• Most phishing websites are little more than static copies of login pages for popular online destinations, and they are often quickly taken down by anti-abuse activists and security firms. But a stealthy new phishing-as-a-service offering lets customers sidestep both of these pitfalls: It uses cleverly disguised links to load the target brand’s real website, and then acts as a relay between the target and the legitimate site — forwarding the victim’s username, password and multi-factor authentication (MFA) code to the legitimate site and returning its responses.

    There are countless phishing kits that would-be scammers can use to get started, but successfully wielding them requires some modicum of skill in configuring servers, domain names, certificates, proxy services, and other repetitive tech drudgery. Enter Starkiller, a new phishing service that dynamically loads a live copy of the target login page and records everything the user types, proxying the data to the legitimate site and back to the victim.

    According to an analysis of Starkiller by the security firm Abnormal AI, the service lets customers select a brand to impersonate (e.g., Apple, Facebook, Google, Microsoft et. al.) and generates a deceptive URL that visually mimics the legitimate domain while routing traffic through the attacker’s infrastructure.

    For example, a phishing link targeting Microsoft customers appears as “login.microsoft.com@[malicious/shortened URL here].” The “@” sign in the link trick is an oldie but goodie, because everything before the “@” in a URL is considered username data, and the real landing page is what comes after the “@” sign. Here’s what it looks like in the target’s browser:

    Image: Abnormal AI. The actual malicious landing page is blurred out in this picture, but we can see it ends in .ru. The service also offers the ability to insert links from different URL-shortening services.

    Once Starkiller customers select the URL to be phished, the service spins up a Docker container running a headless Chrome browser instance that loads the real login page, Abnormal found.

    “The container then acts as a man-in-the-middle reverse proxy, forwarding the end user’s inputs to the legitimate site and returning the site’s responses,” Abnormal researchers Callie Baron and Piotr Wojtyla wrote in a blog post on Thursday. “Every keystroke, form submission, and session token passes through attacker-controlled infrastructure and is logged along the way.”

    Starkiller in effect offers cybercriminals real-time session monitoring, allowing them to live-stream the target’s screen as they interact with the phishing page, the researchers said.

    “The platform also includes keylogger capture for every keystroke, cookie and session token theft for direct account takeover, geo-tracking of targets, and automated Telegram alerts when new credentials come in,” they wrote. “Campaign analytics round out the operator experience with visit counts, conversion rates, and performance graphs—the same kind of metrics dashboard a legitimate SaaS [software-as-a-service] platform would offer.”

    Abnormal said the service also deftly intercepts and relays the victim’s MFA credentials, since the recipient who clicks the link is actually authenticating with the real site through a proxy, and any authentication tokens submitted are then forwarded to the legitimate service in real time.

    “The attacker captures the resulting session cookies and tokens, giving them authenticated access to the account,” the researchers wrote. “When attackers relay the entire authentication flow in real time, MFA protections can be effectively neutralized despite functioning exactly as designed.”

    The “URL Masker” feature of the Starkiller phishing service features options for configuring the malicious link. Image: Abnormal.

    Starkiller is just one of several cybercrime services offered by a threat group calling itself Jinkusu, which maintains an active user forum where customers can discuss techniques, request features and troubleshoot deployments. One a-la-carte feature will harvest email addresses and contact information from compromised sessions, and advises the data can be used to build target lists for follow-on phishing campaigns.

    This service strikes me as a remarkable evolution in phishing, and its apparent success is likely to be copied by other enterprising cybercriminals (assuming the service performs as well as it claims). After all, phishing users this way avoids the upfront costs and constant hassles associated with juggling multiple phishing domains, and it throws a wrench in traditional phishing detection methods like domain blocklisting and static page analysis.

    It also massively lowers the barrier to entry for novice cybercriminals, Abnormal researchers observed.

    “Starkiller represents a significant escalation in phishing infrastructure, reflecting a broader trend toward commoditized, enterprise-style cybercrime tooling,” their report concludes. “Combined with URL masking, session hijacking, and MFA bypass, it gives low-skill cybercriminals access to attack capabilities that were previously out of reach.”

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • MELBOURNE, Fla.—Brazilian aerospace giant Embraer is teaming up with Northrop Grumman to develop what could be the Air Force’s next tanker—and promises to spend a half-billion-dollars on infrastructure to make the KC-390 Millenium here.

