-
A joint law enforcement operation has dismantled LeakBase, one of the world’s largest online forums for cybercriminals to buy and sell stolen data and cybercrime tools. The LeakBase forum, per the U.S. Department of Justice (DoJ), had over 142,000 members and more than 215,000 messages between members as of December 2025. Those attempting to access the forum’s website (“leakbase[.]la”) are now
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Cisco has issued critical software updates to address multiple vulnerabilities in the Catalyst SD-WAN Manager (formerly SD-WAN vManage) that could allow attackers to bypass authentication, elevate privileges to root, and execute arbitrary commands. The advisory (cisco-sa-sdwan-authbp-qwCX8D4v), originally published on February 25, 2026, was urgently updated on March 5, 2026, after Cisco confirmed active in-the-wild exploitation […]
The post Cisco Catalyst SD-WAN Flaws Expose Devices to Root Access, Threatening Network Security appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
The FBI, working alongside international law enforcement agencies, has successfully dismantled the notorious cybercriminal forum LeakBase. Dubbed “Operation Leak,” this coordinated global effort resulted in the seizure of the platform’s domains and its underlying infrastructure. LeakBase was a prominent online destination where cybercriminals gathered to buy, sell, and trade stolen databases, corporate data, and personal […]
The post Operation Leak: Authorities Dismantle LeakBase Forum, Secure User Data and IP Logs appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
A new phishing campaign impersonating LastPass support emails is targeting users to steal their vault passwords and account credentials. The phishing campaign uses fake email chains that appear to be forwarded internal messages about suspicious account activity. Attackers craft messages to make it appear that someone else is attempting unauthorized actions, such as exporting vault data, recovering full accounts, or registering new trusted […]
The post Cyberattack Alert: Hackers Impersonate LastPass Support to Steal Vault Passwords appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Microsoft, Europol, and industry partners have successfully dismantled the Tycoon 2FA Phishing-as-a-Service (PhaaS) platform. Operating since August 2023, this immense adversary-in-the-middle (AiTM) operation allowed cybercriminals to bypass multi-factor authentication (MFA) and infiltrate over 96,000 distinct victims globally. This coordinated disruption marks a significant blow to the cybercriminal impersonation economy. Anatomy of the Tycoon 2FA Threat […]
The post Tycoon 2FA Phishing Operation Dismantled in Joint Raid by Microsoft and Europol appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
President Donald Trump’s nominee to lead the Cybersecurity and Infrastructure Security Agency privately told stakeholders he left his role in the U.S. Coast Guard to address concerns about his ties to shipbuilding work that led a Republican lawmaker to place a hold on his nomination late last year.
Sean Plankey told several peers this week that he wrapped up his time at the Coast Guard to show Sen. Rick Scott, R-Fla., that he is no longer involved in shipbuilding contract work and that there would be no reason for Scott’s office to place a hold on his confirmation in the Senate, according to two people familiar with the matter.
The people requested anonymity to discuss the specifics of private conversations concerning Plankey. He left the Coast Guard this week, where he had served in an advisory role for about the past year, Nextgov/FCW and Defense One first reported.
In a written statement, Plankey confirmed his intentions and said he “is focused on his CISA nomination” and “prepared to lead the nation’s cyber defense agency to protect the federal civilian networks and our nation’s critical infrastructure from physical and cyber attacks.”
He also said that he “led the unprecedented turnaround of the U.S. Coast Guard, a 14B/year, ~60K people organization in its worst readiness and leadership crisis since WW2 to deliver historic recapitalization and operational success.”
Scott put a hold on Plankey in December. It was unrelated to cybersecurity and involved the Department of Homeland Security scaling down a Coast Guard cutter contract with Eastern Shipbuilding Group, which is based in Florida, three people familiar with the matter previously said.
Nextgov/FCW has asked Scott’s office for comment.
In the latter part of Trump’s first term as president, Plankey served as principal deputy assistant secretary for the Energy Department’s Office of Cybersecurity, Energy Security and Emergency Response. Prior to that, he served as the director for maritime and Pacific cybersecurity policy at the National Security Council and also held leadership roles at U.S. Cyber Command.
Last week, CISA’s then-acting director Madhu Gottumukkala was moved to another role in DHS, while Nick Andersen — the previous executive assistant director for the cyber division — took his place helming the agency in an acting capacity. Gottumukkala was moved after he became the subject of several unflattering media reports in recent months.
Funding for DHS has been lapsed for around two weeks without a clear indication that lawmakers are ready to reconcile on a deal. The war in Iran, which broke out Saturday, is expected to test U.S. cyber defenses, which have been impacted in the last year by significant workforce cuts at CISA and other key cyber units across the government.
Plankey’s path to confirmation is still unclear. On Tuesday, Sen. Thom Tillis, R-N.C., threatened to slow all Senate proceedings if Homeland Security Secretary Kristi Noem didn’t soon address inquiries from his office regarding immigration enforcement operations and disaster response funding in his state.
“If I don’t get an answer that you’ve had a month to respond to, and the remaining ones … as of today, I’ll be informing leadership that I’m putting a hold on any en bloc nominations until I get a response, and in two weeks, if I don’t get a response, I’m going to deny quorum and markup in as many committees as I can until I get a response,” Tillis said in an oversight hearing of DHS activities.
