• New research has exposed a search engine poisoning campaign that delivers a trojanized TestDisk installer, abuses a Microsoft-signed binary for DLL sideloading, and silently deploys the ScreenConnect remote monitoring and management (RMM) client for hands-on keyboard access. The rogue domain copies the branding of the real open-source data recovery tool, presenting itself as “The Ultimate […]

    The post SEO Poisoning Attack Uses Microsoft Binary to Install RMM Tool appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A major international law enforcement campaign has hit the DDoS-for-hire ecosystem, warning more than 75,000 suspected users and disrupting the infrastructure that helped power online attacks around the world. Backed by Europol, Operation PowerOFF brought together authorities from 21 countries in a coordinated action week on 13 April 2026. The operation resulted in four arrests, […]

    The post Operation PowerOFF Knocks Out 75,000 DDoS Attackers and Over 50 Service Domains appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Email-borne worms are driving a fresh wave of incidents against industrial control systems (ICS), even as overall malware activity on these networks appears to be slowly declining. New data from Q4 2025 shows that phishing-driven distribution of the XWorm backdoor has sharply shifted the risk landscape for operational technology (OT) environments worldwide. The share of […]

    The post Industrial Systems Hit by New Email-Worm Threat Wave appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • OpenAI has announced the expansion of its “Trusted Access for Cyber” program, granting worldwide security organizations access to its advanced GPT-5.4-Cyber model. The initiative operates on a foundational premise: cutting-edge cyber capabilities must reach network defenders on a broad scale while maintaining strict trust, validation, and safety safeguards. By sharing these tools with a diverse […]

    The post OpenAI Extends GPT-5.4-Cyber Access to Trusted Organizations Worldwide appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Microsoft has confirmed a critical known issue affecting Windows Server 2025 domain controllers after deploying the April 2026 cumulative update KB5082063 (OS Build 26100.32690), released on April 14, 2026. Affected domain controllers are entering repeated restart loops, and a separate but related issue is triggering BitLocker recovery prompts on enterprise-managed systems post-update. Reboot Loop Issue […]

    The post Microsoft Acknowledges Reboot Loop Issue on Windows Servers Following April Patches appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Researchers at Darktrace have identified ZionSiphon, a new malware targeting Israeli water treatment plants. Learn how this OT-focused…

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Google this week announced a new set of Play policy updates to strengthen user privacy and protect businesses against fraud, even as it revealed it blocked or removed over 8.3 billion ads globally and suspended 24.9 million accounts in 2025. The new policy updates relate to contact and location permissions in Android, allowing third-party apps to access the contact lists and a user’s location in

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A new, 400,000-acre testing and training facility aims to bring troops and defense firms together so they can innovate at the speed of modern warfare.

    On Friday, Georgia-based Second Bend Labs announced the public opening of the facility near Moody Air Force Base. It’s designed to appeal to two usually separate groups whose challenges can only be solved together. Soldiers need to test drones and counter-drone equipment against a competent adversary, and drone startups need to see if their stuff works. 

    That requires a new approach to the military test range: a site that civilians can easily access, unlike a military base, and that allows military drone testing, unlike a regular expanse of private acreage.

    Simply creating a place where a young company can fly medium-sized drones at the altitude of an A-10 Warthog and have soldiers shoot at it might seem obvious. It isn’t. It’s a problem that Deputy Defense Secretary Steve Feinberg discussed in his confirmation hearing as a major obstacle to modernization, and that Government Accountability Office and the Pentagon’s acquisition undersecretary have called burdensome to innovators. It’s also a problem that Ukraine has solved out of necessity, making the wartorn country a central testing site for drone and counter-drone warfare.

    “You need to train the way you fight in realistic mission environments,” said Stu Booker, a former Air Force combat controller who is now Second Bend’s president of unmanned and autonomous systems. “Our clients, whether they are testing new technology, developing new tactics, or sharpening existing skills, are doing it in conditions that reflect the complexity of the environments they will actually fight in.”

    The site offers diverse terrain and five miles of riverfront water for testing land and sea drones. It sits within Moody’s Corsair South Military Operations Area, which enables testing of low-altitude air support craft like the A-10 Warthog but also, increasingly, small and medium drones. 

