#defense-security-failure

[ follow ]
fromSecuritymagazine
3 days ago

World Cloud Security Day: Breaking Down the State of the Cloud Cybersecurity and Physical Security

"World Cloud Security Day is a useful reminder to recognize how much cloud risk now comes down to everyday access decisions and overlooked misconfigurations," says James Maude, Field CTO at BeyondTrust.
Information security
from24/7 Wall St.
13 hours ago

Iran Wars Fuels RTX Growth Story as Defense Demand Rockets Higher

CEO Chris Calio emphasized the urgency of delivering critical products for national security, stating, 'We understand that our products are critical to national security. And I can tell you across the organization, we absolutely feel the responsibility and urgency to deliver more and to deliver it faster.'
Business
#defense-budget
Right-wing politics
fromFortune
2 days ago

Plowshares into swords: Trump's $1.5 trillion defense surge is the largest since World War II - and no one can explain how to pay for it | Fortune

President Trump's 2027 budget proposal seeks to increase defense funding to $1.5 trillion, marking one of the largest budget increases in U.S. history.
Right-wing politics
fromFortune
2 days ago

Plowshares into swords: Trump's $1.5 trillion defense surge is the largest since World War II - and no one can explain how to pay for it | Fortune

President Trump's 2027 budget proposal seeks to increase defense funding to $1.5 trillion, marking one of the largest budget increases in U.S. history.
World news
fromThe Washington Post
1 day ago

Chinese firms market Iran war intelligence 'exposing' U.S. forces

Chinese firms are leveraging AI and open-source data to track U.S. military movements, posing potential security risks amid the Iran conflict.
US politics
fromArs Technica
20 hours ago

CBP facility codes sure seem to have leaked via online flashcards

Immigration offenses and internal systems of CBP are detailed in flashcards, highlighting procedures and responsibilities of agents.
Intellectual property law
fromNextgov.com
2 days ago

Tech bills of the week: Limiting adversaries' access to US tech; and boosting cyber apprenticeships

New legislation aims to strengthen U.S. export controls on sensitive technologies to prevent adversaries from exploiting them for economic gain.
US Elections
fromAxios
1 day ago

"We're fighting wars": Trump bets his presidency on the Pentagon

Trump's budget prioritizes military spending, significantly cutting non-defense programs amid declining approval ratings and rising gas prices.
European startups
fromFortune
1 day ago

Trump sons to Gulf states: we've got some drone interception tech to sell you | Fortune

A drone company backed by Trump’s sons is selling to Gulf nations amid conflict with Iran, potentially profiting from the war initiated by their father.
Science
fromFast Company
2 days ago

The Navy brought a retired laser weapon back for a new drone fight

The U.S. Navy has revived a high-energy laser weapon for military exercises, enhancing capabilities against asymmetric threats.
#cybersecurity
fromTechCrunch
2 days ago
EU data protection

Europe's cyber agency blames hacking gangs for massive data breach and leak | TechCrunch

fromTechCrunch
1 day ago
Information security

After fighting malware for decades, this cybersecurity veteran is now hacking drones | TechCrunch

fromSilicon Canals
1 day ago
Information security

The man who discovered the ILOVEYOU virus is now fighting Russian drones using the same playbook - Silicon Canals

fromTNW | Eu
1 day ago
Information security

European Commission breached after hackers poisoned open-source security tool Trivy

EU data protection
fromTechCrunch
2 days ago

Europe's cyber agency blames hacking gangs for massive data breach and leak | TechCrunch

A cybercriminal group known as TeamPCP hacked the EU's executive body, stealing 92 gigabytes of data, including personal information.
Information security
fromTechCrunch
1 day ago

After fighting malware for decades, this cybersecurity veteran is now hacking drones | TechCrunch

Mikko Hyppönen emphasizes the invisible nature of cybersecurity work, comparing it to Tetris where successes vanish and failures accumulate.
Information security
fromWIRED
22 hours ago

The Hack That Exposed Syria's Sweeping Security Failures

Syrian government accounts on X were hacked, revealing significant vulnerabilities in the state's cybersecurity practices.
Privacy professionals
fromTechRepublic
6 days ago

Iran-Linked Hackers Breach FBI Director Kash Patel's Email, Leak Messages Online

An Iran-linked hacking group breached FBI Director Kash Patel's personal email, releasing non-sensitive information as a retaliatory cyber attack.
Information security
fromSilicon Canals
1 day ago

The man who discovered the ILOVEYOU virus is now fighting Russian drones using the same playbook - Silicon Canals

Mikko Hyppönen has transitioned from cybersecurity to anti-drone defense, focusing on systems for law enforcement and military clients.
Information security
fromTNW | Eu
1 day ago

European Commission breached after hackers poisoned open-source security tool Trivy

A major data breach at the European Commission was caused by TeamPCP exploiting a supply chain attack on the Trivy security tool.
#ai
Privacy technologies
fromComputerWeekly.com
3 days ago

Identity and AI: Questions of data security, trust and control | Computer Weekly

AI-driven identity solutions improve access control but raise compliance, privacy, and ethical concerns that organizations must address.
fromHarvard Business Review
6 days ago
Artificial intelligence

AI Agents Act a Lot Like Malware. Here's How to Contain the Risks.

