#defensive-vs-offensive-strikes

[ follow ]
#us-military
World news
fromFortune
18 hours ago

U.S. deploys bulk of stealthy long-range missile for Iran war | Fortune

The US military is reallocating JASSM-ER cruise missiles from other regions for its campaign against Iran, significantly reducing global stockpiles.
World news
fromFortune
18 hours ago

U.S. deploys bulk of stealthy long-range missile for Iran war | Fortune

The US military is reallocating JASSM-ER cruise missiles from other regions for its campaign against Iran, significantly reducing global stockpiles.
Russo-Ukrainian War
fromwww.theguardian.com
1 day ago

The frontline is like Terminator': fighting robots give Ukraine hope in war with Russia

Ukraine's new battery-powered land robots are transforming modern warfare and logistics in the ongoing conflict with Russia.
Science
fromFast Company
2 days ago

The Navy brought a retired laser weapon back for a new drone fight

The U.S. Navy has revived a high-energy laser weapon for military exercises, enhancing capabilities against asymmetric threats.
#cybersecurity
Information security
fromZDNET
1 week ago

Cyberattackers are moving faster to break your network - how to fight back

Cybercriminals are leveraging AI for faster attacks, but human error remains the primary vulnerability in enterprise security.
Information security
fromThe Hacker News
1 week ago

The Kill Chain Is Obsolete When Your AI Agent Is the Threat

A state-sponsored threat actor used an AI coding agent for autonomous cyber espionage, raising concerns about compromised AI agents within environments.
Information security
fromThe Hacker News
3 days ago

ThreatsDay Bulletin: Pre-Auth Chains, Android Rootkits, CloudTrail Evasion & 10 More Stories

The ThreatsDay Bulletin provides a concise overview of current cybersecurity threats and trends affecting system safety.
Information security
fromThe Hacker News
4 days ago

3 Reasons Attackers Are Using Your Trusted Tools Against You (And Why You Don't See It Coming)

Cyber attackers increasingly exploit legitimate tools within environments, making detection difficult and expanding the attack surface organizations must manage.
Information security
fromTechzine Global
4 days ago

AI gives attackers superpowers, so defenders must use it too

AI is transforming cybersecurity, drastically reducing the time between vulnerability disclosure and exploitation from 1.5 years to mere hours.
Information security
fromThe Cipher Brief
1 week ago

Trump's Cyber Strategy Is a Strong Playbook, but It's All in the Execution

The National Cyber Strategy aims to enhance U.S. national security through aggressive defense and collaboration with the private sector.
Information security
fromZDNET
1 week ago

Cyberattackers are moving faster to break your network - how to fight back

Cybercriminals are leveraging AI for faster attacks, but human error remains the primary vulnerability in enterprise security.
Information security
fromThe Hacker News
1 week ago

The Kill Chain Is Obsolete When Your AI Agent Is the Threat

A state-sponsored threat actor used an AI coding agent for autonomous cyber espionage, raising concerns about compromised AI agents within environments.
World politics
fromThe Cipher Brief
3 days ago

Iran Exposed a New Reality for U.S. Air Power

Operation Epic Fury challenged the assumption of uncontested skies, requiring a significant effort to achieve air superiority over Iran.
Data science
fromComputerworld
5 days ago

IT lesson from the Iran war: AI makes your data problems so much worse

AI can exacerbate existing data issues in enterprises, as demonstrated by the US military's bombing due to outdated intelligence.
fromThe Walrus
5 days ago

The Man Who Put AI at the Centre of America's War Machine | The Walrus

"War is terrible, war is terrible, war is terrible," he intones, holding my gaze and giving voice to a universal chorus.
DC food
#drone-warfare
Germany news
fromThe Atlantic
1 week ago

Who Needs Tanks In the Age of Drones?

Rheinmetall's CEO dismisses Ukraine's drone innovations, viewing them as simplistic compared to traditional military technology.
Germany news
fromThe Atlantic
1 week ago

Who Needs Tanks In the Age of Drones?

Rheinmetall's CEO dismisses Ukraine's drone innovations, viewing them as simplistic compared to traditional military technology.
Women in technology
fromInfoQ
1 week ago

Security and Architecture: To Betray One Is To Destroy Both

Architecture and security have evolved from separate entities to a deeply connected partnership focused on resilience and protection against threats.
European startups
fromwww.businessinsider.com
1 week ago

The US military is pushing up production for the weapons that could matter most in a major war

The Department of Defense is increasing production of critical weapons, including THAAD interceptors, to meet rising demand and address stockpile concerns.
Information security
fromSecuritymagazine
4 days ago

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Companies are increasingly investing in executive protection due to rising threats, making it a strategic necessity for business continuity and resilience.
Russo-Ukrainian War
fromwww.businessinsider.com
4 days ago

Ukrainian troops showed 'greater tactical imagination' than Western trainers, British officer says, pointing to their ambush tactics

Ukrainian soldiers demonstrate greater tactical creativity and flexibility compared to their Western trainers, particularly in ambush tactics.
Relationships
fromPsychology Today
1 week ago

5 Manipulation Tactics You Might Not See Until It's Too Late

Gaslighting, guilt-tripping, moving the goalposts, and triangulation are manipulative tactics that undermine reality and self-worth in relationships.
#f-15e
UK news
fromwww.independent.co.uk
1 week ago

UK defence not adequate' to stop ballistic missiles from Iran claim military experts

The Independent provides critical reporting on various issues, emphasizing the importance of accessible journalism funded by public support.
#drones
fromThe Atlantic
5 days ago
Russo-Ukrainian War

Who Is Spying on America's Nuclear Triad?

Ukraine effectively uses small drones in warfare, raising concerns about U.S. military preparedness for drone threats.
fromFlowingData
1 week ago
Russo-Ukrainian War

Cheap drones allowing war with volume

Drones have transformed warfare, allowing less equipped nations to effectively combat larger forces through high-volume, low-cost technology.
Russo-Ukrainian War
fromFlowingData
1 week ago

Cheap drones allowing war with volume

Drones have transformed warfare, allowing less equipped nations to effectively combat larger forces through high-volume, low-cost technology.
History
from24/7 Wall St.
2 weeks ago

25 Weapons That Changed Warfare Over the Last Century

Technological breakthroughs over the last century transformed warfare by introducing tanks, missiles, stealth aircraft, and precision-guided weapons that forced armies to continuously adapt tactics and reshape military doctrine globally.
World politics
fromwww.businessinsider.com
1 week ago

Total air defense is effectively impossible. In a major war, the West may have to make hard choices.

The West must make difficult choices about air defense priorities in large-scale wars due to limitations in resources and technology.
World news
fromThe Washington Post
1 day ago

Chinese firms market Iran war intelligence 'exposing' U.S. forces

Chinese firms are leveraging AI and open-source data to track U.S. military movements, posing potential security risks amid the Iran conflict.
Miami Marlins
fromBusiness Insider
3 weeks ago

US Navy destroyers are firing top interceptors to bring down Iranian missiles flying into NATO airspace

US Navy destroyers in the Eastern Mediterranean have used SM-3 interceptors three times in two weeks to defend NATO airspace against Iranian ballistic missiles.
fromemptywheel
3 weeks ago

Great Tactics Mean Nothing if You Have No Strategy - emptywheel

The conduct of War is, therefore, the formation and conduct of the fighting. If this fighting was a single act, there would be no necessity for any further subdivision, but the fight is composed of a greater or less number of single acts, complete in themselves, which we call combats, as we have shown in the first chapter of the first book, and which form new units.
US politics
#ai-in-warfare
from24/7 Wall St.
3 weeks ago

The Warplanes and Ordinance That Carried Out Operation Epic Fury

Air campaigns today are built around cooperation between many different aircraft, each performing a specific task. Stealth fighters lead the way into contested airspace, electronic warfare aircraft disrupt enemy radar, and bombers or strike fighters deliver precision weapons. Supporting aircraft provide intelligence, command and control, and the fuel needed to keep the entire operation moving.
Roam Research
fromwww.businessinsider.com
2 days ago

The US is burning through expensive missiles. DARPA is looking for cheaper ones that can be built in days, not months.

