• Fortinet has issued a high-severity security advisory regarding a vulnerability in specific versions of its FortiOS operating system. The flaw, identified as CVE-2026-22153, could allow unauthorized attackers to bypass authentication mechanisms, potentially granting them access to critical network resources. The vulnerability is rooted in the fnbamd daemon, the component responsible for handling authentication requests within the Fortigate firewall. […]

    The post FortiOS Vulnerability Enables LDAP Authentication Bypass appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A sophisticated ransomware operation known as Cephalus has emerged as a significant cybersecurity threat since mid-2025, exploiting exposed Remote Desktop Protocol (RDP) services to breach organizations worldwide. Developed in the Go programming language, this malware represents a growing trend of financially motivated adversaries leveraging double-extortion tactics to maximize pressure on victims. Cephalus operators primarily gain […]

    The post Cephalus Ransomware Emerges as Go-Based Double-Extortion Threat Exploiting Exposed RDP Access appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • GitLab has released critical security updates for its Community Edition (CE) and Enterprise Edition (EE) to address multiple high-severity vulnerabilities. These patches, detailed in the release notes for versions 18.8.4, 18.7.4, and 18.6.6, resolve flaws that could allow attackers to steal access tokens, perform Denial of Service (DoS) attacks, or inject malicious scripts. Critical Security […]

    The post GitLab Patches Multiple Vulnerabilities Enabling DoS and Cross-Site Scripting Attacks appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A ransomware threat actor calling itself Coinbase Cartel has quickly become one to watch, not because it locks files, but because it often doesn’t. First seen in September 2025, the group claimed 14 victims in that single month and later appeared in Bitdefender’s Top 10 ransomware groups for both September and December 2025. Coinbase Cartel […]

    The post Coinbase Cartel Shifts to Data-Theft-First Tactics, Targeting High-Value Industries appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Microsoft’s February 2026 Patch Tuesday update has arrived with critical urgency, addressing 54 security vulnerabilities across its ecosystem. This month’s release is particularly severe due to the inclusion of six zero-day vulnerabilities that are currently being exploited in the wild. Security teams are urged to prioritize these updates immediately to prevent system compromise. The Six Actively Exploited Zero-Days The […]

    The post Microsoft Patch Tuesday February 2026 Fixes 54 Flaws, 6 Zero-Days Under Active Exploitation appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Nearly 200 more miles of the U.S. border with Mexico have been placed under Air Force supervision, enabling wider use of military force and heftier charges against people crossing illegally into the country. But experts wonder why the step is being taken as crossings plummet and heightened charges are thrown out by judges.

    Last June, Pentagon leaders announced that they would take charge of land along the final 250 miles of the Rio Grande, which had been administered by State Department employees on the International Boundary and Water Commission. Designated National Defense Area 3, the land was placed under the control of Joint Base San Antonio, which is operated by the Air Force. As with similar zones established last year, the NDA designation effectively turned the land into a military base that can be patrolled by troops. As well, trespassers are subject to misdemeanor charges related to illegally entering Defense Department property. 

    On Friday, Air Force leaders announced that they have militarized two new swaths of land along the Rio Grande. One adds about 40 miles to the existing NDA 3, extending the zone upriver to Roma, Texas. The other is a 150-mile stretch from Falcon Dam to Del Rio that has been dubbed NDA 6.

    A press release from the office of Air Force Secretary Troy Meink said that the moves were intended to “strengthen interagency coordination and bolster security operations along the U.S. southern border.” It said the Department of the Air Force and U.S. Northern Command “will coordinate closely to support operational requirements and ensure effective installation management” and that Joint Task Force Southern Border troops are tasked with “temporarily detaining trespassers until they are transferred to the appropriate law enforcement authorities.” 

    Last month, the military began launching the Seasats Lightfish, a long-endurance autonomous surface vessel, into its portion of the Rio Grande to watch for border crossings. Other assets deployed to the southern border include UH-72 Lakota helicopters, C-130 Hercules and C-17 Globemaster transports, Stryker armored vehicles, the destroyer Cole, and thousands of U.S. troops.

    Since April, the Trump administration has created NDAs in Arizona, California, New Mexico, and Texas as extensions of Army, Navy, Air Force, and Marine Corps bases. By July, they covered roughly one-third of the U.S.-Mexico border. 

    Defense experts have questioned the expansion of the newest Air Force-controlled border zones, especially as administration officials boast that crossings have sunk to record-low levels. There were roughly 444,000 southwest border crossings by land last year, down from 2.1 million in 2024, according to U.S. Customs and Border Protection data.

    “If you believe the administration's line that there's basically no more illegal immigration, it seems that the step is probably unnecessary. I can't really see a rationale for doing it,” said Jennifer Kavanagh, a senior fellow and director of military analysis at the Defense Priorities think tank. “The only reason to really do it is this continuing press to militarize Trump's foreign policy and Trump's approach to border security.”

    Since the creation of the first militarized border zones last year, dozens of cases against people accused of crossing into the NDAs were thrown out by federal judges. Some magistrates argued the government hadn’t established enough probable cause that migrants had willingly intended to cross onto Defense Department property; others criticized the placement of the warning signs.

    As well, the militarization of the lands mean some communities are “effectively cut off from access to public lands,”  the American Civil Liberties Union said in a September news release. The ACLU also warned that U.S. citizens may unexpectedly face federal trespassing charges as the NDAs grow. 

    “For immigrant communities, the stakes are especially high: crossing into an NDA now means risking federal trespassing charges in addition to immigration charges,” the ACLU said in the release. “U.S. citizens, too, may face prosecution if they enter poorly marked areas while traveling, hiking, hunting, or working near the border.”

    ]]>

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • As the Army’s Transformation-in-Contact brigades test and help develop new technology, they’re also shaping how soldiers will be trained to use it.

