Reading view
Phishing Campaign Targets Executives With Phony Awards
A phishing campaign is targeting executives with phony offers for awards, according to researchers at Trustwave SpiderLabs. The attackers first dupe the victims into handing over their credentials, then use the ClickFix social engineering technique to trick them into installing malware.
Open Source Intelligence (OSINT): Explore GPS/GNSS Jamming Around the World
Welcome back, aspiring cyberwarriors!
In our previous article on anti-drone warfare, we discussed the topic of jamming. Based on observations from the Russian-Ukrainian war, jamming is not only a legitimate electronic warfare technique but also a highly effective one. One notable incident involved Ursula von der Leyenβs plane, which was reportedly affected by suspected Russian GPS jamming. Furthermore, there have been numerous instances where weapons made by either Russia or the U.S. missed their targets due to GPS jamming. To further explore this issue, I would like to introduce a tool that visualizes GPS/GNSS disruptions affecting aircraft worldwide β GPSJam.
What Is GPSJam?
GPSJam.org is a website that offers information about GPS interference experienced by aircraft around the world. It utilizes data from ADS-B Exchange, a crowd-sourced flight tracking platform, to create daily maps that show areas likely to experience GPS interference. These maps are based on aircraft reports regarding the accuracy of their navigation systems.
Itβs worth mentioning that GPSJam focuses not solely on GPS but also on GNSS in general. GNSS, or Global Navigation Satellite System, is a broad term that refers to any satellite navigation system capable of providing global coverage. This category includes various satellite-based positioning systems. Examples of GNSS include GPS (Global Positioning System) from the United States, GLONASS from Russia, Galileo from the European Union, and BeiDou from China.
How Does It Work?
Most aircraft are typically equipped with a device known as ADS-B Out, which stands for βAutomatic Dependent Surveillance-Broadcast.β This system allows a plane to share its location, speed, and altitude with air traffic control and other aircraft in the vicinity. Additionally, it serves as a vital navigation tool that assists planes in approaching for landing.
Flight professionals and enthusiasts use specialized equipment to receive this information and relay it to flight-tracking websites like ADS-B Exchange. These platforms then visualize the flight data on interactive maps.
When aircraft utilize ADS-B Out, they not only transmit their position but also indicate the accuracy of that position. According to the tool provider, βwhen there is interference with their GPS, the uncertainty goes up.β Therefore, greater interference leads to decreased accuracy. Conversely, when there is little or no interference, the accuracy improves. Essentially, ADS-B Exchange collects data on the accuracy of an aircraftβs position. The tool provider aggregates this information over a 24-hour period and organizes it into hexagon sections, assigning different colors to represent varying levels of accuracy.
Get Started with GPSJam
To begin investigating where Russians or others conduct jamming, we should simply open https://gpsjam.org/ in our browser.

One of the most valuable functions is filtering by a date. But keep in mind that historical data only goes back to 14 February 2022.

Additionally, there are further settings that enable filtering by location and traffic threshold.

GPSJam clearly demonstrates GPS/GNSS interference; however, itβs important to note that some output data on this website may not be solely due to jamming. GNSS interference could also result from hardware issues in aircraft, as well as from weather conditions.
Summary
Jamming represents the forefront of cyber warfare. Tools like GPSJam can help identify areas experiencing jamming without the need for additional hardware or security clearance.
If you are a dedicated OSINT investigator, consider exploring this tool, as it may enhance your work. Furthermore, if youβre new to the field of Open Source Intelligence, check out our OSINT training.
Link11 Identifies Five Cybersecurity Trends Set to Shape European Defense Strategies in 2026
Frankfurt am Main, Germany, December 16th, 2025, CyberNewsWire Link11, a European provider of web infrastructure security solutions, has released new insights outlining five key cybersecurity developments expected to influence how organizations across Europe prepare for and respond to threats in 2026. The findings are based on analysis of current threat activity, industry research, and insights [β¦]
The post Link11 Identifies Five Cybersecurity Trends Set to Shape European Defense Strategies in 2026 appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
.webp?ssl=1)
CISA Alerts on Apple WebKit Zero-Day Actively Used in Cyberattacks
The Cybersecurity and Infrastructure Security Agency (CISA) has added a critical zero-day vulnerability affecting multiple Apple products to its Known Exploited Vulnerabilities (KEV) catalog, signaling active exploitation in the wild.Β CVE-2025-43529Β represents a severe use-after-free vulnerability in WebKit, Appleβs rendering engine, that poses a significant risk to millions of users across iOS, iPadOS, macOS, and other [β¦]
The post CISA Alerts on Apple WebKit Zero-Day Actively Used in Cyberattacks appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

Russian Hackers Launch Attacks on Network Edge Devices in Western Critical Infrastructure
Russian state-sponsored hackers are intensifying attacks on misconfigured network edge devices across Western critical infrastructure, marking a significant tactical shift as 2025 comes to a close. According to new insights from Amazon Threat Intelligence, this campaign linked with high confidence to Russiaβs Main Intelligence Directorate (GRU) and the Sandworm/APT44/Seashell Blizzard cluster has deprioritized overt vulnerability [β¦]
The post Russian Hackers Launch Attacks on Network Edge Devices in Western Critical Infrastructure appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

SoundCloud Confirms Data Breach After Hackers Steal User Account Information
SoundCloud has publicly disclosed a significant data breach affecting approximately 20% of its user base. The music streaming platform confirmed that unauthorized actors gained access to limited user account information through a compromised ancillary service dashboard, prompting immediate containment measures and a comprehensive security response. The Incident Details The company discovered unauthorized activity within an [β¦]
The post SoundCloud Confirms Data Breach After Hackers Steal User Account Information appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

LLM-Driven Automation: A New Catalyst for Ransomware and RaaS Ecosystems
SentinelLABS has released a comprehensive assessment regarding the integration of Large Language Models (LLMs) into the ransomware ecosystem, concluding that while AI is not yet driving a fundamental transformation in tactics, it is significantly accelerating the operational lifecycle. The research indicates that measurable gains in speed, volume, and multilingual reach are reshaping the threat landscape, [β¦]
The post LLM-Driven Automation: A New Catalyst for Ransomware and RaaS Ecosystems appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

OpenShift GitOps Vulnerability Allows Attackers to Escalate Privileges to Root
Red Hat has disclosed a significant security flaw in OpenShift GitOps that could allow authenticated users to take complete control of a cluster. Assigned the identifierΒ CVE-2025-13888, this vulnerability allows namespace administrators to elevate their privileges beyond their intended scope, potentially gaining root access to the entire system. Category Information CVE ID CVE-2025-13888 Vendor Severity Important [β¦]
The post OpenShift GitOps Vulnerability Allows Attackers to Escalate Privileges to Root appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

Internet-Based Solar Panel Systems Vulnerable to Rapid Cyberattacks
The rapid global expansion of solar energy infrastructure has created an unprecedented cyber vulnerability. As millions of homes, businesses, and hospitals adopt renewable power sources supported by government initiatives like the U.S. Inflation Reduction Act and Europeβs Renewable Energy Directive. Security researchers have uncovered a critical flaw: many solar systems still rely on decades-old industrial [β¦]
The post Internet-Based Solar Panel Systems Vulnerable to Rapid Cyberattacks appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

Critical FortiGate SSO Vulnerability Actively Exploited in Real-World Attacks
Fortinetβs FortiGate appliances face immediate threat from two critical authentication bypass vulnerabilities being actively exploited in production environments. Fortinet released advisories for CVE-2025-59718 and CVE-2025-59719 on December 9, 2025, identifying critical flaws in FortiCloud SSO authentication mechanisms. These vulnerabilities enable unauthenticated attackers to bypass SSO login protections through crafted SAML messages when FortiCloud SSO is [β¦]
The post Critical FortiGate SSO Vulnerability Actively Exploited in Real-World Attacks appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

Microsoft Outlines Mitigation for React2Shell RCE Vulnerability in React Server Components
Microsoft has released comprehensive guidance on CVE-2025-55182, a critical pre-authentication remote code execution (RCE) vulnerability affecting React Server Components and the Next.js framework. Assigned a maximum CVSS score of 10.0, this vulnerability enables attackers to execute arbitrary code on vulnerable servers through a single malicious HTTP request, representing an unprecedented risk to modern React-based web [β¦]
The post Microsoft Outlines Mitigation for React2Shell RCE Vulnerability in React Server Components appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

GhostPairing Attack Exposes WhatsApp Accounts to Full Takeover via Phone Numbers
A novel WhatsApp account-takeover campaign dubbed βGhostPairing Attackβ has emerged, enabling threat actors to gain complete access to victim accounts without stealing passwords or conducting SIM swaps. Security researchers at Gen have uncovered the sophisticated social engineering scheme that exploits WhatsAppβs legitimate device pairing feature to compromise accounts across multiple countries silently. The GhostPairing Attack [β¦]
The post GhostPairing Attack Exposes WhatsApp Accounts to Full Takeover via Phone Numbers appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

Amazon: Russian GRU hackers favor misconfigured devices over vulnerabilities
Compromised IAM Credentials Power a Large AWS Crypto Mining Campaign

Rogue NuGet Package Poses as Tracer.Fody, Steals Cryptocurrency Wallet Data

Link11 Identifies Five Cybersecurity Trends Set to Shape European Defense Strategies in 2026
Link11 Identifies Five Cybersecurity Trends Set to Shape European Defense Strategies in 2026
Frankfurt am Main, Germany, 16th December 2025, CyberNewsWire
Link11 Identifies Five Cybersecurity Trends Set to Shape European Defense Strategies in 2026 on Latest Hacking News | Cyber Security News, Hacking Tools and Penetration Testing Courses.