    The facility has a range complex designed to Defense Department specifications, a 3,000-square-foot hangar, and an adjacent 20-foot launch pad. It also has “personnel in private guest home lodging, chef-supported meals, a 2,000-square-foot gym, and 3,000 square feet of team bonding spaces,” according to a press release for the lab. The idea is to create something akin to a modern co-working space or even a tech accelerator, allowing startups to collaborate and share gear. Think back to the Silicon Valley campuses of Google, Facebook (before Meta), and Twitter (before X) in the 2000s. 

    One thing the company is still working on is getting changes or waivers to local and federal regulations that limit its ability to replicate jamming and other electromagnetic warfare effects—the biggest factor driving evolution on the Ukrainian battlefield. 

    Second Bend Labs CEO Sam Kellett said he had reached operating agreements with the nearby Air Force base and the state of Florida. He also touted the willingness of federal officials to visit the site and discuss easing regulations—something the Defense Department has been pushing to increase the realism of testing and training.

    “Our first government group will come out at the end of this month to start planning that. So there's nothing set in stone that we can or can't do. Okay, if somebody says they want to do something, we go find a way to make it happen for them,” said Kellett.

    Why the need

    One senior enlisted military official said other testing and training sites don’t make it easy for soldiers and engineers to do realistic drone-on-drone warfare, which changes far faster than Cold War-era testing sites or weapon designs under the constraints of programs of record. 

    The senior enlisted official said, “The rise of drones and counter-drone systems has forced us to dramatically expand the scope and frequency of training and testing. It’s no longer enough to strictly focus on shooting, moving, communicating.” Modern warfare has created a need for other skills such as analyzing electronic warfare conditions, identifying difficult-to-detect drone threats, and modifying equipment. “That means more repetitions, more scenario-based training, and more live or realistic test environments where drones are actually flying,” they said.

    Practicing those skills requires more frequent contact with the people actually creating those technologies, people who aren’t easily found on military bases. 

    “My operators aren’t just users anymore, but they are also testers and evaluators. Every new piece of gear means building a mini test plan, running iterations, capturing data, and feeding that back to developers and higher headquarters,” they said.

    The facility quietly hosted the 123rd Air Force Special Tactics Squadron in March and other military elements in previous months.

    It has also hosted a handful of defense startups, younger companies that don’t have their own ranges and who aren’t accustomed to navigating the Defense Department’s complex procedures. These include Red Cat, a startup drone company; and a drone and counter-drone company called T3i.

    Sean Sorensen, T3i’s director of small unmanned aerial systems, said conventional test ranges are too “static.” 

    Today’s ranges lack “the ability to rapidly integrate and evaluate new systems—especially prototype solutions from startups,” Sorensen said in an email. “We need more interactive training and testing locations because drone and counter-drone threats evolve faster than traditional ranges and curricula can keep up.”

    CEO Kellett also leads a biometric wearables company called Aware Custom Biometric Wearables. He said 2BL is blending the two to offer “next-gen human performance technology in development that will measure brain activity and vitals in realtime,” as well as other new tech that startups might want to test against gear from other startups.

    Kellett said some of the early visitors to the site have also expressed interest in setting up production facilities nearby, in line with the growing Defense Department preference for a closer design, testing, and supply chain.

    ]]>

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A sophisticated macOS-focused cyber campaign orchestrated by the North Korean threat actor Sapphire Sleet, revealing a shift toward social engineering over traditional software exploitation. Instead of relying on vulnerabilities, the attackers trick users into executing malicious files disguised as legitimate software updates, effectively bypassing Apple’s built-in security protections. The campaign centers on a fake file […]

    The post Fake Zoom SDK Update Spreads Sapphire Sleet Malware in New macOS Attack Chain appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A proof-of-concept (PoC) exploit has been publicly released for a critical security flaw in Fortinet’s FortiSandbox. Tracked as CVE-2026-39808, this severe vulnerability allows an unauthenticated attacker to execute arbitrary commands on the underlying operating system with the highest level of privileges. Security researcher Samuel de Lucas recently published the exploit details on GitHub, highlighting the […]

    The post PoC Released for FortiSandbox Flaw Enabling Arbitrary Command Execution appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