• The Office of the Director of National Intelligence, which has already shrunk its workforce by about one-quarter this year, will lose another 200 workers in coming weeks under an “ODNI 2.0” restructuring, the U.S. spy chief said Wednesday.

    The office had slightly less than 2,000 employees at the start of the Trump administration and now has around 1,500. The additional cut would bring the year's total reduction to about 35 percent.

    In a press release, Director of National Intelligence Tulsi Gabbard said the changes would "reduce ODNI by over 40%" by Sept. 30 and "save taxpayers over $700 million per year."

    Gabbard said ODNI, which was established after the September 11 attacks to lead the U.S. intelligence community, has “become bloated and inefficient, and the intelligence community is rife with abuse of power, unauthorized leaks of classified intelligence, and politicized weaponization of intelligence.” 

    She also released a ODNI 2.0 "fact sheet" that laid out plans to eliminate or consolidate programs and components that have been deemed to be redundant or overly partisan. The plan includes “refocusing functions within the Foreign Malign Influence Center, the National Counterproliferation and Biosecurity Center, and the Cyber Threat Intelligence Integration Center, and integrating core functions and expertise from those offices into ODNI’s Mission Integration (MI) and the National Intelligence Council (NIC).”

    The sheet said the External Research Council and its Strategic Futures Group will be shuttered because they “operated as hubs for injecting partisan priorities into intelligence products.”

    Even before Gabbard announced the 2.0 plan, some top GOP lawmakers had already pushed to slim ODNI’s operations. 

    Sen. Tom Cotton, R-Ark., who chairs the Senate Intelligence Committee, introduced legislation in June to cap the office's full-time workforce at 650 and restructure or terminate some of its internal entities. 

    In a statement on Wednesday, Cotton said the ODNI 2.0 restructuring will make the agency “a stronger and more effective national security tool for President Trump.”

    Gabbard has moved to crack down on dissent across the IC, including announcing on Tuesday that she was revoking the security clearances of 37 current and former U.S. officials, saying without evidence that they had politicized their roles. 

    In May, she fired two top officials on the National Intelligence Council in May after the intelligence body composed an assessment that contradicted Trump’s claims that Venezuelan president Nicolás Maduro was overseeing the activities of a violent gang operating in the United States.

    Last month, Gabbard issued a report that she said showed a contradiction between the IC's internal assessments and public statements about Russian interference. But in fact, the public statement matched the internal assessments.

    President Donald Trump and his Republican allies have long criticized the U.S. intelligence community, particularly after it concluded that Russia interfered in the 2016 presidential election on behalf of Trump. During his first term, he famously sided with Russia's Vladimir Putin against the IC at their 2018 meeting in Helsinki. He and allies have called the IC part of a "deep state" of entrenched bureaucrats working to undermine the administration’s priorities.

    Nextgov's Edward Graham contributed to this report.

    ]]>

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Cybersecurity researchers have uncovered an ongoing campaign where threat actors exploit the critical CVE-2024-36401 vulnerability in GeoServer, a geospatial database, to remotely execute code and monetize victims’ bandwidth. This remote code execution flaw, rated at a CVSS score of 9.8, enables attackers to deploy legitimate software development kits (SDKs) or modified applications that generate passive […]

    The post Threat Actors Exploiting Victims’ Machines for Bandwidth Monetization appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The Army’s fleet of UH-60 Black Hawk helicopters will be able to launch drones while in flight next year, thanks to a modernization contract with manufacturer Sikorsky announced Wednesday.

    The $43 million deal will include software and hardware upgrades that will allow Army air crews to simultaneously operate drones, part of a larger push toward so-called “launched effects,” one of the cornerstones of the Army Transformation Initiative

    “Sikorsky is ready to implement new technologies that will strengthen the combat-proven Black Hawk helicopter and give U.S. Army soldiers greater advantage in areas like the Indo-Pacific,” said Hamid Salim, Sikorsky’s vice president of  Army and Air Force Systems, said in a release.

    The contract also includes upgrades to the airframe itself.

    “With a more powerful engine, airframe enhancements and a main fuel upgrade, the aircraft will carry more payload at greater range, and future upgrades to flight controls to include autonomy and AI features that will assist pilots in tough conditions increasing mission safety and effectiveness,” according to the release.

    While launched effects are a key part of the Army’s modernization efforts, it’s an open question how big of a role the Black Hawk will play in the service’s vertical-lift capabilities, and for how long.

    The service in 2022 selected Bell’s V-280 tiltrotor to cover long-range assault missions currently done by the Black Hawk, while the service’s Future Vertical Lift program continues to work on a new airframe to cover that mission.

    The Army’s announcement in May that it would pull back on some of its major programs raised concern in Congress—particularly from Rep. Rosa DeLauro, D-Conn., whose district includes the Sikorsky plant—that the Black Hawk could be on the chopping block.

    “So I think that there's other things that are going to change on the battlefield,” Army Secretary Dan Driscoll said during congressional testimony in May. “I see Black Hawks are going to be with us for a while, but I do think we're going to have to adapt what we're doing. There just may be less Black Hawks.”

    The Army’s contract to buy more of the helicopters expires next year.

