#hybrid-warfare-threats

[ follow ]
#cybersecurity
fromSilicon Canals
10 hours ago
Information security

One maintainer, one compromised laptop: How North Korean hackers hijacked the Axios open source project - Silicon Canals

fromTechCrunch
21 hours ago
Information security

North Korea's hijack of one of the web's most used open source projects was likely weeks in the making | TechCrunch

Information security
fromSilicon Canals
20 hours ago

A three-hour window: North Korean hackers compromised the Axios library and exposed thousands of systems - Silicon Canals

A North Korean hacking group compromised Axios, affecting millions before the malicious packages were removed after three hours.
fromSilicon Canals
2 days ago
Information security

The man who discovered the ILOVEYOU virus is now fighting Russian drones using the same playbook - Silicon Canals

fromWIRED
2 days ago
Information security

The Hack That Exposed Syria's Sweeping Security Failures

Information security
fromThe Hacker News
6 hours ago

China-Linked Storm-1175 Exploits Zero-Days to Rapidly Deploy Medusa Ransomware

A China-based threat actor is using zero-day vulnerabilities to execute high-velocity attacks, particularly targeting healthcare and finance sectors.
Information security
fromSilicon Canals
10 hours ago

One maintainer, one compromised laptop: How North Korean hackers hijacked the Axios open source project - Silicon Canals

North Korean hackers compromised the Axios HTTP library by socially engineering its maintainer, publishing malicious versions that exposed sensitive data.
Information security
fromTechCrunch
21 hours ago

North Korea's hijack of one of the web's most used open source projects was likely weeks in the making | TechCrunch

A North Korean cyberattack compromised the Axios project, highlighting security vulnerabilities in open source software development.
Information security
fromSilicon Canals
20 hours ago

A three-hour window: North Korean hackers compromised the Axios library and exposed thousands of systems - Silicon Canals

A North Korean hacking group compromised Axios, affecting millions before the malicious packages were removed after three hours.
Information security
fromSilicon Canals
2 days ago

The man who discovered the ILOVEYOU virus is now fighting Russian drones using the same playbook - Silicon Canals

Mikko Hyppönen has transitioned from cybersecurity to anti-drone defense, focusing on systems for law enforcement and military clients.
Information security
fromWIRED
2 days ago

The Hack That Exposed Syria's Sweeping Security Failures

Syrian government accounts on X were hacked, revealing significant vulnerabilities in the state's cybersecurity practices.
#iran
World news
fromTechCrunch
19 hours ago

Iran threatens 'Stargate' AI data centers | TechCrunch

Iran threatens retaliation against U.S. data centers in response to ongoing military actions and threats from the United States.
Podcast
fromWIRED
4 days ago

'Uncanny Valley': Iran's Threats on US Tech, Trump's Plans for Midterms, and Polymarket's Pop-up Flop

Iran threatens US tech firms amid ongoing tensions and preparations for midterm elections are underway.
World news
fromThe Verge
22 hours ago

Iran threatens OpenAI's Stargate data center in Abu Dhabi

Iran's IRGC threatens OpenAI's Abu Dhabi datacenter in response to US threats against Iran's power plants.
Privacy professionals
fromAxios
6 days ago

Cyber warfare starts to get personal in war between U.S., Israel and Iran

Iran-linked hackers are using data leaks and intimidation tactics against individuals to influence public perception during the current conflict.
World news
fromTechCrunch
19 hours ago

Iran threatens 'Stargate' AI data centers | TechCrunch

Iran threatens retaliation against U.S. data centers in response to ongoing military actions and threats from the United States.
Podcast
fromWIRED
4 days ago

'Uncanny Valley': Iran's Threats on US Tech, Trump's Plans for Midterms, and Polymarket's Pop-up Flop

Iran threatens US tech firms amid ongoing tensions and preparations for midterm elections are underway.
World news
fromThe Verge
22 hours ago

Iran threatens OpenAI's Stargate data center in Abu Dhabi

Iran's IRGC threatens OpenAI's Abu Dhabi datacenter in response to US threats against Iran's power plants.
Privacy professionals
fromAxios
6 days ago

Cyber warfare starts to get personal in war between U.S., Israel and Iran

Iran-linked hackers are using data leaks and intimidation tactics against individuals to influence public perception during the current conflict.
US politics
fromwww.theguardian.com
1 day ago

Republicans fooled by AI-generated image of US crew member rescued in Iran

Republican politicians were misled by a fake AI-generated image of a US warplane crew member, highlighting the need for improved media literacy.
Television
fromwww.theguardian.com
3 hours ago

Drone racing to drone strikes: have war and sport become indistinguishable?