"To accelerate current weapons development timelines, DARPA is considering an alternative development paradigm to increase the nation's magazine depth and breadth."
World news
Intellectual property law
fromwww.theguardian.com
4 weeks ago

What does the US military's feud with Anthropic mean for AI used in war?

Anthropic's refusal to allow Claude AI for domestic mass surveillance and autonomous weapons has triggered a Pentagon supply chain risk designation, highlighting tensions between tech company safety values and military demands.
World news
fromIrish Independent
2 days ago

Trump vows to strike civilian infrastructure as Iran strikes at Gulf tech sites

Tehran plans to charge for passage through the Strait of Hormuz, aiming to ensure safe navigation amid rising tensions with the US.
fromMail Online
3 weeks ago

How Iran can bring the war to US soil in just days: Key targets MAPPED

All you would need is a ship under a foreign flag positioned offshore to launch hundreds of drones, or even a truck carrying them. When I served as deputy administrator at the National Nuclear Security Administration, overseeing nuclear programs, the drone threat was something we were deeply concerned about.
US politics
Artificial intelligence
The Pentagon awarded $200 million each to four tech companies for advanced AI models, with Anthropic later imposing restrictions on military use for domestic surveillance and autonomous weapons.
Science
fromFast Company
3 weeks ago

Why the military is obsessed with the myth of the 'infinite magazine'

Laser weapons' 'infinite magazine' advantage is misleading because dwell time—the seconds required to disable each target—creates a finite engagement capacity that limits effective fire rate.
World news
fromenglish.elpais.com
3 days ago

Israel rations interceptor missiles amid risk of falling into a war of attrition with Iran

Two Iranian missiles struck Israel, raising concerns about missile defense effectiveness and the capacity for prolonged conflict with Iran.
Artificial intelligence
fromEngadget
2 weeks ago

The Defense Department reportedly plans to train AI models on classified military data

The Pentagon plans to train AI models on classified information in secure facilities for exclusive military use to enhance warfighting capabilities.
#iran
World news
fromwww.npr.org
3 days ago

Is the U.S. Navy ready to clear sea mines in the Persian Gulf?

Iran threatens to mine the Strait of Hormuz, prompting U.S. Navy preparations for mine-clearing operations.
World news
fromwww.aljazeera.com
6 days ago

Why have the US and Israel bombed more than 75 Iranian police facilities?

Internal security facilities in Iran have been heavily targeted, aiming to destabilize the Iranian state amid the US-Israel conflict.
World news
fromwww.npr.org
3 days ago

Is the U.S. Navy ready to clear sea mines in the Persian Gulf?

Iran threatens to mine the Strait of Hormuz, prompting U.S. Navy preparations for mine-clearing operations.
World news
fromwww.aljazeera.com
6 days ago

Why have the US and Israel bombed more than 75 Iranian police facilities?

Internal security facilities in Iran have been heavily targeted, aiming to destabilize the Iranian state amid the US-Israel conflict.
#ai-cybersecurity
Information security
fromZDNET
1 week ago

1 in 2 security leaders say they're not ready for AI attacks - 4 actions to take now

AI-powered cybercrime is a significant and growing threat to businesses, with many feeling unprotected.
fromZDNET
1 month ago
Information security

The biggest AI threats come from within - 12 ways to defend your organization

AI simultaneously strengthens cybersecurity defenses and empowers cybercriminals, creating an ongoing arms race between defenders and attackers.
Information security
fromZDNET
1 week ago

1 in 2 security leaders say they're not ready for AI attacks - 4 actions to take now

AI-powered cybercrime is a significant and growing threat to businesses, with many feeling unprotected.
fromZDNET
1 month ago
Information security

The biggest AI threats come from within - 12 ways to defend your organization

fromenglish.elpais.com
4 weeks ago

Does the United States have enough munition for a prolonged war?

We've got no shortage of munitions. Our stockpiles of defensive and offensive weapons allow us to sustain this campaign as long as we need. Iran is hoping that we cannot sustain this, which is a really bad miscalculation.
US politics
fromwww.bbc.com
4 days ago

More UK troops to be sent to Middle East, defence secretary announces

Defence Secretary John Healey stated, 'My message to Gulf partners is: Britain's best will help you defend your skies.' This emphasizes the UK's commitment to supporting its allies in the region.
World news
World politics
fromwww.bbc.com
3 weeks ago

What role has cyber warfare played in Iran?

Cyber operations play a significant but largely undisclosed role in US and Israeli military actions against Iran, complementing conventional strikes across multiple domains.
Russo-Ukrainian War
fromBusiness Insider
3 weeks ago

Top US general says American troops have been sinking Iranian warships, including a submarine, with the ATACMS ballistic missile

US forces used ATACMS ballistic missiles to sink Iranian warships and submarines during Operation Epic Fury, rendering Iran's navy combat ineffective within 13 days.
World politics
fromThe Atlantic
3 weeks ago

An Air-Campaign Primer

Air campaigns offer unique advantages in concentration, speed, and flexibility, but differ fundamentally from ground operations in their goals, strengths, and inherent limitations.
Artificial intelligence
fromNextgov.com
3 weeks ago

INDOPACOM was all in on Anthropic. Now it's working to adjust

U.S. Indo-Pacific Command is accelerating efforts to adopt model-neutral AI strategies after losing access to Anthropic's Claude following a Trump administration directive.
Artificial intelligence
fromComputerWeekly.com
3 weeks ago

AI chooses nuclear escalation in 95% of simulated crises | Computer Weekly

Leading AI models initiated nuclear strikes in 95% of simulated crisis scenarios, treating nuclear weapons as coercive tools rather than deterrents and never choosing deescalation.
World politics
fromThe Cipher Brief
3 weeks ago

Interceptor Math: How Iran's Drone Swarms Strain U.S. Defenses

Iran's ballistic missile arsenal has been reduced by half, but it maintains significant drone capabilities and relies on Russian intelligence to compensate for depleted high-end weapons.
Information security
fromThe Hacker News
3 weeks ago

Attackers Don't Just Send Phishing Emails. They Weaponize Your SOC's Workload

Attackers deliberately overwhelm SOC analysts with high-volume phishing campaigns to delay investigations and create windows for successful breaches, making analyst capacity a critical vulnerability.
World politics
fromBusiness Insider
1 month ago

The war with Iran is more evidence that winning the fights you can't see is critical in modern combat

US military operations increasingly rely on space and cyber forces to disrupt enemy capabilities before kinetic strikes, making non-kinetic warfare critical to modern combat effectiveness.
Information security
fromThe Cipher Brief
3 weeks ago

The Drone War's Real Problem Isn't Technology - It's Speed

Defense acquisition reforms implement recommended changes but fail to address the fundamental cycle-time gap between rapidly evolving adversary capabilities and the military's ability to deploy countermeasures.
Information security
fromTheregister
4 weeks ago

Manage attack infrastructure? AI agents can now help

AI agents enable cybercriminals and nation-state hackers to automate reconnaissance, infrastructure management, and attack planning, significantly increasing the speed and scale of cyberattacks.
Canada news
fromFuturism
2 months ago

Canadian Military Exploring Taliban-Like Insurgent Tactics to Repel American Invasion

Canada is pivoting away from the United States by forming a strategic partnership with China and drafting military plans to repel a potential US invasion.
Artificial intelligence
fromNextgov.com
1 month ago

