#tactical-weaknesses

[ follow ]
#us-military
World news
fromwww.mediaite.com
5 days ago

New US Missile, Untested in Battle, Hit Iranian School and Sports Hall, NY Times Analysis Finds

A U.S. ballistic missile strike in Iran killed at least 21 people, marking the combat debut of the Precision Strike Missile.
World news
fromwww.mediaite.com
5 days ago

New US Missile, Untested in Battle, Hit Iranian School and Sports Hall, NY Times Analysis Finds

A U.S. ballistic missile strike in Iran killed at least 21 people, marking the combat debut of the Precision Strike Missile.
US Elections
fromAxios
17 hours ago

"We're fighting wars": Trump bets his presidency on the Pentagon

Trump's budget prioritizes military spending, significantly cutting non-defense programs amid declining approval ratings and rising gas prices.
#cybersecurity
fromTechCrunch
13 hours ago
Information security

After fighting malware for decades, this cybersecurity veteran is now hacking drones | TechCrunch

Information security
fromTechzine Global
3 days ago

AI gives attackers superpowers, so defenders must use it too

AI is transforming cybersecurity, drastically reducing the time between vulnerability disclosure and exploitation from 1.5 years to mere hours.
Information security
fromThe Hacker News
3 days ago

3 Reasons Attackers Are Using Your Trusted Tools Against You (And Why You Don't See It Coming)

Cyber attackers increasingly exploit legitimate tools within environments, making detection difficult and expanding the attack surface organizations must manage.
Information security
fromTechCrunch
13 hours ago

After fighting malware for decades, this cybersecurity veteran is now hacking drones | TechCrunch

Mikko Hyppönen emphasizes the invisible nature of cybersecurity work, comparing it to Tetris where successes vanish and failures accumulate.
Node JS
fromInfoQ
6 days ago

Are We Ready for the Next Cyber Security Crisis Like Log4shell?

Organizations are not prepared for the next cybersecurity crisis, similar to Log4Shell.
Information security
fromSecurityWeek
1 day ago

TrueConf Zero-Day Exploited in Asian Government Attacks

Chinese hackers exploited a zero-day vulnerability in TrueConf software to attack government entities in Asia, allowing execution of malicious code.
Information security
fromThe Hacker News
2 days ago

ThreatsDay Bulletin: Pre-Auth Chains, Android Rootkits, CloudTrail Evasion & 10 More Stories

The ThreatsDay Bulletin provides a concise overview of current cybersecurity threats and trends affecting system safety.
Information security
fromTechzine Global
3 days ago

AI gives attackers superpowers, so defenders must use it too

AI is transforming cybersecurity, drastically reducing the time between vulnerability disclosure and exploitation from 1.5 years to mere hours.
Information security
fromThe Hacker News
3 days ago

3 Reasons Attackers Are Using Your Trusted Tools Against You (And Why You Don't See It Coming)

Cyber attackers increasingly exploit legitimate tools within environments, making detection difficult and expanding the attack surface organizations must manage.
Media industry
fromAxios
1 day ago

Hegseth's wartime firing of top generals stuns officials: "It's insane"

George's dismissal was due to personality clashes, not strategic disagreements, during a critical time for the Army.
#us-navy
#pentagon
World news
fromwww.aljazeera.com
6 days ago

Pentagon readies for weeks of US ground operations in Iran: Report

The Pentagon is preparing for limited ground operations in Iran, including potential raids on strategic sites like Kharg Island.
World news
fromwww.aljazeera.com
6 days ago

Pentagon readies for weeks of US ground operations in Iran: Report

The Pentagon is preparing for limited ground operations in Iran, including potential raids on strategic sites like Kharg Island.
#military-leadership
Washington DC
fromThe Atlantic
2 days ago

Hegseth's War on America's Military

Secretary of Defense Pete Hegseth fired General Randy George and other senior officers amid ongoing military conflict, reflecting a purge influenced by personal grievances.
Washington DC
fromThe Atlantic
2 days ago

An Army Shake-Up in the Middle of a War

Major military leadership changes are occurring amid ongoing hostilities against Iran, with significant implications for Army operations and stability.
Washington DC
fromThe Atlantic
2 days ago

Hegseth's War on America's Military

Secretary of Defense Pete Hegseth fired General Randy George and other senior officers amid ongoing military conflict, reflecting a purge influenced by personal grievances.
Washington DC
fromThe Atlantic
2 days ago

An Army Shake-Up in the Middle of a War

Major military leadership changes are occurring amid ongoing hostilities against Iran, with significant implications for Army operations and stability.
Retirement
fromAxios
2 days ago

Hegseth removes Army's top general during Iran war

George was nominated by President Biden in 2023 but was asked to retire immediately by Hegseth.
Russo-Ukrainian War
fromwww.businessinsider.com
3 days ago

Ukrainian troops showed 'greater tactical imagination' than Western trainers, British officer says, pointing to their ambush tactics

