• The Computer Emergencies Response Team of Ukraine (CERT-UA) has disclosed details of a new campaign that has targeted governments and municipal healthcare institutions, mainly clinics and emergency hospitals, to deliver malware capable of stealing sensitive data from Chromium-based web browsers and WhatsApp. The activity, which was observed between March and April

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • More than 1,250 C2 servers were identified across 165 Russian infrastructure providers within the past 3 months. Infrastructure analytics and ISP mapping are exposing the hidden backbone of cyber threats operating inside Russian networks. By looking beyond single IPs or one-off indicators, analysts used Host Radar and HuntSQL to map more than 1,250 active command‑and‑control […]

    The post Russian Hosting Tied to 1,250+ C2 Servers Across 165 Providers appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A severe vulnerability in nginx-ui, a widely used open-source web interface for managing Nginx servers, is currently being actively exploited in the wild. Tracked as CVE-2026-33032 with a maximum CVSS base score of 9.8, this critical flaw allows remote attackers to completely take over servers without providing any passwords or credentials. According to cybersecurity researchers […]

    The post Nginx-UI Flaw Actively Exploited to Enable Full Server Takeover appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Splunk has disclosed a high-severity vulnerability affecting both its Enterprise and Cloud Platform environments. Tracked as CVE-2026-20204, this flaw allows attackers to execute arbitrary code remotely. With a CVSS score of 7.1, the vulnerability requires immediate attention from system administrators and security threat hunters. Vulnerability Details The security defect stems from the improper handling and […]

    The post Splunk Enterprise and Cloud Platform Exposed to Dangerous RCE Vulnerability appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A new large-scale cyber operation is exploiting Google’s Discovery feed to spread malicious notifications and scams through AI-generated content. Pushpaganda begins with threat actors creating around 113 fake domains filled with AI-written articles and clickbait headlines. These posts are crafted to appear in Google’s Discovery feed the stream of news and personalized content visible on […]

    The post AI Content Hijacks Google Discover to Deliver Malicious Alerts appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Google has released an urgent security update for its Chrome web browser to address 31 vulnerabilities, including five rated as critical. The stable channel has been updated to version 147.0.7727.101/102 for Windows and Mac, and 147.0.7727.101 for Linux. This update is currently rolling out globally over the coming days and weeks. Users are strongly advised […]

    The post Critical Chrome Flaws Allow Arbitrary Code Execution – Patch Immediately appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • NATO is studying how to use ground and air robots to replace human soldiers in assaults, something Ukraine has been doing for more than a year.  But that hasn’t stopped Russia’s continuous assault with its own, increasingly autonomous one-way attack drones.

    On Tuesday, Ukrainian President Volodymyr Zelensky made a social-media splash with a video describing a historic first from last July: a skirmish in which Russian troops surrendered to Ukrainian robots. 

    “The future is already on the front line—and Ukraine is building it,” Zelenskyy said in the video, adding that Ukrainian robotics companies “have already carried out more than 22,000 missions on the front in just three months.”

    Still, the Ukrainian president offered far fewer details than did Ukraine’s 3rd Assault Brigade in its own July 2025 post

    “Enemy fortifications were attacked” by first-person-view aerial drones and ground robots armed with explosives and made by Nazemnyi Robotychnyi Kompleks, the post said. “The next robot was already approaching the destroyed dugout when the enemy, in order to avoid being blown up, announced surrender. The occupiers who survived were taken to our lines by ‘birds’ [aerial drones] and, according to the regulations, taken prisoner.”

    “The operation was carried out without infantry and without losses on our side,” it said. “The occupiers surrendered to the ground robots of the Third Assault!”

    Ukraine’s ground-robot game advanced quickly in the following months, said Olena Kryzshanivska, a senior editor at the NATO Association of Canada who first relayed the news to English-language audiences.

    “Already…[by the] beginning of this year, we saw several documented cases when UGVs [unmanned ground vehicles] were used for strike missions. They were either delivering grenades [or] they were sometimes … attacking trenches, attacking Russian troops,” Kryzshanivska said in February during a podcast with CNAS adjunct senior fellow Sam Bendett.

    That sort of combined robotic fast maneuver is one of the ways Ukraine is forcing a reconsideration of decades of military doctrine, and NATO is taking notice. In February, its Allied Command Transformation announced the extension of a study on Force Lethality Enhancement to build out “a few practical force options and test them against realistic scenarios to see what works, and what it would take to use them on operations.”

    Another alliance effort to integrate ground robots, part of the multidomain Task Force X, is being led by Brig. Gen. Chris Gent, NATO deputy chief of staff transformation and integration. 

    Venture capitalists are taking note as well. Eric Brock of Ondas Capital told Defense One in January that his firm is investing in “ground robots that are tailored towards defense and homeland security but also critical infrastructure protection in certain places.”

    Challenges

    The biggest constraint in using first-person-view drones is that an operator can generally fly just one at a time. But the drone can fly itself to waypoints, loiter in the air, and reconnect after brief communications interruptions. 