    “We have…almost 3,000 direct employees here in Melbourne,” said Bosco da Costa Junior, CEO of Embraer Defense & Security. “If we have the right business case, Embraer is eager to invest over $500 million to a dedicated facility for KC-390. By the way, the platform today is already compliant with [the] Buy American Act” and could be a “winning value proposition” for U.S. and international markets.

    The companies are exploring options—and for Northrop, building on the company’s ongoing research and development in the area—to develop an autonomous boom that could be retrofitted for existing KC-390 aircraft. 

    “Key to this partnership is Northrop Grumman’s commitment to field a boom for the KC-390,” said Tim Walton, a senior fellow at Hudson Institute, told Defense One. “This commitment is bolstered by Northrop Grumman’s interest in also fielding fuel transfer systems for its other Next-Generation Air Refueling System offerings, an Northrop Grumman-designed low-observable aircraft and a Medium-sized Blended Wing Body design with JetZero.”

    Northrop’s refueling technology efforts are part of a “metered investment” that could be demonstrated in the “low, single-digit years,” said Tom Jones, who leads the company’s aeronautics division. 

    KC-390s are already equipped with a probe-and-drogue refueling system, which is used for helicopters and some Navy aircraft. But adding a boom would allow it to refuel more types of aircraft, specifically U.S. Air Force planes. 

    “If Northrop is able to integrate a boom, the KC-390 would be able to refuel a broad range of receptacle receiver aircraft,” from the U.S. Air Force and worldwide, such as the F-35, Walton said.

    KC-390s are already being flown by air forces in Brazil, Portugal, and Hungary with orders from Austria, the Czech Republic, Netherlands, Sweden, and South Korea, according to investor documents. It can seat about 80 troops, reconfigure for different missions—including stowing a folded Black Hawk—and does well with short runway takeoffs. And, for what it’s worth, the ride is better than a C-17.

    The Embraer-Northrop deal comes as the Trump administration asks defense companies to produce weapons faster, spend their own money on developing new tech, and make products domestically. 

    It also follows Embraer’s failed partnership with L3Harris to develop aerial refueling capability. That coupling dissolved in 2024. 

    Still, Embraer has been persistent in its push to become a major player in the U.S. defense industry, even amid increased buy and build in America rhetoric since President Donald Trump took office in 2025. Other foreign-based defense contractors have also made known their interest in doing business with and in the U.S. 

    Embraer’s decadeslong presence in the U.S. is primarily with its executive jets—but the company wants to keep expanding its global defense business, which grew about 10 percent in 2025, according to an earnings release

    Last year, Air Force Special Operations Command agreed to buy three of Embraer’s A-29 Super Tucano, which are produced in a specialized facility in Jacksonville, Fla. Also, the Air Force is currently sketching out its Next Generation Air-refueling System program. 

    Executives wouldn’t say whether the new partnership hinged on U.S. Air Force buy-in, insisting instead there is enough demand regardless.

    “Demand is there” for tankers globally, said Frederico Lemos, who leads Embraer’s international defense business. For example, nations with smaller air forces “want flexibility” and the ability to do “multiple missions” with a single aircraft, he said. 

    Editor’s note: This media trip was facilitated by Northrop Grumman and Embraer and included transportation via the KC-390.

    ]]>

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • As the Pentagon prepares for war with Iran, the White House hasn’t yet decided what the purpose of such an attack would be, two major U.S. newspapers reported since Wednesday. According to the Wall Street Journal, “The U.S. is ready to take action against Iran, but President Trump hasn’t decided whether to order strikes or—if he does order them—whether the aim would be to halt Iran’s already-battered nuclear program, wipe out its missile force or try to topple the regime.” 

    “Rarely in modern times has the United States prepared to conduct a major act of war with so little explanation and so little public debate,” David Sanger of the New York Times reports. “The president has given no speeches preparing the American public for a strike on a country of about 90 million people, and sought no approval from Congress. He has not explained why he has chosen this moment to confront Iran instead of, for example, North Korea, which in the years after Mr. Trump’s failed negotiations in the first term has expanded its nuclear arsenal to 60 or more warheads, by U.S. intelligence estimates, and is working to demonstrate they can reach the United States.” 

    Trump’s military planners have given him several paths for conflict, including “kill[ing] scores of Iranian political and military leaders, with the goal of overthrowing the government…as well as an air attack that would be limited to striking targets including nuclear and ballistic-missile facilities,” the Journal reports. “Both would involve a potentially weekslong operation.”