An AI agent named MJ Rathbun published a blogpost attacking engineer Scott Shambaugh.
Privacy technologies
fromComputerWeekly.com
3 days ago

Identity and AI: Questions of data security, trust and control | Computer Weekly

AI-driven identity solutions improve access control but raise compliance, privacy, and ethical concerns that organizations must address.
#drones
London politics
fromwww.theguardian.com
4 days ago

Overwhelmed' Prevent at risk of missing threats as referrals rise, UK counter-terror chief says

Prevent scheme faces overwhelming referrals, risking identification of genuine threats due to increased volume and lack of triage system.
#data-integrity
fromComputerworld
5 days ago
Data science

IT lesson from the Iran war: AI makes your data problems so much worse

AI can exacerbate existing data issues in enterprises, as demonstrated by the US military's bombing due to outdated intelligence.
Information security
fromSecurityWeek
5 days ago

The Next Cybersecurity Crisis Isn't Breaches-It's Data You Can't Trust

Data integrity now encompasses data trust, emphasizing the importance of reliable data in AI-driven decision-making.
Data science
fromComputerworld
5 days ago

IT lesson from the Iran war: AI makes your data problems so much worse

AI can exacerbate existing data issues in enterprises, as demonstrated by the US military's bombing due to outdated intelligence.
Information security
fromSecurityWeek
5 days ago

The Next Cybersecurity Crisis Isn't Breaches-It's Data You Can't Trust

Data integrity now encompasses data trust, emphasizing the importance of reliable data in AI-driven decision-making.
fromThe Walrus
5 days ago

The Man Who Put AI at the Centre of America's War Machine | The Walrus

"War is terrible, war is terrible, war is terrible," he intones, holding my gaze and giving voice to a universal chorus.
DC food
SF politics
fromNextgov.com
6 days ago

New contract for background investigations raises concerns about scale and risk

DCSA is modernizing its Case Processing Operations Center to enhance background investigations and incorporate Continuous Vetting for national security.
Roam Research
fromThe Cipher Brief
5 days ago

The Chalk Mark Still Matters: Russian Espionage Handling in the Modern Era

Russian intelligence tradecraft has evolved in agent handling, incorporating advanced communication techniques and urban geography for signaling.
Information security
fromnews.bitcoin.com
4 hours ago

Deepmind's 'AI Agent Traps' Paper Maps How Hackers Could Weaponize AI Agents Against Users

Google Deepmind identifies six AI agent trap categories, with content injection success rates of 86% and calls for enhanced security measures by 2026.
#iran
World news
fromwww.mediaite.com
2 days ago

Former Trump NatSec Advisor Says President Probably in Panic Mode' After Two U.S. Jets Shot Down

Trump's credibility is undermined after Iran shot down U.S. military planes, contradicting his claims of air supremacy.
Privacy professionals
fromAxios
5 days ago

Cyber warfare starts to get personal in war between U.S., Israel and Iran

Iran-linked hackers are using data leaks and intimidation tactics against individuals to influence public perception during the current conflict.
World news
fromTNW | Me
5 days ago

Iran's IRGC names 18 US tech firms including Apple, Microsoft, Nvidia as military targets

The IRGC named 18 US tech firms as targets for retaliation against alleged roles in assassinations in Iran.
World news
fromEngadget
5 days ago

Iran threatens imminent attacks on US tech companies in the Middle East

The Islamic Revolutionary Guard Corps threatens to target major US tech companies in the Middle East, urging employees to evacuate for safety.
World news
fromwww.mediaite.com
2 days ago

Former Trump NatSec Advisor Says President Probably in Panic Mode' After Two U.S. Jets Shot Down

Trump's credibility is undermined after Iran shot down U.S. military planes, contradicting his claims of air supremacy.
Privacy professionals
fromAxios
5 days ago

Cyber warfare starts to get personal in war between U.S., Israel and Iran

Iran-linked hackers are using data leaks and intimidation tactics against individuals to influence public perception during the current conflict.
World news
fromTNW | Me
5 days ago

Iran's IRGC names 18 US tech firms including Apple, Microsoft, Nvidia as military targets

The IRGC named 18 US tech firms as targets for retaliation against alleged roles in assassinations in Iran.
World news
fromEngadget
5 days ago

Iran threatens imminent attacks on US tech companies in the Middle East

The Islamic Revolutionary Guard Corps threatens to target major US tech companies in the Middle East, urging employees to evacuate for safety.
fromThe Atlantic
1 week ago

Who Needs Tanks In the Age of Drones?