    Ground robots, by contrast, need constant attention because navigation remains a technical challenge, John Hardie, of the Foundation for the Defense of Democracies, told reporters in February. And UGV operators must also stay in frequent contact with the operators of the aerial drones above.

    “My understanding is that they've experimented with autonomous navigation, but it’s especially difficult with [unmanned ground vehicles] for that to be reliable. So I don't think they're there yet,” Hardie said.

    Ukraine has also been hunting for alternatives to GPS, which is jammable. Since 2023, it has been experimenting with visual- and terrain-matching systems and other AI-powered ideas for long-range navigation, Hardie said.

    Russia, too, has carried out robotic operations in large volumes. But they’re limited to strikes with one-way attack drones like Shaheds and, occasionally evacuation of the wounded, not taking positions. 

    The Lancet drones produced by Russia’s ZALA company are guided on final approach to their targets by matching camera imagery to preloaded maps. It works well enough—because Russian forces place less of a premium on collateral damage or striking the right target. 

    For Ukrainians, the goal is greater autonomy, allowing one operator to preside over fleets of ground and air robots but with confidence that they will perform the mission assigned, hit the target that they’re supposed to hit and not simply whatever happens to be there when the drone finally arrives. It’s the same sort of complex multi-drone swarm capability that the Pentagon is seeking to develop.

    Ukrainian Air Force Capt. Max Maslii, deputy chief of staff for the 96th Anti-Aircraft Missile Brigade, described that goal as a departure from the way Russia operates “autonomous” drones like the Lancet, as isolated flying bombs. 

    Under the “new paradigm,” Maslii told Defense One, the drones would be able to “find the … more efficient way to accomplish this mission, together with such machines.” At that point, he said, operators wouldn’t be stuck piloting one drone at a time. They would work more like technicians managing a larger, more complex system. 

    “Our job will be … to produce a lot of drones, to put them in the proper place, to take care [of] the systems that manage those drones, and just to, you know, turn them on.”

    ]]>

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • COLORADO SPRINGS, Colo. — Air Force officials are pursuing a space-based system to detect airborne threats and pushing off additional funding for battlespace awareness aircraft in the 2027 budget, even as the service’s fleet of radar planes is in Iran’s sights.

    A base contract has been awarded for a new space-based airborne moving target communication capability, Air Force Secretary Troy Meink said Wednesday during his keynote address to the Space Symposium here. During a follow-up roundtable with reporters, the service leader said they’ve selected a pool of vendors and are progressing towards the first award. While he didn’t provide a specific timeline, Meink said it could be sooner than anticipated.

    “We expect that system to field very rapidly,” Meink said. “These are programs that are ready to execute and ready to execute rapidly, to be honest, as soon as the money is fed down to the system.”

    Meink’s support is backed by roughly $7 billion in funding for space-based Air Moving Target Indicator, or AMTI, satellites in the latest 2027 budget request. By comparison, the service’s E-7 Wedgetail radar plane was, once again, not funded. Yet military and defense experts told Defense One that the capability is seen as crucial to upgrade battlespace awareness in chaotic combat zones and there is an immediate need for it in conflict. 

    The Air Force’s fleet of the existing radar plane, the E-3 Sentry, is down to only a handful of serviceable aircraft after one was hit in a recent Iranian missile attack last month.

    The significant damage to the E-3 Airborne Early Earning and Control System aircraft, or AWACS, in Iran alarmed former military officials.

    “They're going after the tankers. They went after the E-3,” a former military official told Defense One. “The bad guys understand that if we blind the eyes and handicap the ability to project power, then we don't have to deal with the fighters.”

    The former official added they hope the lack of E-7 funding, and next-generation tanker capabilities is not permanent and the budget is “not a final version.”

    When asked if the losses in Iran underscored the need to fund the E-7 or other similar air capabilities, Meink backed the space-based system once again—while keeping Wedgetail funding open for discussion.

    “Some of those losses highlight the importance of a survivable platform right now,” Meink said. “The capability that the E-7 will provide is an important capability, and so we need to look at what we're going to do going forward. We're finalizing those decisions within the Pentagon about how we want to do that, and we'll roll that out to the Hill when it's appropriate.”

    Last year, Defense Secretary Pete Hegseth criticized the E-7’s survivability and made a push for space-based systems; the Air Force’s 2026 budget request cut funding for the program. Congress added back a little more than $1 billion into that year’s defense spending bill. Last month, the service awarded $2.3 billion in contracts to Boeing for Wedgetail development. 

    Meink expressed confidence in the space-based AMTI system and said the capability has already been demonstrated, but did not elaborate further.

    “Space-based AMTI, I think, will probably be far and away the most capable AMTI system ever built,” Meink said. “That doesn't mean it's going to do the entire job. There are many other systems that come into play, as you do data fusion to get the bigger picture.”

    ]]>

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • SOCKS5 protocol explained: anonymize traffic, boost security with encryption, bypass restrictions, and enable reliable data collection for business use.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • VPNs help secure remote server access by encrypting traffic, restricting entry to authorized users, and reducing exposure of critical systems to the internet.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