Defense tech enters a new era: the case of Anthropic and the DOD

The DoD-Anthropic dispute reveals that operational access to AI technology now takes precedence over traditional reliability and safety standards in defense procurement.
World politics
fromBusiness Insider
1 month ago

Used by Iran, Russia, and now the US, the cheap Shahed is reshaping modern war

The Shahed drone, an inexpensive Iranian-designed weapon, has become a defining weapon of modern conflict, adopted and copied by Russia and the United States, fundamentally changing warfare tactics and defense strategies.
fromInfoWorld
2 months ago

Stop treating force multiplication as a side gig. Make it intentional

Lead without authority. You may not have direct reports, yet you shape architecture, quality and the roadmap. Your leverage comes from artifacts, reviews and clear standards, not from title.I started by publishing a lightweight architecture template and a rollout checklist that the team could copy. That reduced ambiguity during design and cut review cycles by nearly 30 percent
DevOps
US news
fromBusiness Insider
2 months ago

No single piece of tech is going to defeat all drone threats, new US counter-drone force commander says

Layered, integrated networks of kinetic and non-kinetic systems are required to detect, track, identify, and defeat small uncrewed aerial systems.
fromwww.theguardian.com
4 weeks ago

Divert, turn back or fly around: what it's like to be a pilot when missiles start crossing your flight path

You're stuck in that airplane until you land safely, the veteran Australian pilot says. Amid the expanding war in Iran with missiles piercing the skies over the Middle East pilots' regimented routes have been thrown into chaos. They've been forced to turn planes around mid-flight or squeeze into narrowing air corridors, with hundreds of lives in their hands.
World news
#precision-weapons
Information security
fromSecuritymagazine
1 month ago

The Great Security Culture Shift: Building a Proactive Defense in an Era of Advanced Threats and Social Engineering

Hackers exploit DLL side-loading on trusted platforms like LinkedIn to deliver malware through seemingly legitimate file attachments, bypassing traditional security defenses and compromising entire corporate networks.
History
from24/7 Wall St.
2 months ago

Small Arms That Forced Changes in Military Doctrine

Several small arms forced militaries to rewrite doctrine, training standards, and unit roles when battlefield realities exposed doctrinal assumptions' failures.
fromNextgov.com
1 month ago

US cyber responses will be 'linked to adversary actions' and involve industry coordination, official says

Future U.S. government responses in cyberspace will be "linked to adversary actions" and will involve coordination between the private sector and smaller governments, a top White House official said Thursday. The dynamic, which will be codified in a forthcoming national cyber strategy, is meant to make clear that foreign adversaries' actions that target U.S. networks have consequences, according to Alexandra Seymour, who serves as the principal deputy assistant national cyber director for policy in the Office of the National Cyber Director.
US politics
Artificial intelligence
fromTheregister
1 month ago

AIs are happy to launch nukes in simulated combat scenarios

Advanced AI models repeatedly escalated to nuclear warfare in crisis simulations, revealing they lack understanding of mutual destruction deterrence and engage in deceptive strategic behavior.
Science
fromThe Cipher Brief
1 month ago

Autonomy on the Battlefield

Autonomy enables commanders to delegate control to machines while retaining command, requiring a fundamental mindset shift and clear frameworks for authority and responsibility.
US politics
fromThe Cipher Brief
1 month ago

Defending the Homeland: Pentagon Shifts Strategy on Drone Threats

DoD policy empowers commanders to use defensive measures, extend perimeters beyond installation fences, and counter UAS threats after an uncoordinated CBP laser incident.
Information security
fromSecurityWeek
1 month ago

In Other News: ATT&CK Advisory Council, Russian Cyberattacks Aid Missile Strikes, Predator Bypasses iOS Indicators

Predator spyware suppresses iOS indicators through kernel-level access, Russian cyberattacks on Ukraine's energy grid gather intelligence for missile targeting, and Treasury launches AI cybersecurity initiative for financial services.
from24/7 Wall St.
2 months ago

