• Google has rushed out a vital security patch for Chrome, fixing three flaws that could let attackers run malicious code on users’ devices. The Stable Channel update bumps versions to 145.0.7632.109/.110 for Windows and Mac, and 144.0.7559.109 for Linux. High-severity issues in PDFium, the engine that handles PDF files in Chrome and V8, the speedy […]

    The post Google Rushes Out Critical Chrome Update to Address Serious PDFium and V8 Vulnerabilities appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Hackers are actively exploiting a critical vulnerability in BeyondTrust’s remote support software to deploy the VShell backdoor and SparkRAT remote access trojan, enabling full compromise of exposed systems. The vulnerability, tracked as CVE-2026-1731, is being used in real-world attacks against multiple industries across the U.S., Europe, and Asia-Pacific. BeyondTrust is an identity and access management […]

    The post Hackers Exploit Critical BeyondTrust Vulnerability to Deploy VShell and SparkRAT appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A new phishing campaign exploiting Microsoft’s OAuth 2.0 Device Authorization Grant flow to gain unauthorized and persistent access to Microsoft 365 accounts. The sophisticated attack active since December 2025 specifically targets professionals and enterprises in North America, with over 44% of identified victims based in the United States. Sectors hit hardest include technology, manufacturing, and […]

    The post Ongoing Campaign Targets Microsoft 365 to Steal OAuth Tokens for Persistent Access appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Two former Google engineers and one of their husbands have been indicted in the U.S. for allegedly committing trade secret theft from the search giant and other tech firms and transferring the information to unauthorized locations, including Iran. Samaneh Ghandali, 41, and her husband Mohammadjavad Khosravi (aka Mohammad Khosravi), 40, along with her sister Soroor Ghandali, 32, have been accused

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • PromptSpy is a newly discovered Android malware family that abuses Google’s Gemini generative AI model to make real‑time decisions on how to manipulate the user interface and stay active on infected devices. PromptSpy’s AI‑assisted functionality is focused on persistence rather than initial infection or data theft. Instead of relying on hardcoded tap coordinates or fragile […]

    The post PromptSpy: First Android AI Malware Leverages Google’s Gemini for Decision-Making appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • How AI is reshaping MVP development, helping startups build faster, validate smarter, avoid overbuilding, manage tech debt, and embed security early.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • You’ve probably heard of Best Ranger or Best Sapper: Army competitions that test the skills of teams of infantrymen and combat engineers. This year, the service added Best Drone Warfighter.

    The inaugural battle kicked off Tuesday at the University of Alabama in Huntsville, bringing teams from across the active, Reserve, and National Guard components of the Army to test their skills and possibly win a slot on the service’s drone competition team.

    “At the end of the day, it's not about receiving trophies or awards—it is about ‘what lessons can we take from this to find out who the best operator is and how they became the best operator? What skills and resources and training allowed them to become the best operator?’” Col. Nicholas Ryan, who leads the unmanned aerial systems team for the Aviation Transformation Integration Directorate at Fort Rucker, Alabama, told reporters. “And who's doing some amazing innovation out there across the Army…that we can then take and scale across the entire Army?”

    The service is moving away from its previous drone operator model, which trained soldiers in its aviation branch to operate specific platforms. Instead, it’s likely that soldiers with additional training in operating UAS will be integrated into infantry, armor and other frontline units, where new doctrine will have them working alongside machine gunners, Abrams tanks, and howitzers.

    “As we proliferate drones, and we're seeing where they best fit into the formation, what we're going through right now is deciding who are the right people to operate these, and what level of training do they need?” Ryan said. “And this competition really helps pull that out. For this competition, we didn't specify what type of soldier—what branch, [military occupational specialty] came here to do this—it was just: ‘Send your best UAS operators’.”

    The three-day meet included two different lanes, plus a separate innovation competition where soldiers could submit white papers and custom drone builds, or demonstrate their piloting skills.

    The first lane is a race through an obstacle course flying a first-person viewer drone. The second is a hunter-killer scenario, where soldiers camouflaged themselves with paint, dragged a weighted sled and did an overhead water-can press (events similar to the service’s physical-fitness test), then had a half-hour to identify and fire at five high-value targets. 

    “The first drone is the hunter drone, their reconnaissance drone, and it's looking at an array of targets—about a company-size element of targets—and trying to decide which one out of those are the most important targets. And then the other drone operator is carrying the killer drones, the smaller one-way lethal drones, but they're not kinetically lethal in this case. And then they have to use those to hit those targets.”

    Ryan said that while soldiers have been able to execute the movements and operate their drones properly, there have been communication breakdowns as they worked to get into position, identify targets, and fire on them.

    “That's an example of something we didn't anticipate, but it's absolutely standing out as that is something we as an Army need to do better on,” he said. “If we're going to proliferate these drones and want them to be more effective and lethal, we just need to improve on how our soldiers talk to each other to communicate when they're using them.” 

    Units were invited to bring their own small drones to the competition, with no strict rules about the brand, type or capabilities. That also meant they decided which and how much equipment to carry, something the Army is looking to standardize.

    “When we're sending soldiers out to carry this equipment as part of a squad or a platoon, and they're carrying it in their rucksack, what is too much?” Ryan said. “How many batteries? How many drones? What types of controllers?”

    Can they carry 20 killer drones, or does it make more sense to pack five? 

    “So kind of developing a standard packing list for a drone operator is one thing out of this competition that we haven't defined or said yet, but we're definitely seeing a range of solutions from soldiers,” he said.

    For next year’s competition, officials want to add more realistic scenarios, including the jamming threat that Ukrainian troops are seeing so often.

    “We already talked about flying in a congested environment with electronic warfare and  building those into the lane,” Ryan said. “And so that's how we're thinking about this: what should we be pushing as a competition that are the highest-priority things our units should be training on to get really good at for their job in the Army?”

    ]]>

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Future U.S. government responses in cyberspace will be “linked to adversary actions” and will involve coordination between the private sector and smaller governments, a top White House official said Thursday.

    The dynamic, which will be codified in a forthcoming national cyber strategy, is meant to make clear that foreign adversaries’ actions that target U.S. networks have consequences, according to Alexandra Seymour, who serves as the principal deputy assistant national cyber director for policy in the Office of the National Cyber Director.

    “To do this, we will need to coordinate closely with state and local governments and the private sector, including critical infrastructure owners and operators, who are often at the front lines of our cyberdefense,” Seymour said at CyberScoop’s CyberTalks event in Washington, D.C.

    Her remarks align with a broader desire in the Trump administration to take a more gloves-off approach to countering foreign rivals when they target U.S. computer networks. Recent Chinese intrusions into telecom systems and other critical infrastructure have motivated current and former officials to call for a more offensive approach to cyberspace matters over the last year.

    Seymour’s comments also align with details from reports last year indicating the private sector would have a degree of involvement in offensive cyber matters. It’s not entirely clear how coordination with industry would work. Private-sector participation in government-backed offensive cyberattacks is hotly debated because of the potential for escalation and blurred lines between state-sponsored and private activity.

    U.S. intelligence and hacking giants like the NSA, CIA and Cyber Command already have legal authority to launch offensive cyber operations that target foreign rivals, and they have done so more overtly in recent months.

    The national cyber strategy will be released “soon,” Seymour said, without providing an exact day. The release date for the strategy has been a mystery among industry officials for weeks now. It was originally expected in January.

    The Office of the National Cyber Director has been developing the short strategy for months now. The six-pillar framework would focus on taking steps to preempt foreign adversaries’ hacking capabilities, reform cybersecurity regulations to reduce compliance burdens, modernize federal networks, secure critical infrastructure, encourage superiority in emerging technologies and build a business-driven cyber talent pipeline.

    ]]>

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Cybersecurity researchers have discovered what they say is the first Android malware that abuses Gemini, Google’s generative artificial intelligence (AI) chatbot, as part of its execution flow and achieves persistence. The malware has been codenamed PromptSpy by ESET. The malware is equipped to capture lockscreen data, block uninstallation efforts, gather device information, take screenshots,

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • An international cybercrime operation against online scams has led to 651 arrests and recovered more than $4.3 million as part of an effort led by law enforcement agencies from 16 African countries. The initiative, codenamed Operation Red Card 2.0, took place between December 8, 2025 and January 30, 2026, according to INTERPOL. It targeted infrastructure and actors behind high-yield investment

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