When I brought up the drones that Ukraine has used so effectively against Russian tanks, the company's chairman and CEO, Armin Papperger, was withering in his dismissal. 'This is how to play with Legos,' he told me.
Germany news
Privacy professionals
fromNextgov.com
2 days ago

Suspected Chinese breach of FBI system exposed surveillance targets' phone numbers

A breach linked to China exposed phone numbers of FBI surveillance targets, raising concerns about counterintelligence risks.
US politics
fromIntelligencer
2 days ago

Trump's Priority Is Now Militarism, at Home and Abroad

Trump and Republicans are pre-funding ICE and Border Patrol without new regulations, limiting Democratic influence on immigration enforcement.
Artificial intelligence
fromNextgov.com
4 days ago

Old-school spycraft could make a comeback as AI undermines trust

AI may enhance intelligence gathering but also revive traditional espionage methods due to reliability issues with digital communications.
Business
from24/7 Wall St.
4 days ago

Boeing Gains 5%, Lockheed Martin Up 2%: Defense Stocks Are Having a Moment as Pentagon Spending Accelerates

Boeing and Lockheed Martin shares rose significantly due to a major Pentagon contract to triple production capacity for PAC-3 missile seekers.
#air-defense
Russo-Ukrainian War
fromwww.businessinsider.com
5 days ago

US allies are scrambling to buy Ukraine's counter-drone tech, but gear alone isn't enough to defeat the Shahed threat

American allies must develop comprehensive air defense systems against drones, not just purchase technology from Ukraine.
World politics
fromwww.businessinsider.com
1 week ago

Total air defense is effectively impossible. In a major war, the West may have to make hard choices.

The West must make difficult choices about air defense priorities in large-scale wars due to limitations in resources and technology.
Russo-Ukrainian War
fromwww.businessinsider.com
5 days ago

US allies are scrambling to buy Ukraine's counter-drone tech, but gear alone isn't enough to defeat the Shahed threat

American allies must develop comprehensive air defense systems against drones, not just purchase technology from Ukraine.
World politics
fromwww.businessinsider.com
1 week ago

Total air defense is effectively impossible. In a major war, the West may have to make hard choices.

The West must make difficult choices about air defense priorities in large-scale wars due to limitations in resources and technology.
fromThe New Yorker
6 days ago

The Spy Who Helped Stop Iran from Getting the Bomb

Chalker claims that during his time at the C.I.A., he was instrumental in persuading Iranian scientists to defect, which provided crucial information that 'prevented Iran from getting a nuke.' His operations involved complex strategies and a deep understanding of the scientists' motivations.
Washington DC
#f-15e
EU data protection
fromFast Company
1 week ago

The most important defense regulation you've never heard of

CMMC mandates new cybersecurity standards for the defense industrial base, impacting thousands of businesses and transforming the defense supply chain.
US politics
fromNextgov.com
2 days ago

President's budget proposes folding beleaguered DHS intelligence office into headquarters

The Department of Homeland Security's intelligence office faces consolidation and potential workforce reductions under Trump's proposed budget for 2027.
Washington DC
fromwww.mediaite.com
6 days ago

Top Trump Spox Asked About Massive Military Complex' Under New White House Ballroom

A massive military complex is being built under the new White House ballroom, with upgrades to facilities ongoing.
US politics
fromTheregister
2 days ago

Trump wants to slash $707M from CISA's budget

CISA faces a proposed $707 million budget cut, risking national cybersecurity and critical infrastructure management.
fromTheregister
1 week ago

Only Trump decides when cyberwar turns into real war

The president should have a lot of leeway in which he determines whether or not the nation's going to respond kinetically. This flexibility is crucial in the evolving landscape of cyber warfare.
World politics
#cybercrime
Privacy professionals
fromTheregister
1 week ago

Private sector wants Feds' help to tackle China's Typhoons

Real-time collaboration between public and private sectors on cyber threats was proposed but never implemented, leading to ongoing challenges in combating cybercrime.
Privacy professionals
fromTheregister
1 week ago