    Trump says he wants to prevent Iran from obtaining a nuclear weapon. “They can't have a nuclear weapon and they've been told that very strongly,” he said Thursday. But in this regard, “he is in something of a diplomatic box,” Sanger writes. “He faces pressure to show that any new agreement he reached goes well beyond the 2015 deal” reached by President Obama. “But if he signs an agreement that does not address the [Iranian regime’s] missiles, he will appear to have sold out Israel.” And if the deal he agrees to doesn’t stop the regime from shooting protesters, “he will have abandoned a generation of Iranians who see the United States as their last chance to open the country up.” And on top of all this, Israeli Prime Minister Benjamin Netanyahu wants Trump to help kill all of Iran’s current leaders once and for all, at least in part to cement Bibi and Trump’s legacy throughout the region. 

    One important question: Is a U.S. attack on Iran legal? At this point, it certainly doesn’t seem so. For example, Iran poses no imminent threat to the U.S., and article 1(8) of the Constitution says only Congress has the power to “declare war.” But just as its decision to circumvent Congress and recast the Defense Department as the “War Department,” the Trump White House seems content to view war as more of a vibe than a legitimate endeavor sanctioned by American law and the courts. That’s partly why U.S. allies in Europe are especially concerned these days, and why its neighbor to the north appears to be the most concerned of all. 

    The U.S. won’t have the use of British airbases for an attack on Iran, the Times reported Thursday. “In a rift with Washington, the prime minister is understood to have told Trump that the UK would not allow the use of British facilities at Diego Garcia and RAF Fairford in Gloucestershire, which is home to America’s fleet of heavy bombers in Europe.” 

    Coupled with unpopular polling numbers, the White House’s war vibes are leading some academics to use the phrase “gambling for resurrection”: risky actions undertaken to reverse a leader’s declining political fortunes. Diversionary wars are among the most high-profile examples of this concept in political science. 

    Trump’s TV ally and Fox pundit Sean Hannity is helping to rattle sabers. “The mullahs should be very worried,” Hannity said Wednesday night on his show. “And I do have a little advice for the radical leaders in Iran. You may want to get on that plane to Russia sooner than you think. Sooner than later. Now would be a good time.” 

    Trump “is closer to a major war in the Middle East than most Americans realize,” Barak Ravid of Axios reported Wednesday, adding that “sources noted it would likely be a joint U.S.-Israeli campaign that's much broader in scope—and more existential for the regime—than the Israeli-led 12-day war last June.”

    “With the attention of Congress and the public otherwise occupied, there is little public debate about what could be the most consequential U.S. military intervention in the Middle East in at least a decade,” Ravid warns. And “Such a war would have a dramatic influence on the entire region and major implications for the remaining three years of the Trump presidency.”

    “The B-2 bombers are incredible. I never understood the B-2 bomber. I’d watch. It’s a wing, and I’ve never quite understood that,” Trump said Thursday in a meandering speech at the first meeting of his Board of Peace. “I'd look at it, I'd say it was beautiful, but what does it do? It carries very big bombs. And, uh, it went into Iran and it totally decimated the nuclear—nuclear potential. And when it did, when it decimated that, uh, all of a sudden, we had peace in the Middle East.” As for what’s next, “you're going to be finding out over the next probably 10 days,” he said.  

    Many traditional U.S. allies have rejected his invitation to join the Board of Peace, including Austria, France, Germany, Greece, Ireland, Italy, New Zealand, Norway, Poland, Slovenia, Sweden, the UK, Ukraine, and the Vatican. So far, the board’s membership consists “of largely oppressive and authoritarian world leaders,” the Guardian reported Thursday. 

    Nations that have joined include Albania, Argentina, Armenia, Azerbaijan, Bahrain, Belarus, Bulgaria, Cambodia, Egypt, El Salvador, Hungary, Indonesia, Israel, Jordan, Kazakhstan, Kuwait, Kosovo, Mongolia, Morocco, Pakistan, Paraguay, Qatar, Saudi Arabia, Turkey, United Arab Emirates, Uzbekistan, and Vietnam. “So far none appear to have tossed in the $1 billion that would give them permanent status,” historian Heather Cox Richardson noted Thursday. 

    The only one who has announced any money for the organization is Trump himself, who declared Thursday the U.S. will put $10 billion into the group. However, Richardson adds, “since Congress is the only body that can legally appropriate money in our system, it’s unclear how he intends to do this.”

    Coverage continues below…


    Welcome to this Friday edition of The D Brief, a newsletter focused on developments affecting the future of U.S. national security, brought to you by Ben Watson with Bradley Peniston. It’s more important than ever to stay informed, so we’d like to take a moment to thank you for reading. Share your tips and feedback here. And if you’re not already subscribed, you can do that here. On this day in 1944, the U.S. and British militaries launched a weeklong campaign of bombing Nazi aircraft factories in central and southern Germany.

    New: The Supreme Court on Friday struck down Trump’s global tariffs, saying the president exceeded his authority by illegally circumventing Congress to carry out his wide-ranging economic campaign that affected many of America’s closest allies. Reuters described it as Trump’s “key economic and foreign policy tool” and “one that has alienated trading partners, affected financial markets and caused global economic uncertainty.” 

    The 6-3 decision will “force the government to unwind trade deals with other countries and potentially pay hefty refunds to importers,” the New York Times reports

    Additional reading:US growth falls sharply to 1.4% rate in fourth quarter,” the Financial Times reported Friday, noting that figure is “far below Wall Street expectations, as the record federal shutdown hit government spending.” 

    Amid preparations for war, Trump just ordered the U.S. government to release information on alleged aliens and UFOs, the president announced on social media Thursday. “Based on the tremendous interest shown, I will be directing the Secretary of War, and other relevant Departments and Agencies, to begin the process of identifying and releasing Government files related to alien and extraterrestrial life, unidentified aerial phenomena (UAP), and unidentified flying objects (UFOs), and any and all other information connected to these highly complex, but extremely interesting and important, matters,” he said in an evening post. 

    Panning out: “Trump’s push to focus on aliens comes at the beginning of a hectic midterm election year, with a heavy public focus on information disclosed in files related to the disgraced financier Jeffrey Epstein—many of which mention Trump by name—as well as the issue of affordability, which has weighed on his popularity ratings,” Bloomberg reports

    Trump’s face is now on the Department of Justice building after workers unveiled a large vertical banner Thursday in a gesture the Associated Press described as “a striking symbol of the erosion of the department’s tradition of independence from White House control.”  

    “Similar banners were installed at other federal buildings last year, including the Agriculture Department and Labor Department,” adding to “a string of efforts by the administration to emblazon the president’s name and face on everything from coins to national park passes,” the New York Times reports

    “Such displays are more often a feature of countries run by dictators, not democratically elected leaders,” the Times notes. AP reminds readers as well that “The Trump administration has opened investigations into a number of the president’s perceived enemies, amplifying concerns that the agency is being used to exact revenge on his political foes.”

    Trump also said Thursday that he wants to “test the law” and give himself the Congressional Medal of Honor for a visit to the Middle East in 2018. “I decided to go to Iraq and I flew to Iraq. I was extremely brave, in fact, so brave I wanted to give myself the Congressional Medal of Honor,” the president told a crowd Thursday at a rally in Georgia. “And I said, no, it's a little stretch if I gave myself one of them. But it's one of those things. Someday I'm going to try. I'm going to test the law.” He added, “Maybe I’ll win in court after everyone sues me.” 

    And lastly this week, the Army’s looking for the best drone pilots. You’ve probably heard of Best Ranger or Best Sapper: Army competitions that test the skills of teams of infantrymen and combat engineers. This year, the service added Best Drone Warfighter, Defense One’s Meghann Myers reported Thursday. 

    The inaugural battle kicked off Tuesday at the University of Alabama in Huntsville, bringing teams from across the active, Reserve, and National Guard components of the Army to test their skills and possibly win a slot on the service’s drone competition team. The three-day meet included two different lanes, plus a separate innovation competition where soldiers could submit white papers and custom drone builds, or demonstrate their piloting skills.

