-
Cybersecurity researchers have disclosed details of a new botnet operation called SSHStalker that relies on the Internet Relay Chat (IRC) communication protocol for command-and-control (C2) purposes. “The toolset blends stealth helpers with legacy-era Linux exploitation: Alongside log cleaners (utmp/wtmp/lastlog tampering) and rootkit-class artifacts, the actor keeps a large back-catalog of
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
A newly exposed advanced persistent threat (APT) campaign, tracked as RU-APT-ChainReaver-L, is hijacking trusted file-hosting sites and long-standing GitHub accounts to deliver stealthy malware to Windows, macOS, and iOS users at scale. The campaign abuses popular mirror and file-distribution portals such as Mirrored. to and Mirrorace.org by modifying their code so that visitors looking for […]
The post RU-APT-ChainReaver-L Hijacks Trusted Sites and GitHub in Sweeping Cross-Platform Supply Chain Attack appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Ivanti has issued a high-security update for its Endpoint Manager (EPM) solution to address two significant vulnerabilities that could put organisational data at risk. The advisory, released on February 9, 2026, highlights a high-severity flaw that allows attackers to bypass authentication mechanisms entirely. Ivanti EPM is widely used by IT administrators to manage and secure […]
The post Ivanti Endpoint Manager Flaw Enables Remote Data Exposure appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Microsoft has issued an urgent security warning following the discovery of a zero-day vulnerability in the Windows Shell, now tracked as CVE-2026-21510. This critical flaw, which carries a high severity score of 8.8, is currently being exploited in the wild, forcing a race against time for IT administrators globally. Bypassing the Gatekeepers The vulnerability is classified as […]
The post Windows Shell Zero-Day Vulnerability Allows Attackers to Bypass Authentication appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Threat actors are abusing shareable ChatGPT and Grok conversations and pushing them with Google Search ads to trick macOS users into running Terminal commands that install the Atomic macOS Stealer (AMOS). This campaign shows how attackers now blend social engineering with trusted platforms to make malware delivery look “normal.” macOS infostealers have become a fast-growing […]
The post Hackers Exploit ChatGPT, Grok and Google Ads to Spread macOS AMOS Stealer appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Microsoft has released urgent security updates to address a zero-day vulnerability in the Windows Remote Access Connection Manager (RasMan). Assigned the identifier CVE-2026-21525, this flaw is currently being exploited in the wild, meaning attackers were using it to target systems before a fix was available. The vulnerability affects a wide range of Microsoft operating systems, including […]
The post Windows Remote Access Connection Manager Zero-Day Enables DoS Attacks appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
JOINT BASE PEARL HARBOR-HICKAM, Hawaii—Today’s Air Force leaders aren’t axing quite all of the previous administration’s efforts to prepare for a possible fight with China. Service leaders are continuing to implement Agile Combat Employment—among other things, a hub-and-spoke approach to basing—the service’s undersecretary said last week.
“We cannot just project force and operate out of our main operating bases,” Matthew Lohmeier told a small group of reporters here as he wrapped up a trip around the Pacific.
“There’s an alignment between all of our leaders and making sure we posture ourselves properly to project force here in the region,” he said. “In Washington, D.C., our attention, as far as resourcing goes, is pivoting to this theater, while we attend to all of the other operational efforts that we have around the globe. The strategic attention is here in this theater.”
The why, Lohmeier said, is deterrence.
“We don’t want conflict. We want peace. And there’s no better way to do that than to show that we’re strong as a country, and that we’ve got allies and partners that are increasing their strength as well, and that our relationship is better than it’s ever been before.”
This summer’s Exercise Resolute Pacific was the first time the ACE concept was exercised at scale, Lohmeier said, and the lessons from that are “a constant shaping influence in the future exercises that we plan to execute going forward.”
Lohmeier was confirmed for his position in late July. Air Force Secretary Troy Meink, who had just returned from a trip in the Indo-Pacific encouraged the new undersecretary to follow suit. So in late January and early February, Lohmeier visited U.S. Air Forces Pacific headquarters here, the Maui Space Surveillance Complex in Maui, Osan Air Base in Korea, and Yokota and Kadena air bases in Japan. Along the way, he met with Korean and Japanese military leaders.
In those conversations, Lohmeier said, he talked about “ways in which we can better integrate and use some of their existing capabilities that we don’t have in theater.”
“We know that we don’t always have all of the right answers… and we don’t want our allies to look exactly the same as we do in theater. We want them to also provide asymmetric advantage by bringing to the fight complementary capabilities.”
At the same press conference, Lt. Gen. Laura Lenderman, deputy commander of PACAF, said the command is focused on “setting the theater” with pre-positioned equipment, and ensuring that communication, command and control can be maintained in “a fight that reaches from Alaska to Japan.”
“We know that in a crisis, we won’t necessarily have the time or the capacity…for all of the airlift to flow in time. So having it there, out in the locations, in forward locations—as far forward as it can be—is a priority,” Lenderman said. “And once it gets into theater, moving it around the theater, then becomes a tactical air lift challenge.”
The importance of air mobility was clear in the U.S. strikes on Iran in June, Lohmeier said, and that operation may offer lessons for future missions in the Indo-Pacific.
“One of the parts, critical pieces, of that operation was Air Mobility Command—our ability to refuel. We committed tremendous amount of transport and refueling to ensure a successful operation there,” he said. “It was so utterly impressive what our mobility folks were able to bring to the fight. And now the question is: How do you pivot that into the Pacific, which is a much larger theater, and we’re talking about sustaining conflict?”
]]>¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Identified through data captured by our SSH honeypots over two months, this campaign represents a sophisticated blend of eras. It merges “old-school” Internet Relay Chat (IRC) botnet tactics from the late 2000s with modern, automated mass-compromise techniques. While the infrastructure resembles known threats, SSHStalker is a distinct operation focused on resilience and scale rather than […]
The post Legacy IRC Botnet Leverages Automated SSH Exploit Pipeline to Mass-Enroll Linux Hosts appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Deterring a Russian attack depends not just on NATO's military forces, but on proof that alliance members can bring new technology to the fight as quickly as Moscow, Adm. Pierre Vandier, who leads NATO’s Allied Transformation Command, said Tuesday in Washington.
Vandier, like other military leaders and operators, said Ukrainian forces have illustrated the value of not just buying new technology, but continuously reinventing it at the front lines.
But, he said, Russia has learned the same lesson and is also continuously adapting across areas like space-based imagery, mission command, and, of course, drones.
If Russia sees NATO as lagging, there’s a chance it could make a “miscalculation” similar to the one it made in 2022 when it launched its expanded war in Ukraine, Vandier said. “If transformation is too slow over the next decade, it's a risk to [NATO] not being deterrent.”
The Ukraine war has also revealed a fundamental challenge: the cumbersome nature of how NATO buys and builds weapons. Even the best weapons or drones lose their relevance far faster than slow-moving defense firms realize. “The obsolescence is nearly immediate,” he said. “You need to have the engineers, you need to have the technicians that are very close to the fibers to be able to find solutions” quickly.
Vandier knows NATO has a reputation for being a lumbering bureaucratic organization that can’t move quickly. But he said that image is no longer true, and pointed to the REPMUS 24 (Robotic Experimentation and Prototyping using Maritime Unmanned Systems) experiment in Portugal in 2024, in which NATO members together fielded more than 70 autonomous systems in just under three weeks. The version of the exercise that concluded last spring included more than 276 unmanned systems.
In the coming weeks and months, NATO will stage similar experiments in Romania and Latvia to test new counter-drone systems and methods for integrating those systems into a larger system of overlapping protective measures, sometimes called a “layered defense.”
NATO is also looking to apply artificial intelligence to key early warning tasks, such as watching satellite footage for changes in military activity, via a project called SINBAD with Planet Labs. As the alliance works to extend a series of exercises and activity to the Arctic, Allied Transformation Command will develop “a bunch of satellite services that will be focused on this particular area where we have been…shortfalls.”
Another project, launched last April, seeks to use large language models to bring down the time and effort required for advanced wargame planning.
“To make a large-scale scenario for a little exercise is 18 months of work for 60 people. And so at the end, when you arrive in the last three months, if you want to do something new, it's impossible. And so it's a very slow machine. We have the ambition to do the same in less than two months and with half of the people,” he said.
]]>¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
The North Korea-linked threat actor known as UNC1069 has been observed targeting the cryptocurrency sector to steal sensitive data from Windows and macOS systems with the ultimate goal of facilitating financial theft. “The intrusion relied on a social engineering scheme involving a compromised Telegram account, a fake Zoom meeting, a ClickFix infection vector, and reported usage of AI-generated
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶


