• A newly discovered malicious Android application masquerading as a document reader was found on the Google Play Store, infecting users with the notorious Anatsa banking trojan. The app, which had already surpassed 10,000 downloads before its removal, highlights the ongoing threat of malware slipping through official app marketplaces. The malicious app was hosted on the […]

    The post Fake Document Reader App Hits 10K Downloads, Spreads Anatsa Malware appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The Trump administration is facing new calls to halt U.S. exports of advanced AI chips to China after the White House warned last week that Beijing is attempting to copy components of American AI systems to build similar models of its own.

    Americans for Responsible Innovation, an AI policy advocacy group, told White House Office of Science and Technology Policy Director Michael Kratsios that the administration should bar exports of advanced chips that could help China use U.S. AI systems to develop similar capabilities, according to a letter sent Monday that was first seen by Nextgov/FCW.

    It comes after OSTP last Thursday accused China and other foreign nations of engaging in “deliberate, industrial-scale campaigns to distill U.S. frontier AI systems,” and said the Trump administration will be taking steps to safeguard domestic AI systems. Distillation campaigns involve sending large volumes of queries to an AI model to train a competing version.

    The push comes as exports of advanced chips, such as Nvidia’s H200, remain in limbo. The Trump administration approved limited H200 sales earlier this year, but none have reached China. Commerce Secretary Howard Lutnick said last week that “we have not sold them chips as of yet” and that Beijing has not allowed domestic firms to purchase the hardware.

    The letter argues that China cannot effectively replicate capabilities derived from U.S. AI tools if it doesn’t have access to cutting-edge chips.

    “If we are serious about preventing adversaries from appropriating the capabilities of U.S. frontier models, we must be equally serious about restricting their access to the computational infrastructure that enables adversarial distillation, as well as the training and deployment of models built on data obtained through such malicious activity,” said the letter, which is signed by ARI executive director Eric Gastfriend.

    Nextgov/FCW has asked OSTP and the Commerce Department for comment.

    Hardware like Nvidia’s H200 underpins the computing power needed to train and run powerful AI models, including the large-scale querying required for distillation campaigns. Limiting access to those chips could slow China’s ability to develop and deploy competing models, though it likely wouldn’t halt those efforts altogether.

    “Nation-state level AI competition is very, very real, and has been going on for some time, and it continues to increase in its intensity and sophistication,” Peter Kant, CEO of Enabled Intelligence, said in an interview. Distillation efforts are “a whole new attack vector and domain that will only increase over time. I don’t see this [White House memo] as a one-off at all,” he added.

    Anthropic in February accused three Chinese-based AI companies — DeepSeek, Moonshot AI and MiniMax — of overwhelming its Claude model with 16 million exchanges from roughly 24,000 fraudulent accounts. 

    The same month, OpenAI sent a letter to members of the House China Select Committee that said it had seen evidence “indicative of ongoing attempts by DeepSeek to distill frontier models of OpenAI and other US frontier labs, including through new, obfuscated methods.”

    Last week’s White House warning about China-based distillation campaigns marks the latest escalation in the U.S.-China race for AI dominance. It comes as major American firms are deploying increasingly advanced models with cybersecurity capabilities that could pose national security risks if they fall into the wrong hands.

    A small group of unauthorized users has accessed Anthropic’s new Mythos AI model, which the company previously said has identified thousands of vulnerabilities and is powerful enough to enable dangerous cyberattacks, Bloomberg News reported last week.

    “This is just the early days,” Lonny Anderson, president of BlueVoyant Government Solutions and former chief technology officer of the NSA, told Nextgov/FCW. “This is only gonna get faster and it’s gonna get more dramatic.”

    ]]>

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The first in what could be many bid protests involving the Army’s MAPS contract has been filed at the Government Accountability Office.

    The 10-year, $50 billion Marketplace for the Acquisition of Professional Services vehicle has drawn industry complaints about a lack of transparency and how the Army will evaluate past performance for small business partners.

    Industry has also complained how slowly the Army has responded to thousands of questions potential bidders have had about the solicitation.

    MetroStar Systems filed its pre-award protest on Thursday at the Government Accountability Office, which is due to make its decision by Aug. 3. Attempts to reach MetroStar officials for comment were not successful.

    The Army has been trying to address industry concerns and said it expected answer all submitted questions by April 24.

    But when the Army posted a batch of answers that day, it said remaining questions would be answered by the end of this week.

    The Army has pushed back the due date for proposals from May 1 to May 8. But as one industry source said, “This is still a hot mess.”

    MetroStar's protest alone will not force the Army to delay the due date.

    However, the Army could decide to delay proposals as part of a corrective action it takes in response to protest. If it chooses to do that.

    ]]>

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • LayerX research finds 82 Chrome extensions collecting and selling user data, affecting at least 6.5 million users through disclosed but concerning practices.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • ShinyHunters has leaked data linked to Udemy, Zara, and 7-Eleven, with claims of exposed Salesforce records and cloud-based systems.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • LAS VEGAS—Users of the Pentagon’s enterprise-wide generative-AI platform now have access to Google Cloud’s latest and most advanced commercial AI model, Gemini 3.1 Pro, after several weeks of using the software in preview mode.

    The software is available to defense users through the GenAI.mil platform and will also be available for all Gemini for Government users across the federal government.

    “Gemini 3.1 Pro is Google’s most sophisticated model yet, and it really represents the frontier of American AI,” Pentagon Chief Data Officer Gavin Kliger said in an interview Thursday. “And so the department is working with our engineering team together to make sure we can have this capability available across the department.”

    It’s the latest upgrade for the platform, which launched in December with initial plans to integrate Gemini for Government, and later announced plans to incorporate AI models from OpenAI and xAI.

    Up to 3 million users have access to GenAI.mil, which is actively being used by more than 1.3 million of them, Kliger said. They are tapping the generative-AI software to automate tasks and workloads, streamline laborious processes, and disseminate and summarize data-heavy documentation in the department’s Impact Level 5 environments, which handle sensitive unclassified data.

    Kliger’s team offered several examples of how defense personnel are using generative AI shared by the department. One user at Navy Recruiting Command used Gemini to cut the time to build an automated database to manage personnel and accounts from several years to three months, saving an estimated 10 weeks of labor annually. And a lab director at the Defense Logistics Agency used generative AI to reduce the time to draft statements of work “from weeks to hours,” helping secure $1 million in last-minute funding for a laboratory modernization.

    Google Public Sector Chief Executive Officer Karen Dahut said the company’s decision to software-define its commercial cloud and bring it to the government market—as opposed to using physically separate data centers for government users—allows the company to accredit its commercial software faster than competitors. That speed-to-market advantage is most critical in defense missions, she said.

    “The key thing is that this [Gemini 3.1 Pro] is our most recent, newest, most capable model, period,” Dahut said on the sidelines of Google Cloud Next in Las Vegas. “So GenAI.mil users are getting it only eight weeks behind all the commercial customers,” who gained access in February.

    GenAI.mil, launched on Dec. 9, accumulated 500,000 users within a week and 1 million users within a month “with zero latency issues and zero downtime,” Dahut said.

    “No other cloud provider could have launched at that scale,” she said.

    Kliger said “one of the cool things about all the growth is that it’s been organic”: the department makes modern AI tools available to its employees but isn’t prescriptive about their use.

    Kliger also said increased collaboration with industry is critical in ensuring AI dominance over adversaries including China.“The work we do now is going to set the tone for the next decade, and these are super important technologies for the national defense, our national security,” Kliger said. “China, of course, has a really tight collaboration between the government and its private sector, effectively a controlling relationship. And so making sure we’re engaging with the frontier labs, working together closely like we are with Google, is incredibly important for the nation. Google has been a great partner with the department.”

    The Pentagon enters its vibe-coding era

    Over the past several weeks, users have tapped another Google Cloud product made available through GenAI.mil, Agent Designer, to vibe-code thousands of agentic AI agents. AI agents are autonomous systems that use large language models such as Gemini to perform tasks without human intervention at each turn.

    At the Box Federal Summit Thursday, Jacob Glassman, deputy assistant defense secretary for science and technology foundations in the research and engineering directorate, said users had already built more than 100,000 AI agents on GenAI.mil.

    These AI agents have authorizations to operate at IL5, which means they can be used for the department’s most sensitive unclassified data. They also don’t require much coding experience or training to use.

    Agent Designer “allows anyone, be they technical or not, to kind of use natural language to describe the system they want to set up,” Kliger said. “One of the big changes we’re seeing is moving from the old concept of the large language models being just a chat interface to being an actual platform where it can run tasks on its own.”

    ]]>

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Checkmarx has disclosed that its ongoing investigation tied to the supply chain security incident has revealed that a cybercriminal group published data related to the company on the dark web. “Based on current evidence, we believe this data originated from Checkmarx’s GitHub repository, and that access to that repository was facilitated through the initial supply chain attack of March 23, 2026,

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A newly identified malware campaign is leveraging advanced obfuscation techniques and multi-stage payload delivery to bypass traditional security defenses, according to recent analysis from Joe Sandbox. The attack begins with a highly targeted spear-phishing email sent to employees of the Punjab Safe Cities Authority (PSCA) and PPIC3 in Pakistan. The email impersonates an internal consultant […]

    The post New Malware Hides Behind Obfuscation and Staged Payloads appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Everything is dumb again. This week feels broken in a very familiar way. Old tricks are back. New tools are doing shady crap. Supply chains got hit. Fake help desks worked. Weird research showed how easy some attacks still are. Most of it feels like stuff we should have fixed years ago. Bad extensions. Stolen creds. Remote tools are getting abused. Malware hides in places people trust. Same

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The European Commission has proposed new measures that could force Google to share key search engine data with rival platforms under the Digital Markets Act, or DMA. The move is part of the EU’s wider push to reduce the market power of major technology companies and create fairer competition in the digital sector. In a […]

    The post EU Proposes Forcing Google to Share Search Data With Rivals Under DMA appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