]]>¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Institutional DeFi helps corporations improve treasury liquidity, speed cross-border settlements, and manage capital using secure permissioned blockchain protocols.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Startups often expose sensitive data during pitches and hiring. Learn when to use NDAs and simple workflows to close confidentiality gaps.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
A new phishing campaign is using stolen certificates from TrustConnect Software PTY LTD to sign malware. By impersonating updates for Zoom and Microsoft Teams, hackers install RMM tools to gain persistent, privileged access to networks
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Over the past several days, integrated air and missile defense forces from the United States, Israel, and key Gulf partners have performed exceptionally well against Iranian air, missile, and drone attacks.
This success was not built overnight. It is the result of more than two decades of sustained operational, technical, and political investment in integrated air and missile defense architecture across the Middle East. It reflects the work of multiple administrations, close coordination with Israel, and deepening security partnerships with members of the Gulf Cooperation Council. It also reflects the leadership of commanders such as Gen. CQ Brown Jr. and Gen. David Goldfein—leaders with whom I worked closely to advance interoperability and integration during their tenures at U.S. Air Forces Central Command.
Strategic patience paid off. But success on the battlefield has exposed a strategic vulnerability Washington can no longer ignore: America’s interceptor inventory problem.
In 2016, speaking in Abu Dhabi as assistant U.S. secretary of State, I argued that missile defense cooperation in the Middle East was not simply about deploying hardware. It was about building a regional security architecture: linking sensors, sharing early-warning data, improving command and control, and—critically—building political trust among partners with long histories of limited military integration.
That vision has matured. Today, U.S., Israeli, Emirati, Qatari, and Saudi air and missile defense systems operate in increasingly coordinated and interoperable ways. Patriot systems counter lower-altitude threats, THAAD provides upper-tier coverage, and SM-3 interceptors engage ballistic missiles in space. Together, these layered defenses complicate adversary targeting and improve survivability.
Recent days demonstrate that this approach works. The scale and sophistication of Iran’s retaliation were substantial. The defenses held.
The lesson is clear: integrated architectures outperform isolated systems.
This is the same principle I emphasized in a recent article on what it will take to make initiatives such as “Golden Dome” credible and sustainable. Missile defense is not a standalone shield. It is a system-of-systems—one that depends as much on interoperability, industrial capacity, and political alignment as it does on individual interceptors.
Inventory crisis
Yet operational success has come at a cost.
Intercepting large salvos burns through munitions at an alarming rate. And the United States is now drawing from the same limited stockpiles to support:
•Ongoing commitments in the Middle East.
•Deterrence and defense requirements in Korea and Guam.
•NATO reassurance efforts.
•And potential contingencies involving China.
As the Wall Street Journal recently reported, maintaining adequate stocks of THAAD, Patriot, and SM-3 interceptors is becoming a mounting concern for the Pentagon.
This should not surprise anyone.
When I served as a professional staff member on the House Armed Services Committee in 2007, responsible for the missile defense account, interceptor inventories were already falling short of operational needs. Congress acknowledged then that missile threats existed and that near-term defenses were required. A then-recent Joint Capabilities Mix study concluded the United States needed roughly twice as many SM-3 and THAAD interceptors just to meet the minimum requirements identified by regional combatant commanders. Those concerns were acknowledged—but ultimately set aside. Nearly two decades later, after repeated warnings and multiple crises, the gap Congress identified has not been closed—it has grown.
Production lines were sized for peacetime assumptions. Budget tradeoffs prioritized other weapons.
For years, the United States optimized for efficiency. We are now living in an era that demands resilience.
The China factor
The Middle East fight is not the most stressing scenario the United States could face.
A major contingency in the Indo-Pacific — particularly one involving large ballistic and cruise missile salvos — would place unprecedented demands on interceptor inventories. China has invested heavily in missile forces designed to saturate and overwhelm defenses. Any serious planning scenario must assume extended engagements and high expenditure rates.
If the United States struggles to sustain inventories in a limited regional conflict, what would happen in a multi-theater crisis?
This is not an argument for panic. It is an argument for realism. Architecture alone is insufficient. Integration, innovation, and industrial capacity must move together. That logic applies here. The United States should:
1. Expand production of missile defense interceptors for systems like THAAD, Patriot, and SM-3.
2. Establish multi-year procurement authorities to stabilize demand signals for industry.
3. Work with allies and partners on co-production and co-financing arrangements.
4. Accelerate the integration of lower-cost intercept solutions and complementary capabilities such as directed energy where feasible.
5. Treat interceptor inventory as a strategic asset, not a budgetary afterthought.
Missile defense is no longer a niche capability. It is a core pillar of deterrence in multiple theaters.
None of this should diminish the extraordinary progress made over the past 15 years in missile defense cooperation with Israel and our GCC partners. Countless lives were saved in recent days because of that investment.
The political groundwork, the interoperability exercises, the data-sharing agreements, and the hard conversations about burden-sharing — they all mattered.
We are seeing the dividends now.
But strategy is not static. As I argued in an analysis of regional missile defense in the Middle East, the threat continues to adapt. Drones, cruise missiles, and maneuvering ballistic missiles are reshaping the offense-defense balance. Architecture must evolve. So must stockpiles.
Strategic patience built the system. Now Congress and the Pentagon must ensure we have the inventories to sustain it. Because the next crisis may not give us the luxury of time.
Frank A. Rose is president of Chevalier Strategic Advisors, a strategic advisory firm focused on the intersection of geopolitics and defense technology. `He previously served as U.S. Assistant Secretary of State for Arms Control, U.S. Deputy Assistant Secretary of State for Space and Defense Policy, a Professional Staff Member on the House Armed Services Committee, and as a Policy Advisor at the U.S. Defense Department.
]]>¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶


