGE, was still “alive and well” in the Pentagon. 

    “They've been a great partner for comptroller, in particular, as we just try to figure out where we have fat,” Hurst said. “We have robust [operations and maintenance] accounts in the FY27 budget, but they're focused on readiness. And so wherever we could, we looked through accounts and services inside the department and we tried to get rid of things that are no longer really necessary…and DOGE is very helpful for that.”

    When asked if the Pentagon could feasibly spend $1.5 trillion in one year, Hurst said yes and that a lot of things were left out to keep the number down. 

    “We had to cut down significantly to get to [$1.5 trillion]. We had more ideas and more concepts on how to spend the money, and then we had to deal with. And so we took a long time to trim that down to the most essential things,” he said. 

    Hurst declined to provide specifics on how the budget would be broken down but said the proportions would mimic the Reagan administration, including “a massive investment in procurement and research development.”

    ]]>

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Questions about following illegal orders—a frequent theme of the second Trump administration—came up again at a Capitol Hill hearing on Tuesday

    Just days after Defense Secretary Pete Hegseth declared that the U.S. war on Iran would feature “no quarter, no mercy for our enemies”—on its face, a violation of international law—the leader of U.S. Southern Command was pressed by House lawmakers who had questions about attacks on alleged drug-running boats off South America.

    “Has an order been issued to you on ‘no quarter,’ no survivors?” Rep. Eugene Vindman, D-Va., asked Marine Gen. Francis Donovan, alluding to the Sept. 2 “double-tap” attack on the survivors of an initial strike.

    The Law of Armed Conflict considers survivors of a strike to be “out of the fight” and thus off the table as targets. 

    Donovan said he had not been given any direct orders to offer “no quarter,” a term the military uses to describe sparing survivors of an attack who are no longer able to defend themselves. 

    Asked whether he would consider such an order unlawful, Donovan responded that he would not follow an unlawful order.

    “Okay, that’s an unlawful order,” Vindman said. 

    It was a familiar line of questioning, going back to the early days of the administration, when Hegseth and Army Secretary Dan Driscoll were asked about their willingness to follow unlawful orders. It was an unusual query for a confirmation hearing, but one that lawmakers insisted on in light of allegations by one of Trump’s former defense secretaries that he had suggested shooting at unarmed protestors. 

    In his own testimony on Tuesday, Joseph Humire, who is serving unconfirmed in as the Pentagon’s top civilian for homeland defense, said there have been 45 strikes, killing 157 aboard 47 vessels. Legal experts have from the beginning debated whether any of these strikes have been legal, as the Pentagon has offered little evidence that the targets were actively trafficking drugs at the time they were killed. 

    Unlawful orders came up again later in the hearing, as Rep. Chrissy Houlahan, D-Pa., pressed Donovan and his U.S. NORTHCOM counterpart, Air Force Gen. Gregory Guillot, in response to recent Trump comments that he had considered federalizing the November midterm election.

    On March 10, the Democratic National Committee sued the administration to compel a response to whether there are considerations to deploy the military or station armed federal agents outside polling places. 

    Donovan and Guillot were much more clear when asked whether they would deploy troops to stand outside polling locations on election day, an illegal action according to federal law.

    “Congresswoman, I'm aware that doing so is against the law and I will not follow an unlawful order,” Guilott told Houlahan, while Donovan followed up with, “I will commit to the same.”

    Humire said that he was not aware of any direction to deploy troops, but said he would “reserve the decision space” for the president.

    “I hope, Mr. Humire, that you take a look at the law and follow it,” Houlahan said.

    ]]>

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • In mid-January 2026, Microsoft Defender Experts identified a devious way that cybercriminals are tricking people into giving away…

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Golden Dome’s official projected price tag just jumped $10 billion to $185 billion. Experts say the real cost is likely to be far, far more.

    Gen. Michael Guetlein, the Space Force officer in charge of the sprawling missile defense project, said Tuesday that it was no longer expected to cost $175 billion, the number given by President Trump when he announced the project last May.

    “We were asked to procure some additional space capabilities,” Guetlein told attendees at the McAleese Defense Programs Conference. “So, we are at $185 billion for the objective architecture, which delivers way out into the 2035 timeframe.”

    Experts told Defense One it’s most likely going to exceed that figure. Soon after the project was announced, the Congressional Budget Office predicted  anywhere from $542 billion to $831 billion over 20 years. In September, an American Enterprise Institute report said the highest-end architecture could mount to $3.6 trillion.

    But Guetlein said he was confident in the new figure. 

    “There's been numerous cost estimates out there in excess of a trillion dollars. I would say the difference between what they are estimating and what we are building is they're not estimating what I'm building,” he said. “We are changing that equation for Golden Dome, simplifying it, if you will, just aggregating it, if you will, to bring down that cost equation and not exceed that $185 billion that the President has committed.”