Private sector wants Feds' help to tackle China's Typhoons

Real-time collaboration between public and private sectors on cyber threats was proposed but never implemented, leading to ongoing challenges in combating cybercrime.
#us-military
World news
fromFortune
1 day ago

U.S. deploys bulk of stealthy long-range missile for Iran war | Fortune

The US military is reallocating JASSM-ER cruise missiles from other regions for its campaign against Iran, significantly reducing global stockpiles.
World news
fromFortune
1 day ago

U.S. deploys bulk of stealthy long-range missile for Iran war | Fortune

The US military is reallocating JASSM-ER cruise missiles from other regions for its campaign against Iran, significantly reducing global stockpiles.
#ice
US politics
fromSilicon Canals
3 days ago

ICE confirms it deployed Paragon spyware inside the United States for drug trafficking cases - Silicon Canals

ICE is using commercial spyware domestically, raising constitutional concerns about warrantless surveillance and lack of oversight.
US politics
fromTechCrunch
3 days ago

ICE says it bought Paragon's spyware to use in drug trafficking cases | TechCrunch

ICE has utilized spyware from Paragon Solutions to combat drug trafficking and foreign terrorist organizations' use of encrypted communications.
US politics
fromSilicon Canals
3 days ago

ICE confirms it deployed Paragon spyware inside the United States for drug trafficking cases - Silicon Canals

ICE is using commercial spyware domestically, raising constitutional concerns about warrantless surveillance and lack of oversight.
US politics
fromTechCrunch
3 days ago

ICE says it bought Paragon's spyware to use in drug trafficking cases | TechCrunch

ICE has utilized spyware from Paragon Solutions to combat drug trafficking and foreign terrorist organizations' use of encrypted communications.
fromwww.businessinsider.com
2 days ago

The US is burning through expensive missiles. DARPA is looking for cheaper ones that can be built in days, not months.

"To accelerate current weapons development timelines, DARPA is considering an alternative development paradigm to increase the nation's magazine depth and breadth."
World news
World news
fromIrish Independent
3 days ago

Trump vows to strike civilian infrastructure as Iran strikes at Gulf tech sites

Tehran plans to charge for passage through the Strait of Hormuz, aiming to ensure safe navigation amid rising tensions with the US.
Artificial intelligence
fromEngadget
2 weeks ago

The Defense Department reportedly plans to train AI models on classified military data

The Pentagon plans to train AI models on classified information in secure facilities for exclusive military use to enhance warfighting capabilities.
fromwww.mediaite.com
6 days ago

Hegseth's Broker Sought To Invest in Defense Contractors

Hegseth's financial broker inquired about a multimillion-dollar investment in BlackRock's Defense Industrials Active ETF, which invests in global defense and security-related companies.
US politics
fromComputerworld
2 days ago

A core infrastructure engineer pleads guilty to federal charges in insider attack

Rhyne's attack involved unauthorized remote desktop sessions, deletion of network administrator accounts, and changing of passwords, showcasing significant security vulnerabilities.
Information security
Venture
fromThe Cipher Brief
1 month ago

What the Latest Policy and Tech Shifts Mean for National Security

Counter-Unmanned Aerial Systems require integrated, multi-layered defense architectures combining non-kinetic and kinetic responses rather than isolated legacy technologies, as modern autonomous drones render traditional electronic warfare ineffective.
Information security
fromSecurityWeek
2 days ago

Mobile Attack Surface Expands as Enterprises Lose Control

Mobile device security is inadequate, with many organizations using critically outdated operating systems and exposing sensitive data to potential attacks.
Information security
fromThe Hacker News
2 days ago

Drift Loses $285 Million in Durable Nonce Social Engineering Attack Linked to DPRK

Drift decentralized exchange lost $285 million due to a sophisticated attack involving unauthorized access and social engineering.
Information security
fromTheregister
3 days ago

The company's biggest security hole lived in the breakroom

An internet-connected coffee machine caused a major data breach by exploiting security vulnerabilities in a corporate network.
Information security
fromSecuritymagazine
5 days ago

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Companies are increasingly investing in executive protection due to rising threats, making it a strategic necessity for business continuity and resilience.
fromThe New Yorker
2 months ago

National Security Begins Behind the Toaster

Dear Secretary Pete Hegseth, I realize that this is a big ask, but would you please invade and take possession of my son and daughter-in-law's apartment? Or maybe you'd like to make them an offer first? Either way, as a concerned mother and patriot who believes that national security begins at home, I feel it's my duty to let you know that Otis and Luna, the co-dictators of Unit 4-C, at 439 Bergen Street, in Park Slope, Brooklyn, must be overthrown.
Humor
Artificial intelligence
fromThe Hacker News
1 month ago

