-
A China-linked advanced persistent threat (APT) group has been attributed to a highly-targeted cyber espionage campaign in which the adversary poisoned Domain Name System (DNS) requests to deliver its signature MgBot backdoor in attacks targeting victims in Türkiye, China, and India. The activity, Kaspersky said, was observed between November 2022 and November 2024. It has been linked to a
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
For years, Google users have been stuck with the email addresses they created when they first signed up. If you picked an embarrassing username years ago or simply want a more professional handle, the only previous solution was to create a brand-new account and migrate your data manually. Now, Google is rolling out a major […]
The post Google Introduces Option to Change @gmail.com Email Addresses appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
How the Army’s most tech-forward units are practicing for war
A two-week exercise simulated island battles—and put some 75 new technologies to the test.
November 23, 2025 | Jennifer HladArmy wants to break ground for a microreactor on a US base by 2027
The service is pushing to make bases energy-independent, but safety and fuel-supply concerns persist.
October 14, 2025 | Thomas NovellyWhen China plays orbital hide-and-seek, Maui’s telescopes give the US an edge
In an interview, Space Force’s Saltzman reveals what’s next for the key sensor site.
September 19, 2025 | Jennifer HladUkraine’s milestone shows drones prevent defeat, but don’t secure victory
Drone innovation is speeding up, but war has not followed. Is this the future?
September 3, 2025 | Patrick TuckerIn the Pacific, Army leaders expect today’s fiction to be near-term reality
Service secretary envisions drone-and-soldier teams within just a few years.
July 25, 2025 | Jennifer HladThe Pentagon will host a ‘Top Gun’ school for Ukraine-style attack drones
The Defense Department is hoping for “American drone dominance”—but that’s easier said than done.
July 18, 2025 | Patrick TuckerArmy experiments with integrating attack drones into artillery formations
New division formation design includes HIMARS, howitzers, and one-way UAVs.
July 2, 2025 | Meghann MyersFor DOD, the future of large language models is smaller
Everyone loves big AI, but “maybe there is a smaller-parameter model that could run on a laptop.”
May 22, 2025 | Patrick TuckerWanted: counter-drone defenses that don't hurt surrounding neighborhoods
Base defenders need to collect and analyze much more data from many more sources, DIU director says.
May 5, 2025 | Patrick TuckerMarines say they’re ‘leading the way’ in battlefield autonomy
]]>
But unique technical challenges and tech wariness keep robot trucks on a short leash.
May 3, 2025 | Lauren C. Williams¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
A critical security flaw has been disclosed in LangChain Core that could be exploited by an attacker to steal sensitive secrets and even influence large language model (LLM) responses through prompt injection. LangChain Core (i.e., langchain-core) is a core Python package that’s part of the LangChain ecosystem, providing the core interfaces and model-agnostic abstractions for building
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
A critical security vulnerability in LangChain, one of the world’s most widely deployed AI frameworks, enables attackers to extract environment variable secrets and, through a serialization injection flaw, potentially achieve code execution. The vulnerability, identified as CVE-2025-68664, affects the core langchain-core library and was disclosed on December 25, 2024, by security researcher Yarden Porat from […]
The post Critical LangChain Vulnerability Allows Attackers to Steal Sensitive Secrets appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
After spending the past few weeks hands-on with ZeroThreat, it’s clear this platform represents a significant step forward in automated security testing. In an era where web applications, APIs, and microservices ship faster than ever, automated pentesting and DAST have become essential—not optional—for modern security programs in 2025. ZeroThreat delivers a unified platform that blends […]
The post ZeroThreat Review: The Next-Gen Automated Pentesting s DAST Platform appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
ThreatsDay Bulletin: Stealth Loaders, AI Chatbot Flaws AI Exploits, Docker Hack, and 15 More Stories

·
It’s getting harder to tell where normal tech ends and malicious intent begins. Attackers are no longer just breaking in — they’re blending in, hijacking everyday tools, trusted apps, and even AI assistants. What used to feel like clear-cut “hacker stories” now looks more like a mirror of the systems we all use. This week’s findings show a pattern: precision, patience, and persuasion. The¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
The encrypted vault backups stolen from the 2022 LastPass data breach have enabled bad actors to take advantage of weak master passwords to crack them open and drain cryptocurrency assets as recently as late 2025, according to new findings from TRM Labs. The blockchain intelligence firm said evidence points to the involvement of Russian cybercriminal actors in the activity, with one of the
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Space Force's intelligence ‘marketplace’ gets funds to expand
Military units post requests to TacSRT’s webpage, and industry competes to answer them.
April 10, 2025 | Audrey DeckerA closer look at the Chinese space company accused of helping the Houthis
The ostensibly private Chang Guang Satellite Technology emerged from and benefited from state funding.
May 7, 2025 | Matt Bruzzese and Peter W. SingerLockheed has cleared backlog of stored F-35s
The company had 72 jets stacked up due to software delays.
July 15, 2025 | Audrey DeckerMicrosoft ends use of China-based engineers to patch DOD systems
The move comes after a ProPublica report highlighted a Microsoft program that allows foreign engineers to indirectly interact with U.S. military systems through American “escort” intermediaries.
July 20, 2025 | David DiMolfettaAnduril becomes third US supplier of rocket motors, company says
Annual production will grow to 6,000 motors by the end of next year, they say.
August 5, 2025 | Audrey DeckerThe jets were late. Lockheed got on-time bonuses anyway
After nearly 20 years of F-35 production, the program continues to “overpromise and underdeliver,” GAO said.
September 3, 2025 | Audrey DeckerSilicon Valley in St. Louis?
With the National Geospatial-Intelligence Agency as its north star, a non-profit is working to get defense tech to put down roots in the Midwest.
October 1, 2025 | Lauren C. WilliamsDraft list of attendees for Hegseth acquisition-reform speech shows wide industry interest
The guest list for the Pentagon’s new policy roll-out reveals the rapidly changing face of defense tech.
November 5, 2025 | Patrick TuckerUnveiling acquisition overhaul, Hegseth tells industry to get with the program
One expert said the reforms would sweep away Cold War processes—and draw backlash from established primes.
November 7, 2025 | Lauren C. WilliamsCan partner nations help solve the Navy’s shipbuilding woes?
On a trip through the Pacific, the chief of naval operations sought ways to get more warships faster.
November 24, 2025 | Jennifer HladGargantuan Golden Dome contract vehicle clears 1,000-plus firms to vie for slices of $151 billion
]]>
One defense expert said it was one of the largest contract ceilings of all time.
December 3, 2025 | Thomas Novelly¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Fortinet on Wednesday said it observed “recent abuse” of a five-year-old security flaw in FortiOS SSL VPN in the wild under certain configurations. The vulnerability in question is CVE-2020-12812 (CVSS score: 5.2), an improper authentication vulnerability in SSL VPN in FortiOS that could allow a user to log in successfully without being prompted for the second factor of authentication if the
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶

