• MuddyWater is now weaponizing a Russian malware-as-a-service (MaaS) platform to run a new operation dubbed “ChainShell”, blending Iranian state targeting with commercially developed cybercrime tooling. The assessment is based on a misconfigured command‑and‑control (C2) web server, 15 malware samples, and a previously undocumented JavaScript/Node.js payload named ChainShell. Investigators conclude that MuddyWater is running at least […]

    The post MuddyWater Uses Russian MaaS in New ChainShell Attack appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Juniper Networks has issued a critical security alert regarding a severe vulnerability in its Support Insights (JSI) Virtual Lightweight Collector (vLWC). Tracked as CVE-2026-33784, this default credential flaw carries a near-maximum CVSS v3.1 severity score of 9.8. If left unresolved, the vulnerability allows remote, unauthenticated attackers to seize complete control over affected network devices. The […]

    The post Juniper Networks Default Credential Vulnerability Allows Unauthorized Full Access appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Unknown threat actors have hijacked the update system for the Smart Slider 3 Pro plugin for WordPress and Joomla to push a poisoned version containing a backdoor. The incident impacts Smart Slider 3 Pro version 3.5.1.35 for WordPress, per WordPress security company Patchstack. Smart Slider 3 is a popular WordPress slider plugin with more than 800,000 active installations across its free and Pro 

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A newly discovered jailbreak technique named “sockpuppeting” successfully forces 11 leading artificial intelligence models, including ChatGPT, Claude, and Gemini, to bypass their safety guardrails. By exploiting a standard application programming interface (API) feature with a single line of code, attackers can trick these models into generating malicious outputs without requiring complex mathematical optimisation. When a […]

    The post ChatGPT, Claude, and Gemini Among 11 AI Models Vulnerable to One-Line Jailbreak appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A newly discovered supply chain attack is spreading the GlassWorm malware across multiple developer environments by abusing the OpenVSX extension marketplace. GlassWorm is not new. Researchers have tracked the campaign since March 2025, when attackers hid malicious payloads inside npm packages using invisible Unicode characters. Since then, the operation has expanded across GitHub repositories, npm […]

    The post GlassWorm Trojan Hits VS Code, Cursor, Windsurf via OpenVSX Extension appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • DesckVB RAT is emerging as a highly active and stealthy malware threat in 2026, leveraging layered obfuscation and fileless execution techniques to bypass traditional security defenses. The attack chain begins with a malicious JavaScript file that hides its true intent through complex encoding and code replication. This script copies its own logic into PowerShell and […]

    The post DesckVB RAT Uses Fileless .NET Loader to Evade Detection appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • AWS recently issued a critical security bulletin addressing severe vulnerabilities in its Research and Engineering Studio (RES). RES is an open-source web portal that allows administrators to create and manage secure cloud-based research environments. Security researchers identified three major flaws in the platform that could lead to remote code execution (RCE) and privilege escalation. If […]

    The post AWS Fixes Severe RCE, Privilege Escalation Flaws in Research and Engineering Studio appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • For years, WhatsApp required users to share their personal phone numbers to communicate. This is finally changing. To improve user privacy and mitigate risks like doxing or targeted spam, WhatsApp is rolling out a highly anticipated username feature. This update allows individuals to connect without exposing their phone numbers, offering a new layer of anonymity […]

    The post WhatsApp Adds Username Feature to Boost Privacy and Reduce Number Sharing appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The Central Intelligence Agency aims to integrate artificial intelligence-powered “coworkers” into analysts’ workflows in coming years, a top official said Thursday. 

    CIA Deputy Director Michael Ellis said these AI coworkers would be housed in agency analytics platforms to help humans with basic tasks.

    “It won’t do the thinking for our analysts, but it will help draft key judgments, edit for clarity and compare drafts against tradecraft standards,” Ellis said in a speech at a Special Competitive Studies Project event on AI and the intelligence community. The AI tools would help triage and flag trends for human analysts to review.

    And within a decade, Ellis said, the CIA will treat AI tools as an “autonomous mission partner” and officers will manage teams of AI agents in a hybrid model to increase the speed and scale of intelligence work.

    Last year, the agency had more than 300 AI projects, and, for the first time in its history, used AI used to generate an intelligence report, he said.

    Ellis' remarks provide a rare public glimpse into how the spy agency is integrating frontier AI systems into its day-to-day operations, and the expectation that they will soon become part of  officers’ workflows.

    The CIA primarily executes and coordinates human intelligence-gathering overseas, often undercover. Officers recruit and manage foreign assets to clandestinely gather intelligence in areas such as economics, terrorism, and cyber threats.

    Much of that work involves the use of technology, though some argue that advanced AI tools may reinvigorate old-school tradecraft techniques.

    But there have been benefits to technological investments. The agency recently elevated its Center for Cyber Intelligence into an entire mission center, a move that’s “paying dividends already by allowing us to deploy new tools to the field and gain more access to priority targets,” Ellis said. 

    “The battle of cybersecurity will be a battle of artificial intelligence,” and whoever best harnesses AI models will wield “enormous power,” he said. “Having a new mission center centered around cyber intelligence will put us on the path to secure the upper hand.”

    The agency also recently announced a new acquisition framework to better integrate technology.

    Ellis said the CIA doubled its technology-related foreign intelligence reporting, to track how foreign adversaries like China are using advanced AI and other technologies. Those intelligence products focus on technology use abroad and can include findings on areas like semiconductors, cloud computing, infrastructure, cybersecurity or R&D.

    Ellis did not mention Anthropic’s Project Glasswing, a consortium announced earlier this week meant to help secure critical software against AI-driven attacks. The project was fueled by a powerful, non-public Anthropic frontier model the company says has already uncovered thousands of vulnerabilities but could be weaponized in the wrong hands.

