• Today’s “AI everywhere” reality is woven into everyday workflows across the enterprise, embedded in SaaS platforms, browsers, copilots, extensions, and a rapidly expanding universe of shadow tools that appear faster than security teams can track. Yet most organizations still rely on legacy controls that operate far away from where AI interactions actually occur. The result is a widening

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The elusive Iranian threat group known as Infy (aka Prince of Persia) has evolved its tactics as part of efforts to hide its tracks, even as it readied new command-and-control (C2) infrastructure coinciding with the end of the widespread internet blackout the regime imposed at the start of the month. “The threat actor stopped maintaining its C2 servers on January 8 for the first time since we

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • DragonForce is a ransomware group that emerged in late 2023 and has grown into a serious threat to businesses by combining data theft with file encryption. The group uses dual extortion: it steals sensitive data, encrypts systems, and then threatens to publish the stolen information on dark web leak sites if victims do not pay.​ […]

    The post DragonForce Ransomware Targets Critical Businesses to Exfiltrate Sensitive Data appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The Go team has officially released versions 1.25.7 and 1.24.13. These minor point releases address two distinct security vulnerabilities affecting the cmd/cgo command and the crypto/tls library. The updates are recommended for all users to prevent potential code smuggling and authentication bypass scenarios. Overview of the Vulnerability cmd/cgo: Code Smuggling via Comment Parsing The first vulnerability, tracked as CVE-2025-61732, affects the cmd/cgo tool, which enables […]

    The post Go 1.25.7 and Go 1.24.13 Released With Patches for Multiple Security Vulnerabilities appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A sophisticated social engineering campaign that weaponizes fake voicemail notifications to trick victims into installing remote access tools. The attack begins when victims receive communications directing them to compromised websites displaying convincing voicemail-themed landing pages. These pages use bank-related subdomains and minimal, professional design elements to appear legitimate. The interface suggests that a new voice […]

    The post Weaponized Voicemail Hack Allows Remote Access to Systems, Experts Warn appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Russian state-sponsored hackers, known as APT28 or Fancy Bear, have launched a new wave of cyberattacks targeting government and military organizations across Europe. This sophisticated espionage campaign, observed in late January 2026, targets the theft on secrets from maritime and transport agencies in countries such as Poland, Greece, and Ukraine. The attacks start with spear-phishing […]

    The post APT28 Hackers Exploit Microsoft Office Vulnerability to Target Government Agencies appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A new cyber-espionage threat group dubbed Amaranth-Dragon. Active throughout 2025, this group has launched highly targeted attacks against government and law enforcement agencies across Southeast Asia. Evidence links Amaranth-Dragon to APT-41, a notorious Chinese state-sponsored hacking group, due to shared tools and operational time zones (UTC+8) . The group creates attack campaigns based on local geopolitical events, […]

    The post Amaranth-Dragon Exploits WinRAR Vulnerability for Persistent Access to Victim Systems appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A new cyber campaign where attackers are hijacking web servers to redirect visitors to malicious websites . The campaign targets NGINX, a popular web server software, and specifically focuses on servers using the Baota (BT) management panel. The attackers, linked to previous “React2Shell” activity, modify the server’s configuration files to secretly intercept traffic . How […]

    The post Threat Actors Exploiting NGINX Servers to Redirect Web Traffic to Malicious Sites appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The Feb. 5 expiration of the last key U.S.-Russia arms-control agreement, combined with uncertainty about the U.S. commitment to defend European allies, has U.S. lawmakers and former officials worried about the prospects of nuclear proliferation and a new arms race.

    “We've seen agitation between this administration and many of our allies, and there is renewed interest, I think, in many countries, particularly in Europe, Japan, and South Korea, in having their own nuclear-deterrence systems quickly,” Sen. Jack Reed, D-R.I., said at Tuesday’s hearing of the Senate Armed Services Committee. 

    Reed asked others at the hearing whether they agreed.

    “I don't think you can understate the risk of proliferation,” replied Timothy Morrison, a former deputy assistant to the president for National Security Affairs and senior fellow at the Hudson Institute.

    At least some U.S. allies are considering developing nuclear weapons of their own, said Rose Gottemoeller, a former NATO deputy secretary general. 

    “I am very concerned about the potential for proliferation, so-called friendly proliferation. I do not think it will be helpful to stability and security,” Gottemoeller said. “There are many, I would say, debates and discussions that have surprised us among our NATO allies. Thursday will see the lapse of the 14-year-old New START agreement, which caps U.S. and Russian deployed strategic nuclear forces at 1,550 warheads and 700 delivery systems. 

    Gottemoeller urged the White House to renew the treaty for one year. Other witnesses, including Charles Richard, who as a Navy admiral led U.S. Strategic Command, did not, as it would constrain U.S. weapons development without necessarily stopping Russian violations.

    All witnesses agreed the treaty had its limitations. It did not address nuclear-development trends, such as Russia’s development of unmanned submarines  hypersonic missiles, and new tactical or lower-yield weapons that Russia has threatened to use against Ukraine. It also does not involve China, which has expressed skepticism about joining any such talks. 

    The collapse of New START was not unexpected, in part due to its limitations. “I think the New START Treaty will go out with a whimper,” said Morrison. 

    Less expected was the rise of tensions between the United States and Europe, including President Trump’s threats to seize territory belonging to NATO allies.

    On Jan. 25, Swedish Prime Minister Ulf Kristersson confirmed that the country had begun preliminary talks with France and the U.K., Europe’s two nuclear powers, about  potential collaboration on nuclear weapons. This follows remarks last March from Poland’s Prime Minister Donald Tusk that Poland must begin to explore its own options for developing nuclear weapons.

    Such developments would have been unthinkable a few years ago, under the U.S. commitment to the “nuclear umbrella”, a guarantee that the United States would use its nuclear weapons in retaliation to any Russian nuclear attack on a NATO nation. But according to one Swedish newspaper, “the umbrella is gone.”

    That may be premature. The United States has made no formal announcement that it is pulling back on its guarantee of nuclear protection in Europe. But as Gottemoeller pointed out, the White House has done little to reassure allies.

    “The Secretary of War has stated that the United States will continue to extend the nuclear deterrent to our allies. But the fact that we are not seeing the administration really articulate this policy at a high level—neither the National Security Strategy nor the National Defense Strategy addresses it—is leading allies to think about extending nuclear deterrence themselves,” she said.

    Sen. Angus King, I-Maine, pointed out during the hearing that “extended deterrence” appeared only once in the new National Security Strategy, which focuses much more on critiquing the European Union.

    The witnesses also shared concerns about China’s rapid nuclear-weapons development. By 2035, Pentagon officials have predicted, China will have up to 1,500 warheads to deploy on ICBMs, submarines, and bombers. 

    “I think we have never seen a buildup that is proceeding as comprehensively and at this speed,” said Morrison. “I think maybe it breaks some of our models.”

    In response, South Korea and other Asian nations are returned to long-abandoned discussions about building their own nukes. 

    “Our Asia-Pacific allies are certainly re-examining their own defense needs to include the possibility of them acquiring their own nuclear weapons,” said Richard. “I don't know of any proliferation that is actually occurring. We certainly have a longstanding history and have had successful extended deterrence commitments to both of those, and there are still options available to us.”

    None of the witnesses said that the development of a new “Golden Dome” missile shield offered perfect protection against a widening number of nuclear threats. But Richard was adamant that an advanced missile shield, including space-based interceptors, would still make an attack on the United States less likely by “introducing a lack of confidence on the part of your opponent that their attack is going to be successful, yet they will carry all the consequences of having started it.”

    Sen. Mark Kelly, D-Ariz., countered that he did not feel that was sufficient. “I am very concerned that we could throw a trillion dollars at a problem that ultimately we will find is unsolvable,” he said. “I really worry about the future for our kids and our grandkids, living in a world where we have multiple countries with potentially thousands and thousands of nuclear weapons.”

    ]]>

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A sophisticated strain of the DeskVB Remote Access Trojan (RAT) has been identified in the wild, showcasing a highly modular architecture and a complex, multi-stage infection chain. While the malware family itself is not entirely new, this latest iteration (v2.9.0.0) stands out for its operational stability and “plugin-based” design, which allow attackers to deploy capabilities […]

    The post New DesckVB RAT Unveiled with Multi-Stage Infection Chain and Plugin-Based Architecture appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