    Todd Harrison, a senior fellow at AEI who has researched Golden Dome’s likely costs, said Guetlein’s $185 billion figure would likely only include a basic capability for space-based interceptors—which has been seen as the most expensive and ambitious part of the project. It’s also, he said, just the beginning of the expenses.

    “My understanding is that is just the near-term cost to acquire an initial level of capability. It's not the total acquisition cost, and it does not include long-term operation and replenishment costs,” Harrison said. “It also is a good indicator that space-based interceptors will be a relatively minor part of the architecture, if they even move out of the demonstration phase.”

    Last year, the Space Force awarded small contracts to companies to develop orbital interceptors and were soliciting proposals for space-based midcourse interceptors, too. Physicists have questioned the project’s use of boost-phase and mid-course space interceptors, claiming it’s impractical against modern missile threats.

    Given Guetlein’s budget estimate, it’s not clear how much space-based interceptors will play a role in the final architecture, said Victoria Samson, the Secure World Foundation’s chief director of space security and stability.

    “Really and truly, it's not going to be cheap, but the long pole in the tent in terms of cost is going to be the space-based interceptor layer,” Samson said. “That's going to be the one that's going to drive it up, depending how much they decide to go ahead with it.”

    Guetlein admitted that the space-based interceptors are a challenge for the program.

    “We have not had anything fail yet, we’ve had numerous successful tests that I can only go into in this environment,” Guetlein said. “If I was to predict where the biggest amount of risk is the space-based interceptor. And it's not the technology, it's the scalability and the affordability.”

    The Pentagon is casting a wide net when it comes to Golden Dome-related work. Early this year, the Missile Defense Agency made several announcements that a total of 2,440 applicants have been approved to compete for work totaling up to $151 billion out of an original pool of 2,463, leaving just 23 applicants out of the running.

    Guetlein said that Lockheed Martin, RTX, and Northrop Grumman are three prime contractors working with six other companies to build command and control capabilities, or C2, layer for Golden Dome.

    “Now, we have a team of nine building our command and control capability, which is really a glue layer that sits upon all these other services and agencies, C2 systems,” Guetlein said.

    While Trump’s January 2025 executive order establishing Golden Dome does not establish a due date for the project, a subsequent December 2025 executive order calls for “developing and demonstrating prototype next-generation missile defense technologies by 2028” leaving Guetlein a little more than two years to meet the president’s goals.

    “I do not have a 2028 mandate inside the executive order. However, the President did ask us to rapidly change the defensive equation of the nation as fast as we possibly can, and put a marker on there for the summer of 2028,” Guetlein said. “By the summer of 2028 I have to demonstrate the ability with operational capability deployed in the field to defend ourselves against those threats as identified in the executive order. That's what they have asked us to do.”

    ]]>

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Security chiefs watch short videos produced by Cybercrime Magazine

    Steve Morgan, Founder of Cybersecurity Ventures

    Sausalito, Calif. – Mar. 17, 2026

    Around a year ago, Cybersecurity Ventures asked AI “Why use YouTube for marketing?” and it replied “YouTube is a powerful marketing tool because of its vast user base, high engagement rates with video content, and ability to boost brand awareness, drive traffic, and build trust through educational and engaging content, all while leveraging the power of Google’s search engine.”

    Since then, Cybercrime Magazine has produced more than 30 “CISO DEMO” videos. Each video is an elevator pitch or short demo from a cybersecurity vendor presenting their company and/or products and services to the CISOs (chief information security officers), security leaders, decision-makers, and influencers who follow us on YouTube.

    The videos have been released on our award-winning Cybercrime Magazine YouTube Channel, which has more than 1.2 million subscribers and many more viewers globally. In 2025, YouTube’s CEO presented us with the coveted Gold Creator Award.



    To explain why we’re doing this, Adam Keown, CISO at Eastman, a Fortune 500 global specialty materials company with 13,000 employees in more than 100 countries, gives his elevator pitch on the new CISO DEMO videos:

     “There are many times where it’s early in the morning or even late at night that I’m looking at cybersecurity vendors. I’m reading articles. I am trying to find a demo on YouTube for them to give me a glimpse of what’s going on. I want to watch the CISO demo series because it gives me lots of information about a specific vendor or capability or even risk that I’m trying to address in a single bite size amount of time. That helps me narrow down two or three vendors to talk to versus having to speak to the tens of thousand cybersecurity vendors that are out there. Then it leads me to a point where I want a longer engagement with my team so that we can ask some of those tough questions that maybe aren’t answered in the demo. And that’s when we reach out, look for contact information in the video and say, how can we have a further discussion with one of these vendors?”

    If you’re sold on what this security chief has to say, then contact us to find out how we can produce a CISO DEMO for your company.

    Steve Morgan is founder of Cybersecurity Ventures and Editor-in-Chief at Cybercrime Magazine

    The post CISO DEMO: Cybersecurity Vendors Pitch Chief Information Security Officers On YouTube appeared first on Cybercrime Magazine.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