    At Fort Stewart, Georgia., soldiers in the 3rd Infantry Division are working on a pair of courses to certify soldiers to operate small unmanned aerial systems, part of servicewide effort to create doctrine around using drones throughout every formation. 

    “3rd ID, specifically, is developing ways to qualify their operators on the different systems, and we are sending feedback back through the proper channels to big Army, to work on developing an Army-wide qualification course,” Capt. William Langley, who leads the UAS and electronic warfare element in the 2nd Armored Brigade’s 6th Squadron, 8th Cavalry Regiment, told reporters Tuesday.

    Both the 1st and 2nd Armored Brigade Combat Teams are participating in TiC, with a special focus on integrating drones into tank units, said Capt. Brenden Shutt, the division’s innovation officer. 

    “The legacy UAS systems were focused on dedicated 15-series UAS operators, whereas now, we're leaning more toward training standard infantry and armor soldiers to be the UAS operators,” Shutt said.

    So far the division has been focusing on UAS classified in groups 1 and 2—that is, under 55 pounds. They’ve fielded more than 150 of them, Langley said, including the Anduril Ghost-X, Performance Drone Works C100, the Neros Archer, the Teal 2, and the AeroVironment Switchblade 600

    “We mainly use these in a hunter-killer format, so we use the recon assets to find the targets, and then Archers…to strike the target,” Langley said. 

    To qualify, soldiers start with about 40 hours of simulation training before ever touching the UAS itself. 

    “After that, we work with smaller [first-person view drones], and they have to hit some obstacle courses and hit some gates before they go to a larger FPV, where they then actually learn to fly them, and then put certain skills into practice and learn to integrate them into conventional armor/infantry tactics,” Langley said.

    And rather than picking out a handful of soldiers to be the designated UAS operators, 3rd ID wants everyone to be familiar with flying a drone, in the way they are all qualified on their rifles.

    “Previously, it was very much a select group of people who were tasked with leveraging this technology to deliver effect,” Shutt said. “Now, every single soldier, from a maintainer to an infantryman to a signal soldier who fixes the radios—all of them kind of have a baseline understanding of how drones work, and could, with the sim time, with a little bit of minimal field training, be able to deliver effects during an operational or training environment.”

    ]]>

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Microsoft today released updates to fix more than 50 security holes in its Windows operating systems and other software, including patches for a whopping six “zero-day” vulnerabilities that attackers are already exploiting in the wild.

    Zero-day #1 this month is CVE-2026-21510, a security feature bypass vulnerability in Windows Shell wherein a single click on a malicious link can quietly bypass Windows protections and run attacker-controlled content without warning or consent dialogs. CVE-2026-21510 affects all currently supported versions of Windows.

    The zero-day flaw CVE-2026-21513 is a security bypass bug targeting MSHTML, the proprietary engine of the default Web browser in Windows. CVE-2026-21514 is a related security feature bypass in Microsoft Word.

    The zero-day CVE-2026-21533 allows local attackers to elevate their user privileges to “SYSTEM” level access in Windows Remote Desktop Services. CVE-2026-21519 is a zero-day elevation of privilege flaw in the Desktop Window Manager (DWM), a key component of Windows that organizes windows on a user’s screen. Microsoft fixed a different zero-day in DWM just last month.

    The sixth zero-day is CVE-2026-21525, a potentially disruptive denial-of-service vulnerability in the Windows Remote Access Connection Manager, the service responsible for maintaining VPN connections to corporate networks.

    Chris Goettl at Ivanti reminds us Microsoft has issued several out-of-band security updates since January’s Patch Tuesday. On January 17, Microsoft pushed a fix that resolved a credential prompt failure when attempting remote desktop or remote application connections. On January 26, Microsoft patched a zero-day security feature bypass vulnerability (CVE-2026-21509) in Microsoft Office.

    Kev Breen at Immersive notes that this month’s Patch Tuesday includes several fixes for remote code execution vulnerabilities affecting GitHub Copilot and multiple integrated development environments (IDEs), including VS Code, Visual Studio, and JetBrains products. The relevant CVEs are CVE-2026-21516, CVE-2026-21523, and CVE-2026-21256.

    Breen said the AI vulnerabilities Microsoft patched this month stem from a command injection flaw that can be triggered through prompt injection, or tricking the AI agent into doing something it shouldn’t — like executing malicious code or commands.

    “Developers are high-value targets for threat actors, as they often have access to sensitive data such as API keys and secrets that function as keys to critical infrastructure, including privileged AWS or Azure API keys,” Breen said. “When organizations enable developers and automation pipelines to use LLMs and agentic AI, a malicious prompt can have significant impact. This does not mean organizations should stop using AI. It does mean developers should understand the risks, teams should clearly identify which systems and workflows have access to AI agents, and least-privilege principles should be applied to limit the blast radius if developer secrets are compromised.”

    The SANS Internet Storm Center has a clickable breakdown of each individual fix this month from Microsoft, indexed by severity and CVSS score. Enterprise Windows admins involved in testing patches before rolling them out should keep an eye on askwoody.com, which often has the skinny on wonky updates. Please don’t neglect to back up your data if it has been a while since you’ve done that, and feel free to sound off in the comments if you experience problems installing any of these fixes.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Test Data Management tools for 2026 ranked for QA and DevOps teams, comparing speed, self service, masking, CI/CD fit, and enterprise readiness.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The information technology (IT) workers associated with the Democratic People’s Republic of Korea (DPRK) are now applying to remote positions using real LinkedIn accounts of individuals they’re impersonating, marking a new escalation of the fraudulent scheme. “These profiles often have verified workplace emails and identity badges, which DPRK operatives hope will make their fraudulent

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