    “I'm not aware that we're making any adjustment to the Black Hawk contract,” Army Chief of Staff Gen. Randy George said during that hearing. “What I was basically describing to you is how I see the battlefield evolving, and how I would see us being able to do things … It's hard to predict, but we know we have autonomous systems that can do that.”

    ]]>

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Quishing, a powerful form of phishing that uses malicious hyperlinks contained in QR codes to expose user credentials and sensitive data, has surfaced in the ever-changing field of cybersecurity threats. Unlike traditional phishing, which relies on clickable links or deceptive emails, quishing exploits the inherent opacity of QR codes, which are unreadable to the human […]

    The post Hackers Weaponize QR Codes With Malicious Links to Steal Sensitive Data appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Air Force Chief Gen. David Allvin’s abrupt retirement wasn’t driven by Defense Secretary Pete Hegseth, but by growing frustration with the service’s priorities, according to multiple people familiar with the decision. 

    On Monday, Allvin announced his plans to retire after serving just two years as the service’s highest-ranking officer, typically a four-year job. No reason was given in the Air Force press release that contained his announcement. 

    The first months of the second Trump administration have seen an unprecedented purge of senior military officers. In February, Hegseth fired the chairman of the Joint Chiefs of Staff; Allvin’s vice chief, Gen. James Slife; the chief of naval operations; and the judge advocates general of the Army, Navy, and Air Force. Others removed later include the commandant of the U.S. Coast Guard, the commander of NSA/U.S. Cyber Command, and the Pentagon’s representative to the NATO Military Committee.

    But this time around, Hegseth did not play a role in the departure, according to an Air Force official.

    Rather, the decision stemmed from a desire to move away from plans for a service-wide reorganization, an effort former Air Force Secretary Frank Kendall had pushed. Ultimately, the effort, called “Reoptimizing for Great Power Competition,” was seen as something too tied to the last administration and a potential distraction while the service deals with bigger problems. 

    The numerous reorganization initiatives were “more distracting than they are helpful” since the Air Force is struggling with all-time-low readiness rates and manning problems, according to one person familiar with the discussions.

    For example, a hallmark of the reoptimization effort was to build “deployable combat wings” that would train and deploy together as one unit, while a separate garrison wing would handle core Air Force functions and maintain the military base.

    But the service doesn’t have enough manpower or resources to divide up the wings at every location, one former defense official said, and senior commanders were more concerned with the readiness of their aging equipment and dwindling fleet sizes. 

    Parts of the reorganization effort will likely get axed or altered once a new chief is picked. An Air Force spokesperson said that no final decisions have been made regarding the effort, and provided no timeline for a decision.

    Allvin was informed last week that he would be asked to retire and as a trade-off he would be allowed to announce his retirement, the Washington Post reported Tuesday. In a press release, the service said he will continue to serve until a replacement is confirmed by the Senate.

    A new chief has yet to be officially announced, but Gen. Kenneth Wilsbach is on the top of the list of contenders, Breaking Defense first reported and Defense One confirmed. Wilsbach served as head of Air Combat Command and commander of Pacific Air Forces. He stepped down from ACC on Aug. 11 and announced his intent to retire and hand over the reins to Gen. Adrian Spain.

    ]]>

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Adversaries are using AI-powered website builders to expedite the development of harmful infrastructure in a quickly changing threat landscape, hence reducing the entry barriers for malware distribution and credential phishing. Platforms like Lovable, which enable users to generate fully functional websites via natural language prompts, have been observed in numerous campaigns since early 2025. These […]

    The post AI Website Generators Repurposed by Adversaries for Malware Campaigns appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The Warlock ransomware group has intensified its operations by targeting unpatched on-premises Microsoft SharePoint servers, leveraging critical vulnerabilities to achieve remote code execution and initial network access. This campaign, observed in mid-2025, involves sending crafted HTTP POST requests to upload web shells, facilitating reconnaissance, privilege escalation, and credential theft. Initial Exploitation Attackers exploit flaws like […]

    The post Warlock Ransomware Exploits SharePoint Flaws for Initial Access and Credential Theft appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Commvault has released updates to address four security gaps that could be exploited to achieve remote code execution on susceptible instances. The list of vulnerabilities, identified in Commvault versions before 11.36.60, is as follows – CVE-2025-57788 (CVSS score: 6.9) – A vulnerability in a known login mechanism allows unauthenticated attackers to execute API calls without requiring user

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Threat actors have been observed leveraging the deceptive social engineering tactic known as ClickFix to deploy a versatile backdoor codenamed CORNFLAKE.V3. Google-owned Mandiant described the activity, which it tracks as UNC5518, as part of an access-as-a-service scheme that employs fake CAPTCHA pages as lures to trick users into providing initial access to their systems, which is then

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • An Malicious actors are using reliable internet resources, such as the Internet Archive, more frequently to disseminate clandestine malware components in a worrying increase in cyberthreats. This tactic exploits the inherent trustworthiness of such platforms, allowing attackers to bypass traditional security filters and deliver payloads under the guise of legitimate content. The latest incident highlights […]

    The post Threat Actors Abuse Internet Archive to Host Stealthy JScript Loader appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