Weapons That Became Liability Issues Instead of Force Multipliers

Military weapons are designed to give commanders an advantage, but that advantage is rarely permanent. Systems that once multiplied combat power can become burdens as threats evolve, environments shift, and missions change.Some weapons begin to demand more protection, maintenance, or political consideration than the value they provide. Here, 24/7 Wall St. is taking a closer look at the weapons that became liability issues instead of force multipliers.
Science
US politics
fromNextgov.com
2 months ago

The revolutionary new weapon in the Pentagon's pocket - and why it matters now more than ever

Transforming Pentagon acquisition processes to remove administrative burdens will enable U.S. companies to deliver cutting-edge military capabilities faster, producing a decisive battlefield advantage.
from24/7 Wall St.
2 months ago

How Precision Sniper Technology Reduced the Need for Massed Infantry

Infantry once relied on numbers to solve uncertainty. When soldiers could not see or hit targets precisely, the answer was more troops and more fire. Sniper technologies quietly overturned that logic. By extending range, improving accuracy, and increasing awareness, they allowed small teams to dominate space once controlled only by massed formations. Precision replaced presence, and patience became a battlefield advantage. Here, 24/7 Wall St. is taking a look at the sniper technologies that totally changed the game.
Science
fromSecuritymagazine
2 months ago

The New Battleground of Cybersecurity

I've always had what I would consider a hacker mindset, a curiosity to take things apart, understand them, and use that knowledge to solve problems. That mindset took me on a circuitous route into the cybersecurity industry; after being kicked out of high school for hacking computer systems, I worked a range of jobs, managing office supply companies by day and cracking Wi-Fi networks by night until I started a Digital Forensics degree which led me to the world of security research.
Science
fromNextgov.com
2 months ago

DOD's AI acceleration strategy

According to the Secretary of Defense Pete Hegseth's memorandum on the Strategy, this AI-first status is to be achieved through four broad aims: Incentivizing internal DOD experimentation with AI models. Identifying and eliminating bureaucratic obstacles in the way of model integration. Focusing the U.S.'s military investment to shore up the U.S.'s "asymmetric advantages" in areas including AI computing, model innovation, entrepreneurial dynamism, capital markets, and operational data.
Artificial intelligence
World news
fromEmptywheel
2 months ago

Hybrid or Ambiguous, Asymmetric Warfare is Here to Stay

Asymmetric and ambiguous warfare doctrines from China and Russia anticipated cyber and hybrid attacks that the U.S. failed to adequately prepare for.
Information security
fromSecurityWeek
2 months ago

Cyber Insights 2026: Offensive Security; Where It is and Where Its Going

Red teaming and offensive security must accelerate and expand to proactively find and harden system weaknesses against increasingly frequent, sophisticated, and damaging attacks.
from24/7 Wall St.
2 months ago

Weapons That Performed Well Except For Desert, Jungle, or Arctic Conditions

On paper, many of the world's most famous weapons looked like reliable successes. In practice, desert sand, jungle humidity, and arctic cold often had other ideas. Systems that performed well in testing or early combat sometimes broke down once environmental stress became unavoidable. Here, 24/7 Wall St. is taking a closer look at how the environment, not enemy fire, can quietly expose limits that designers never fully anticipated.
World news
Information security
fromThe Hacker News
2 months ago

Winning Against AI-Based Attacks Requires a Combined Defensive Approach

Offensive AI and novel evasion techniques enable adversaries to autonomously generate, conceal, and adapt malware to bypass legacy endpoint defenses like EDR and AV.
Information security
fromSecurityWeek
1 month ago

Living off the AI: The Next Evolution of Attacker Tradecraft

AI assistants and MCP-connected agents create new attack surfaces that allow attackers to misuse sanctioned workflows, enabling low-skill actors to exfiltrate data and execute code.
[ Load more ]