    The intelligence community and its industry suppliers are already examining and discussing how such a model may impact the future of cyber missions, Nextgov/FCW reported Wednesday.

    Earlier this year, Anthropic declined to ease restrictions that kept its tools from being used for domestic surveillance or fully autonomous weapons. That led the Defense Secretary Pete Hegseth to designate the company's products as a “supply chain risk” designation and President Trump to order that all federal agencies phase out their uses of Anthropic tools. The company has legally challenged the move. 

    Ellis did not single out Anthropic, but he cautioned that the CIA “cannot allow the whims of a single company” to constrain its use of AI and said the agency is looking to diversify across multiple vendors to preserve operational freedom.

    ]]>

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • To President Trump and his defense secretary, the herculean rescue of two downed airmen in hostile territory was further proof that the U.S. military has full control of the skies over Iran. 

    But the actual situation remains complicated and dangerous, according to former military officials and defense experts who said painting a simple picture overlooks the weapons that downed the F-15E—and that still hold vast swaths of airspace at risk. 

    On Easter Sunday, Trump said in a social media post that the daring recovery underscored that U.S. forces had “achieved overwhelming Air Dominance and Superiority over the Iranian skies.” The next day, Defense Secretary Pete Hegseth said much the same.

    “We control the skies. You see we flew for seven hours in daylight over Iran to get the first pilot, and we flew seven hours in the middle of the night to get the second and Iran did nothing about it,” Hegseth said Monday at a White House press conference.

    But airpower experts, including Joint Chiefs Chairman Gen. Dan Caine, have been more measured. At press conferences, the former F-16 pilot has declared that air superiority exists over only certain areas of Iran; on Wednesday, he acknowledged the ongoing dangers that aviators face. 

    "I've laid out the statistics, but it does not truly capture the nature of combat. This is gritty and unforgiving business," Caine said. "It's chaotic, it's hot, it's dark, it's unpredictable and there's always unknowns."

    Air superiority is defined in Air Force doctrine as “the control of the air by one force that permits the conduct of its operations at a given time and place” without severe enemy action that would result in mission failure. A higher level of control, air supremacy, is established when the “opposing force is incapable of effective interference,” but this “may be difficult to achieve in a peer or near-peer conflict.” A state of air superiority or supremacy may be limited to a certain time, location, or altitude. 

    “Control of the skies” and “air dominance,” on the other hand, have no formal meaning. 

    “I understand why people use it, but, from a doctrinal perspective, to say you ‘control the sky’ doesn't really say anything, because control of the air is a spectrum,” said Kelly Greico, a senior fellow at the Stimson Center. “When President Trump and Secretary Hegseth are using these terms, they're not necessarily using them the doctrinal way, the way that you see Gen. Caine using them.”

    Trump’s use of “air dominance” really “doesn't mean anything,” Greico said, and added it’s not a term used in the Air Force’s doctrine.

    Gaining the ability to operate in hostile airspace is not just the Air Force’s responsibility, but “one of the first priorities of the joint force,” according to service doctrine. While heavy bombers have flown missions over parts of Iran and rescue helicopters can buzz in low and slow to the ground, other areas such as the Strait of Hormuz remain closed to ships due to air threats.

    “I think that it's worth emphasizing that Air Force doctrine is clear: that air superiority is for the joint force,” Grieco said. “So, by that definition, we do not have air superiority near the Strait of Hormuz, because it's predominantly drones and missiles that are keeping the strait closed, and they’re keeping it closed to naval escort vessels.”

    After the F-15E was shot down, an A-10 Thunderbolt II and multiple rescue helicopters and cargo planes were lost in the recovery mission, Caine said during the White House presser. Since the start of Operation Epic Fury in late February, Iran has destroyed or damaged multiple U.S. aircraft such as an F-35 which was forced to make an emergency landing after being hit during a combat mission.

    Those mounting losses stand in contrast to the administration’s claims of total control of the Iranian skies, some former military officials say.

    “I am somewhat surprised by the continued losses we were taking this deep into the conflict,” said Jack Shanahan, a retired Air Force three-star general, who thought the U.S. should have “more air supremacy” by this point.

    But others said a state of air superiority or supremacy can exist even with heavy aircraft losses. 

    “Air supremacy doesn't mean that you're completely without risk,” a former military official said. “There are plenty of examples of how even with air supremacy and air superiority, you can still be challenged. I don't think you ever get to an environment where you're not completely without risk.”

    This is particularly true at lower altitudes. 

    “When you're down below 5,000 feet, air supremacy and superiority feels a lot different than when you're up at 25,000 and 30,000 feet,” they said.

    On Wednesday, Caine told reporters that 80 percent of Iran’s air defenses had been destroyed, but that anti-aircraft threats still persisted at lower altitudes. Trump had claimed days earlier that Iranian anti-aircraft and radar had been destroyed; that the F-15E was shot down by a shoulder-mounted, heat-seeking missile; and that other aircraft took small-arms fire. 

    Shanahan said the administration’s sweeping claims about air control have a parallel in its occasional reports about the number of targets struck in Iran. (More than 13,000, Caine said on Wednesday.) Neither is a direct measure of success, and may even be a distraction.

     “We get caught up in the number of targets struck,” Shanahan said. “It’s back to almost Vietnam-era days when we started looking at body counts, number of tonnage of bombs dropped, but not understanding, maybe, the adversary has a different theory of victory in mind than you do. And if the regime survives, that may be their number-one criterion for success, whereas ours has seemed to be a little bit all over the map over the past 30 days.”

    ]]>

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