Pentagon Designates Anthropic Supply Chain Risk Over AI Military Dispute

The Pentagon designated Anthropic a supply chain risk after the AI company refused to allow mass domestic surveillance and autonomous weapons development using its technology.
Information security
fromTechRepublic
5 days ago

New North Korean AI Hiring Scheme Targets US Companies

A North Korean operative attempted to infiltrate a cybersecurity firm using a stolen identity and AI-generated resume, highlighting vulnerabilities in hiring processes.
Information security
fromThe Cipher Brief
2 weeks ago

America Is Digitally Fragile - and Our Adversaries Know It

America faces unprecedented vulnerability as critical infrastructure systems are digitally dependent and interconnected, while adversaries possess capabilities to penetrate and pre-position for exploitation before conflict begins.
fromNextgov.com
1 month ago

US cyber responses will be 'linked to adversary actions' and involve industry coordination, official says

Future U.S. government responses in cyberspace will be "linked to adversary actions" and will involve coordination between the private sector and smaller governments, a top White House official said Thursday. The dynamic, which will be codified in a forthcoming national cyber strategy, is meant to make clear that foreign adversaries' actions that target U.S. networks have consequences, according to Alexandra Seymour, who serves as the principal deputy assistant national cyber director for policy in the Office of the National Cyber Director.
US politics
fromNextgov.com
2 months ago

DOD's AI acceleration strategy

According to the Secretary of Defense Pete Hegseth's memorandum on the Strategy, this AI-first status is to be achieved through four broad aims: Incentivizing internal DOD experimentation with AI models. Identifying and eliminating bureaucratic obstacles in the way of model integration. Focusing the U.S.'s military investment to shore up the U.S.'s "asymmetric advantages" in areas including AI computing, model innovation, entrepreneurial dynamism, capital markets, and operational data.
Artificial intelligence
US politics
fromThe Cipher Brief
1 month ago

Defending the Homeland: Pentagon Shifts Strategy on Drone Threats

DoD policy empowers commanders to use defensive measures, extend perimeters beyond installation fences, and counter UAS threats after an uncoordinated CBP laser incident.
Information security
fromNextgov.com
1 month ago

Potential US-built hacking tools obtained by foreign spies and cybercriminals, research says

A sophisticated iPhone hacking toolkit called Coruna, likely originating from U.S. government development, has proliferated to foreign intelligence agencies and criminal groups, compromising iOS devices through multiple exploit chains.
US politics
fromNextgov.com
2 months ago

The revolutionary new weapon in the Pentagon's pocket - and why it matters now more than ever

Transforming Pentagon acquisition processes to remove administrative burdens will enable U.S. companies to deliver cutting-edge military capabilities faster, producing a decisive battlefield advantage.
fromTechCrunch
1 month ago

Inside the story of the US defense contractor who leaked hacking tools to Russia | TechCrunch

Peter Williams, a former executive at U.S. defense contractor L3Harris, was sentenced on Tuesday to 87 months in prison for leaking his former company's trade secrets in exchange for $1.3 million in crypto between 2022 and 2025. Williams sold the exploits to Operation Zero, which the U.S. government calls 'one of the world's most nefarious exploit brokers.'
Information security
fromSecurityWeek
1 month ago

Ex-US Defense Contractor Executive Jailed for Selling Exploits to Russia

Peter Williams stole a U.S. defense contractor's trade secrets about highly sensitive cyber capabilities and sold them to a broker whose clients include the Russian government, putting our national security and countless potential victims at risk.
Information security
fromwww.theguardian.com
1 month ago

State-sponsored hackers targeting defence sector employees, Google says

The report catalogues a relentless barrage of cyber operations, most by state-sponsored groups, against EU and US industrial supply chains. It suggests the range of targets for these hackers has grown to encompass the broader industrial base of the US and Europe from German aerospace firms to UK carmakers. State-linked hackers have long targeted the global defence industry, but Luke McNamara, an analyst for Google's threat intelligence group, said they had seen more personalised and direct to individual targeting of employees.
Information security
fromSecurityWeek
1 month ago

Cyber Insights 2026: Cyberwar and Rising Nation State Threats

Entering the cyber world is stepping into a warzone. Cyber is considered a war zone, and what happens there is described as cyberwar. But it's not that simple. War is conducted by nations (political), not undertaken by criminals (financial). Both are increasing in this war zone we call cyber, but the political threat is growing fast. Cyberwar is a complex subject, and a formal definition is difficult.
Information security
[ Load more ]