    Why now? The Army is moving away from its previous drone operator model, which trained soldiers in its aviation branch to operate specific platforms. Instead, it’s likely that soldiers with additional training in operating UAS will be integrated into infantry, armor and other frontline units, where new doctrine will have them working alongside machine gunners, Abrams tanks, and howitzers. Continue reading, here

    ]]>

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Threat actors have been observed exploiting a recently disclosed critical security flaw impacting BeyondTrust Remote Support (RS) and Privileged Remote Access (PRA) products to conduct a wide range of malicious actions, including deploying VShell and  The vulnerability, tracked as CVE-2026-1731 (CVSS score: 9.9), allows attackers to execute operating system commands in the context of the

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • PayPal has begun notifying a small number of customers about a significant cybersecurity incident in which their personally identifiable information (PII) was exposed for nearly six months due to a software error in its PayPal Working Capital (PPWC) loan application. The exposure, which affected business contact details combined with highly sensitive personal data, lasted from […]

    The post PayPal Data Breach – 6 Months of Users’ Data Leaked Online appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Federal authorities arrested three Silicon Valley engineers on Thursday, charging them with conspiring to steal trade secrets from Google and other tech giants. The case highlights growing insider threats in the chip design sector, where foreign adversaries could exploit sensitive data on processor security and cryptography. Samaneh Ghandali, 41, her husband Mohammadjavad Khosravi (aka Mohammad […]

    The post Silicon Valley Engineers Indicted for Alleged Trade Secret Theft From Google and Tech Firms appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A popular open-source automation server used by developers worldwide to build, test, and deploy software faces serious security risks from recent flaws. On February 18, 2026, two vulnerabilities were detailed in the core Jenkins software. The most critical issue is a stored cross-site scripting (XSS) vulnerability that could allow attackers to inject malicious scripts into […]

    The post Critical Jenkins Flaw Exposes Build Environments to XSS Attacks appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • In yet another software supply chain attack, the open-source, artificial intelligence (AI)-powered coding assistant Cline CLI was updated to stealthily install OpenClaw, a self-hosted autonomous AI agent that has become exceedingly popular in the past few months. “On February 17, 2026, at 3:26 AM PT, an unauthorized party used a compromised npm publish token to publish an update to Cline CLI

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • This week in cybersecurity from the editors at Cybercrime Magazine

    Sausalito, Calif. – Feb. 20, 2026

    Watch the YouTube video

    The award-winning Cybercrime Magazine YouTube Channel released its first Short last month and the video has more than 720,000 Views.

    In less than two minutes, our host Taylor Fox told the story:

    In the 1980s, a woman named Leslie Lynn Doucette and her network of teen hackers stole over $1.6 million without robbing a single bank. Online, she went by the alias ‘Kyrie’ and was later given a nickname that stuck forever: The Queen of The Hackers. Today, Doucette’s whereabouts are unknown, but the internet we know now? It was shaped, in part, by the Queen of the Hackers. [ more… ]

    Our trial is complete and our audience has spoken. You want Shorts and we’ll be producing a lot more of them. Stay tuned!

    The Cybercrime Magazine YouTube Channel has 1.2 million subscribers and many more viewers globally. In 2025, YouTube’s CEO presented us with a Gold Creator Award.

    Watch the Video



    Cybercrime Magazine is Page ONE for Cybersecurity. Go to any of our sections to read the latest:

    • SCAM. The latest schemes, frauds, and social engineering attacks being launched on consumers globally.
    • NEWS. Breaking coverage on cyberattacks and data breaches, and the most recent privacy and security stories.
    • HACK. Another organization gets hacked every day. We tell you who, what, where, when, and why.
    • VC. Cybersecurity venture capital deal flow with the latest investment activity from various sources around the world.
    • M&A. Cybersecurity mergers and acquisitions including big tech, pure cyber, product vendors and professional services.
    • BLOG. What’s happening at Cybercrime Magazine. Plus the stories that don’t make headlines (but maybe they should).
    • PRESS. Cybersecurity industry news and press releases in real time from the editors at Business Wire.
    • PODCAST. New episodes daily on the Cybercrime Magazine Podcast feature victims, law enforcement, vendors, and cybersecurity experts.
    • RADIO. Tune into WCYB Digital Radio at Cybercrime.Radio, the first and only round-the-clock internet radio station devoted to cybersecurity.

    Contact us to send story tips, feedback and suggestions, and for sponsorship opportunities and custom media productions.

    The post Cybercrime Magazine Releases Its First YouTube Short, More On The Way appeared first on Cybercrime Magazine.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Google has revealed that it blocked more than 1.75 million malicious or policy‑violating Android apps from reaching users through the Play Store in 2025, highlighting a major AI‑driven push to secure the mobile ecosystem against malware, fraud, and privacy abuse. More than 80,000 “bad” developer accounts were also banned, cutting off repeat offenders who tried […]

    The post Google Blocks 1.75 Million Malicious Apps from Entering Play Store appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