The visual connection between the Winter Olympics and the US war in Iran highlights the duality of drone technology in media coverage.
Science
fromThe Cipher Brief
4 hours ago

A Wartime Budget Without an Innovation Strategy

Collaboration between the NSF and defense sectors is essential for national security and innovation, despite proposed budget cuts to NSF funding.
#artificial-intelligence
Philosophy
fromFast Company
19 hours ago

Twenty seconds to approve a military strike; 1.2 seconds to deny a health insurance claim. The human is in the AI loop. Humanity is not

Artificial intelligence significantly accelerates decision-making in military and business contexts, but human oversight may be minimal and ineffective.
Artificial intelligence
fromNextgov.com
6 days ago

Old-school spycraft could make a comeback as AI undermines trust

AI may enhance intelligence gathering but also revive traditional espionage methods due to reliability issues with digital communications.
Philosophy
fromFast Company
19 hours ago

Twenty seconds to approve a military strike; 1.2 seconds to deny a health insurance claim. The human is in the AI loop. Humanity is not

Artificial intelligence significantly accelerates decision-making in military and business contexts, but human oversight may be minimal and ineffective.
Artificial intelligence
fromNextgov.com
6 days ago

Old-school spycraft could make a comeback as AI undermines trust

AI may enhance intelligence gathering but also revive traditional espionage methods due to reliability issues with digital communications.
fromwww.theguardian.com
1 day ago

Polymarket criticized over disgusting' bets on fate of pilots on US jet shot by Iran

Seth Moulton described Polymarket's acceptance of bets on the downed pilots' fate as DISGUSTING, emphasizing that their safety was unknown while people were betting on their rescue.
US news
#fbi
Privacy professionals
fromNextgov.com
3 days ago

Suspected Chinese breach of FBI system exposed surveillance targets' phone numbers

A breach linked to China exposed phone numbers of FBI surveillance targets, raising concerns about counterintelligence risks.
Privacy professionals
fromTechRepublic
3 days ago

FBI Declares Surveillance System Breach a 'Major Incident'

A China-linked breach of an FBI surveillance system has been classified as a major incident, posing significant risks to US national security.
Privacy professionals
fromNextgov.com
3 days ago

Suspected Chinese breach of FBI system exposed surveillance targets' phone numbers

A breach linked to China exposed phone numbers of FBI surveillance targets, raising concerns about counterintelligence risks.
Media industry
fromThe Cipher Brief
5 days ago

Iran Is Building the Disinformation Architecture of the Future-Right Now

Iran's disinformation tactics demonstrate the potential of AI in conflict, emphasizing speed, encryption, and narrative manipulation.
World politics
fromThe Cipher Brief
5 days ago

Iran Exposed a New Reality for U.S. Air Power

Operation Epic Fury challenged the assumption of uncontested skies, requiring a significant effort to achieve air superiority over Iran.
#data-integrity
fromComputerworld
1 week ago
Data science

IT lesson from the Iran war: AI makes your data problems so much worse

AI can exacerbate existing data issues in enterprises, as demonstrated by the US military's bombing due to outdated intelligence.
Information security
fromSecurityWeek
6 days ago

The Next Cybersecurity Crisis Isn't Breaches-It's Data You Can't Trust

Data integrity now encompasses data trust, emphasizing the importance of reliable data in AI-driven decision-making.
Data science
fromComputerworld
1 week ago

IT lesson from the Iran war: AI makes your data problems so much worse

AI can exacerbate existing data issues in enterprises, as demonstrated by the US military's bombing due to outdated intelligence.
Information security
fromSecurityWeek
6 days ago

The Next Cybersecurity Crisis Isn't Breaches-It's Data You Can't Trust

Data integrity now encompasses data trust, emphasizing the importance of reliable data in AI-driven decision-making.
Information security
fromThe Hacker News
23 hours ago

Multi-OS Cyberattacks: How SOCs Close a Critical Risk in 3 Steps

Multi-OS attacks complicate SOC operations, leading to delays, fragmented evidence, and increased escalation volume, ultimately allowing attackers more time to operate.
#axios
Node JS
fromAxios
6 days ago

North Korean hackers implicated in major supply chain attack

A compromised maintainer account for the Axios npm package led to the publication of malicious software versions targeting various operating systems.
Information security
fromTechzine Global
6 days ago

North Korea behind social engineering attack on Axios project

Attackers compromised the Axios maintainer's account through social engineering, publishing malicious versions that installed a Remote Access Trojan on victims' systems.
Node JS
fromAxios
6 days ago

