Chalker claims that during his time at the C.I.A., he was instrumental in persuading Iranian scientists to defect, which provided crucial information that 'prevented Iran from getting a nuke.' His operations involved complex strategies and a deep understanding of the scientists' motivations.
Indian authorities have reportedly ordered an audit of the nation's CCTV cameras, after police uncovered what they claim was a Pakistan-backed surveillance operation involving cameras aimed at railway stations and other infrastructure.
Since the war began on February 28, Russia has passed Iran the locations of US military assets, including warships and aircraft, three officials, who spoke on the condition of anonymity, told The Washington Post. It does seem like it's a pretty comprehensive effort, one of the sources told the newspaper.
Britain is to develop new air defence weapons alongside the EU's four biggest military powers, deepening ties with the European defence sector. The project will invite manufacturers in the UK, Germany, France, Italy and Poland to submit plans to build low-cost missiles and autonomous drones. The allies are pledging a speedy process to build the weapons together, inspired by Ukraine's development of cheap drones to counter attacks from Russia.
Dear Secretary Pete Hegseth, I realize that this is a big ask, but would you please invade and take possession of my son and daughter-in-law's apartment? Or maybe you'd like to make them an offer first? Either way, as a concerned mother and patriot who believes that national security begins at home, I feel it's my duty to let you know that Otis and Luna, the co-dictators of Unit 4-C, at 439 Bergen Street, in Park Slope, Brooklyn, must be overthrown.
Future U.S. government responses in cyberspace will be "linked to adversary actions" and will involve coordination between the private sector and smaller governments, a top White House official said Thursday. The dynamic, which will be codified in a forthcoming national cyber strategy, is meant to make clear that foreign adversaries' actions that target U.S. networks have consequences, according to Alexandra Seymour, who serves as the principal deputy assistant national cyber director for policy in the Office of the National Cyber Director.
Our iron giant is a deep space radio telescope, with an antenna dish measuring forty-six metres across, the largest instrument of its kind in Canada. Starting in the 1960s, the Algonquin Radio Observatory performed a number of cutting-edge scientific projects, including joining SETI's early efforts, in the 1970s and 1980s, to find signatures of alien life-spectrum emissions from water molecules, artificial transmitter signals. No luck.
Cisco confirmed that attackers exploited the bug, tracked as CVE-2026-20127, to bypass authentication, gain privileged access, and quietly steal data. The discovery prompted a rare joint warning from authorities in the US, UK, Australia, Canada, and New Zealand.
AI is directly impacting blue team (defender) and red team (attacker) strategies, operations and tactics. Federal cybersecurity teams are increasingly relying on AI for anomaly detection, predictive threat intelligence and faster incident response. AI can flag suspicious behavior, such as access to sensitive systems from unusual locations, without depending on static rules.
On the instructions of President Donald Trump, the United States is withdrawing from international organizations that focus on cybersecurity and hybrid threats. There are concerns within the cybersecurity sector that this decision could undermine global resilience to digital threats. As reported by Computing, the US government claims that these partnerships are not sufficiently effective and are not in line with national interests.
The Telegraph reports that the activity focused on phones used by senior aides around former prime ministers Boris Johnson, Liz Truss, and Rishi Sunak, with the suspected access stretching back to 2021. Intelligence sources described the compromise as extensive, with one saying the activity went "right into the heart of Downing Street," although it remains unclear whether the prime ministers' own devices were accessed directly.
The United States' Cybersecurity Information Sharing Act of 2015 - CISA 2015 - which came within a hair's breadth of lapsing for good at the end of 2025, will now likely be extended through to the end of September as part of a Department of Homeland Security (DHS) funding package for 2026. The DHS Appropriations Act narrowly passed the House of Representatives on Thursday 22 January, overcoming Democrat objections to funding the controversial Immigration and Customs Enforcement (ICE) agency, which falls under the department's remit. It will head to the Senate where it is expected to be taken up before the end of the month.
The Cyber Security Agency of Singapore said advanced persistent threat UNC3886 dug itself into the networks of all four major telecom providers, sparking an 11-month digital eviction effort involving more than 100 personnel from across government, military, intelligence, and industry. Branded "Operation Cyber Guardian," the cleanup saw the state and telco engineers teaming up to flush the intruders out while keeping the nation's phone and data pipes flowing.
The so-called 'Cyber Dialogue' will supposedly help manage cyber threats to both country's national security, revealed Bloomberg, which was first to reported the move citing anonymous sources with knowledge of the forum, It claimed that the forum will improve communication, enable private discussions, and deescalate tensions. It also establishes a direct line between London and Beijing to enable senior officials to discuss ongoing cyber incidents.
Entering the cyber world is stepping into a warzone. Cyber is considered a war zone, and what happens there is described as cyberwar. But it's not that simple. War is conducted by nations (political), not undertaken by criminals (financial). Both are increasing in this war zone we call cyber, but the political threat is growing fast. Cyberwar is a complex subject, and a formal definition is difficult.
The report catalogues a relentless barrage of cyber operations, most by state-sponsored groups, against EU and US industrial supply chains. It suggests the range of targets for these hackers has grown to encompass the broader industrial base of the US and Europe from German aerospace firms to UK carmakers. State-linked hackers have long targeted the global defence industry, but Luke McNamara, an analyst for Google's threat intelligence group, said they had seen more personalised and direct to individual targeting of employees.