North Korean hackers implicated in major supply chain attack

A compromised maintainer account for the Axios npm package led to the publication of malicious software versions targeting various operating systems.
Information security
fromTechzine Global
6 days ago

North Korea behind social engineering attack on Axios project

Attackers compromised the Axios maintainer's account through social engineering, publishing malicious versions that installed a Remote Access Trojan on victims' systems.
#ukraine
fromwww.theguardian.com
3 days ago
Russo-Ukrainian War

The frontline is like Terminator': fighting robots give Ukraine hope in war with Russia

Ukraine's new battery-powered land robots are transforming modern warfare and logistics in the ongoing conflict with Russia.
Russo-Ukrainian War
fromwww.dw.com
4 days ago

Ukraine: 'Massive' Russian air strikes kill at least 14

Russia's air attacks on Ukraine resulted in at least 14 deaths, with Kharkiv facing significant drone and missile strikes.
Russo-Ukrainian War
fromwww.theguardian.com
3 days ago

The frontline is like Terminator': fighting robots give Ukraine hope in war with Russia

Ukraine's new battery-powered land robots are transforming modern warfare and logistics in the ongoing conflict with Russia.
Russo-Ukrainian War
fromwww.dw.com
4 days ago

Ukraine: 'Massive' Russian air strikes kill at least 14

Russia's air attacks on Ukraine resulted in at least 14 deaths, with Kharkiv facing significant drone and missile strikes.
fromThe Walrus
18 hours ago

A Daring US Rescue in Iran Highlights a War Going Sideways | The Walrus

The successful rescue operation was described as 'one of the most daring Search and Rescue Operations in US history,' highlighting the complexities and risks involved in such missions.
World news
Psychology
fromwww.theguardian.com
1 week ago

They feel true': political deepfakes are growing in influence even if people know they aren't real

Online content creators are fabricating people and images for propaganda and profit, blurring the lines between reality and fiction.
US politics
fromSilicon Canals
4 days ago

ICE confirms it deployed Paragon spyware inside the United States for drug trafficking cases - Silicon Canals

ICE is using commercial spyware domestically, raising constitutional concerns about warrantless surveillance and lack of oversight.
Information security
fromThe Hacker News
1 hour ago

The Hidden Cost of Recurring Credential Incidents

Credential incidents cause significant operational costs and disruptions, impacting IT teams and overall business productivity beyond just breach prevention.
World news
fromNextgov.com
19 hours ago

CIA deception campaign helped US rescue downed airman in Iran, director says

A CIA deception campaign successfully facilitated the rescue of an airman downed in Iran, utilizing advanced technology and human assets.
Information security
fromThe Hacker News
20 hours ago

DPRK-Linked Hackers Use GitHub as C2 in Multi-Stage Attacks Targeting South Korea

DPRK-linked threat actors use GitHub for command-and-control in attacks on South Korean organizations, employing obfuscated LNK files and PowerShell scripts.
World politics
fromwww.businessinsider.com
1 week ago

Total air defense is effectively impossible. In a major war, the West may have to make hard choices.

The West must make difficult choices about air defense priorities in large-scale wars due to limitations in resources and technology.
World news
fromThe Washington Post
3 days ago

Chinese firms market Iran war intelligence 'exposing' U.S. forces

Chinese firms are leveraging AI and open-source data to track U.S. military movements, posing potential security risks amid the Iran conflict.
fromSilicon Canals
9 hours ago

When militaries share data centers with banks: how Gulf strikes exposed a structural flaw in global cloud infrastructure - Silicon Canals

When civilian banks, logistics platforms, and payment processors share physical data center infrastructure with military AI systems, those facilities become legitimate military targets under international humanitarian law - and the civilian services housed inside lose their legal protection.
Information security
#cyber-warfare
World politics
fromTheregister
1 week ago

Only Trump decides when cyberwar turns into real war

The US may respond to cyber warfare with physical attacks, determined by the President's discretion, according to former NSA leaders.
World politics
fromwww.bbc.com
3 weeks ago

What role has cyber warfare played in Iran?

Cyber operations play a significant but largely undisclosed role in US and Israeli military actions against Iran, complementing conventional strikes across multiple domains.
World politics
fromTheregister
1 week ago

Only Trump decides when cyberwar turns into real war

The US may respond to cyber warfare with physical attacks, determined by the President's discretion, according to former NSA leaders.
World politics
fromwww.bbc.com
3 weeks ago

What role has cyber warfare played in Iran?

Cyber operations play a significant but largely undisclosed role in US and Israeli military actions against Iran, complementing conventional strikes across multiple domains.
Information security
fromSilicon Canals
16 hours ago

A single maintainer, a fake company, and a three-hour window: inside the Axios supply chain hijack - Silicon Canals

A single maintainer's vulnerability led to a significant security breach in a widely used JavaScript library, exposing thousands of systems to potential credential theft.
World news
fromIrish Independent
4 days ago

Trump vows to strike civilian infrastructure as Iran strikes at Gulf tech sites

Tehran plans to charge for passage through the Strait of Hormuz, aiming to ensure safe navigation amid rising tensions with the US.
Russo-Ukrainian War
fromwww.businessinsider.com
6 days ago

Ukrainian troops showed 'greater tactical imagination' than Western trainers, British officer says, pointing to their ambush tactics

Ukrainian soldiers demonstrate greater tactical creativity and flexibility compared to their Western trainers, particularly in ambush tactics.
Information security
fromSecurityWeek
22 hours ago

Google DeepMind Researchers Map Web Attacks Against AI Agents

Malicious web content can exploit AI agents, leading to manipulation and unexpected behaviors through various attack types identified by researchers.
fromComputerworld
3 days ago

A core infrastructure engineer pleads guilty to federal charges in insider attack

Rhyne's attack involved unauthorized remote desktop sessions, deletion of network administrator accounts, and changing of passwords, showcasing significant security vulnerabilities.
Information security
Privacy technologies
fromDataBreaches.Net
1 month ago

Ukrainian hackers uncover how Russian drone operators are using Belarus - DataBreaches.Net

Ukrainian sanctions target Belarusian leader Lukashenka for facilitating Russian attack-UAV control from Belarus and enabling strikes on northern Ukrainian infrastructure.
Information security
fromThe Hacker News
4 days ago

Drift Loses $285 Million in Durable Nonce Social Engineering Attack Linked to DPRK

Drift decentralized exchange lost $285 million due to a sophisticated attack involving unauthorized access and social engineering.
Russo-Ukrainian War
fromwww.dw.com
3 weeks ago

Russia and Ukraine wage high-tech war in the 'death zone'

Ukrainian forces use drone surveillance and underground tunnels to detect and counter Russian advances in the Kharkiv region, where careful analysis of ground signs reveals enemy movements.
Information security
fromSecurityWeek
4 days ago

Mobile Attack Surface Expands as Enterprises Lose Control

Mobile device security is inadequate, with many organizations using critically outdated operating systems and exposing sensitive data to potential attacks.
#north-korea
Information security
fromFortune
4 days ago

I knew about North Korean hackers-they still tricked me and got into my computer | Fortune

North Korean hackers are increasingly targeting individuals in the crypto industry, employing sophisticated deception tactics.
Information security
fromDevOps.com
6 days ago

North Korean Hackers Suspected in Supply Chain Attack on Popular Axios Project - DevOps.com

North Korean hackers hijacked the npm account of an axios maintainer, publishing malicious versions that installed a remote access trojan.
Information security
fromNextgov.com
6 days ago

North Korea-linked hackers suspected in Axios open-source hijack, Google analysts say

North Korea-aligned hackers compromised the Axios JavaScript library, risking many developers' systems through a sophisticated supply chain attack.
Information security
fromFortune
4 days ago

I knew about North Korean hackers-they still tricked me and got into my computer | Fortune

North Korean hackers are increasingly targeting individuals in the crypto industry, employing sophisticated deception tactics.
Information security
fromDevOps.com
6 days ago

North Korean Hackers Suspected in Supply Chain Attack on Popular Axios Project - DevOps.com

North Korean hackers hijacked the npm account of an axios maintainer, publishing malicious versions that installed a remote access trojan.
Information security
fromNextgov.com
6 days ago

North Korea-linked hackers suspected in Axios open-source hijack, Google analysts say

North Korea-aligned hackers compromised the Axios JavaScript library, risking many developers' systems through a sophisticated supply chain attack.
Information security
fromTechzine Global
4 days ago

Axios supply chain attack victim posts postmortem to prevent a repeat

Axios was compromised for three hours, distributing Remote Access Trojans due to a sophisticated social engineering attack by North Korean group UNC1069.
#malware
Information security
fromThe Hacker News
5 days ago

Researchers Uncover Mining Operation Using ISO Lures to Spread RATs and Crypto Miners

Operation REF1695 uses fake installers to deploy RATs and cryptocurrency miners, monetizing infections through CPA fraud since November 2023.
Information security
fromThe Hacker News
5 days ago

Researchers Uncover Mining Operation Using ISO Lures to Spread RATs and Crypto Miners

Operation REF1695 uses fake installers to deploy RATs and cryptocurrency miners, monetizing infections through CPA fraud since November 2023.
Europe news
fromwww.npr.org
2 months ago

Russia's hybrid attacks throughout Europe are becoming more dangerous

Russia has sharply increased hybrid attacks across Europe, targeting infrastructure and civilians to undermine support for Ukraine and disrupt NATO and allied logistics.
Miscellaneous
fromThe Cipher Brief
2 months ago

The Kremlin Files: Russia's Way to the Gray Zone

Russian gray-zone warfare centers on non-contact war and expanded intelligence active measures, using cyber and cognitive tools to influence conflicts without direct kinetic attacks.
Information security
fromThe Hacker News
5 days ago

CERT-UA Impersonation Campaign Spread AGEWHEEZE Malware to 1 Million Emails

A phishing campaign impersonating CERT-UA distributed malware called AGEWHEEZE targeting various organizations in Ukraine.
World news
fromEmptywheel
2 months ago

Hybrid or Ambiguous, Asymmetric Warfare is Here to Stay

Asymmetric and ambiguous warfare doctrines from China and Russia anticipated cyber and hybrid attacks that the U.S. failed to adequately prepare for.
Information security
fromSecurityWeek
3 weeks ago

China-Linked Hackers Hit Asian Militaries in Patient Espionage Operation

China-linked cyberespionage campaign CL-STA-1087 has targeted Southeast Asian military organizations since at least 2020, using custom backdoors and credential stealers to extract military intelligence and Western collaboration details.
Information security
fromSecurityWeek
3 weeks ago

Iran-Linked Hackers Take Aim at US and Other Targets, Raising Risk of Cyberattacks During War

Pro-Iranian hackers are expanding cyberattacks from the Middle East into the United States, targeting defense contractors, medical device companies, and critical infrastructure like power stations and water plants.
World news
fromwww.aljazeera.com
2 months ago

In Iran, the US-Israeli addiction to hybrid warfare is on full display

The United States conducts hybrid wars—sanctions, strikes, cyberattacks, blockades and misinformation—to pursue geopolitical goals in Venezuela and Iran while avoiding nuclear escalation.
fromSecurityWeek
2 months ago

Cyber Insights 2026: Cyberwar and Rising Nation State Threats

Entering the cyber world is stepping into a warzone. Cyber is considered a war zone, and what happens there is described as cyberwar. But it's not that simple. War is conducted by nations (political), not undertaken by criminals (financial). Both are increasing in this war zone we call cyber, but the political threat is growing fast. Cyberwar is a complex subject, and a formal definition is difficult.
Information security
Information security
fromComputerWeekly.com
1 month ago

Western cyber alliances risk fragmenting in new world order | Computer Weekly

Geopolitical fragmentation in 2025 drove cyber shifts toward coercion, disrupted alliances and intelligence sharing, decentralised resilient cybercrime, and intensified US–China AI competition.
Information security
fromAxios
2 months ago

Exclusive: Suspected Chinese hackers impersonate U.S. briefings in phishing lure

China-linked Mustang Panda used file-based phishing to infect diplomatic and election officials with data-stealing persistent malware, detected by an AI agent at Dream.
Information security
fromThe Hacker News
1 month ago

Google Links China, Iran, Russia, North Korea to Coordinated Defense Sector Cyber Operations

State-sponsored and criminal actors from China, Iran, North Korea, and Russia target the defense industrial base, prioritizing drones, hiring exploitation, edge-device access, and supply-chain risk.
Information security
fromTheregister
2 months ago

Don't underestimate pro-Russia hacktivists, warns UK NCSC

Pro-Russia hacktivist denial-of-service attacks threaten UK local authorities, critical national infrastructure, and other organizations, causing service disruption and recovery costs.
fromSecuritymagazine
2 months ago

Is Email the Entry Point to a Well-Rounded Disinformation Attack?

Generative models learn an executive's tone and syntax from public posts, press releases and meeting transcripts. Attackers then craft messages indistinguishable from authentic correspondence. But the real innovation isn't the text, it's the choreography. A fraudulent email may serve only as the opening move. Within minutes, the target receives a confirming voice message that sounds like the executive whose name appears in the signature block. A deepfaked video may follow, asking for "final authorization." Email opens the door; other channels walk through it.
Information security
[ Load more ]