Ukrainian soldiers demonstrate greater tactical creativity and flexibility compared to their Western trainers, particularly in ambush tactics.
Artificial intelligence
fromNextgov.com
3 days ago

Old-school spycraft could make a comeback as AI undermines trust

AI may enhance intelligence gathering but also revive traditional espionage methods due to reliability issues with digital communications.
World politics
fromThe Cipher Brief
3 days ago

Iran Exposed a New Reality for U.S. Air Power

Operation Epic Fury challenged the assumption of uncontested skies, requiring a significant effort to achieve air superiority over Iran.
#iran
SF politics
fromPOLITICO
1 week ago

Troop deployments test Republicans' nerves on Capitol Hill

Republican concerns grow over potential ground invasion of Iran, fearing significant political backlash and advocating for congressional input on military actions.
Privacy professionals
fromAxios
4 days ago

Cyber warfare starts to get personal in war between U.S., Israel and Iran

Iran-linked hackers are using data leaks and intimidation tactics against individuals to influence public perception during the current conflict.
World politics
fromThe Walrus
3 days ago

By Choking the Strait of Hormuz, Iran Found America's Weak Spot | The Walrus

Iran's strategic control of the Strait of Hormuz has disrupted global oil trade and shifted energy power dynamics amid ongoing conflict.
World news
fromwww.mediaite.com
1 day ago

Former Trump NatSec Advisor Says President Probably in Panic Mode' After Two U.S. Jets Shot Down

Trump's credibility is undermined after Iran shot down U.S. military planes, contradicting his claims of air supremacy.
World news
fromwww.npr.org
3 days ago

Is the U.S. Navy ready to clear sea mines in the Persian Gulf?

Iran threatens to mine the Strait of Hormuz, prompting U.S. Navy preparations for mine-clearing operations.
World news
fromTNW | Me
4 days ago

Iran's IRGC names 18 US tech firms including Apple, Microsoft, Nvidia as military targets

The IRGC named 18 US tech firms as targets for retaliation against alleged roles in assassinations in Iran.
SF politics
fromPOLITICO
1 week ago

Troop deployments test Republicans' nerves on Capitol Hill

Republican concerns grow over potential ground invasion of Iran, fearing significant political backlash and advocating for congressional input on military actions.
Privacy professionals
fromAxios
4 days ago

Cyber warfare starts to get personal in war between U.S., Israel and Iran

Iran-linked hackers are using data leaks and intimidation tactics against individuals to influence public perception during the current conflict.
World politics
fromThe Walrus
3 days ago

By Choking the Strait of Hormuz, Iran Found America's Weak Spot | The Walrus

Iran's strategic control of the Strait of Hormuz has disrupted global oil trade and shifted energy power dynamics amid ongoing conflict.
World news
fromwww.mediaite.com
1 day ago

Former Trump NatSec Advisor Says President Probably in Panic Mode' After Two U.S. Jets Shot Down

Trump's credibility is undermined after Iran shot down U.S. military planes, contradicting his claims of air supremacy.
World news
fromwww.npr.org
3 days ago

Is the U.S. Navy ready to clear sea mines in the Persian Gulf?

Iran threatens to mine the Strait of Hormuz, prompting U.S. Navy preparations for mine-clearing operations.
World news
fromTNW | Me
4 days ago

Iran's IRGC names 18 US tech firms including Apple, Microsoft, Nvidia as military targets

The IRGC named 18 US tech firms as targets for retaliation against alleged roles in assassinations in Iran.
Germany politics
fromenglish.elpais.com
3 days ago

Berlin is rearming, and its neighbors are weighing the risks and benefits of the new German hegemony

Germany is rearming its military in response to geopolitical changes, raising concerns about its past and future role in Europe.
#data-integrity
fromComputerworld
4 days ago
Data science

IT lesson from the Iran war: AI makes your data problems so much worse

AI can exacerbate existing data issues in enterprises, as demonstrated by the US military's bombing due to outdated intelligence.
Information security
fromSecurityWeek
4 days ago

The Next Cybersecurity Crisis Isn't Breaches-It's Data You Can't Trust

Data integrity now encompasses data trust, emphasizing the importance of reliable data in AI-driven decision-making.
Data science
fromComputerworld
4 days ago

IT lesson from the Iran war: AI makes your data problems so much worse

AI can exacerbate existing data issues in enterprises, as demonstrated by the US military's bombing due to outdated intelligence.
Information security
fromSecurityWeek
4 days ago

The Next Cybersecurity Crisis Isn't Breaches-It's Data You Can't Trust

Data integrity now encompasses data trust, emphasizing the importance of reliable data in AI-driven decision-making.
UK news
fromwww.independent.co.uk
3 days ago

First sea lord admits Royal Navy is not ready for war

The Royal Navy is not currently ready for war, according to General Sir Gwyn Jenkins, who emphasizes the need for further preparation.
fromThe Walrus
4 days ago

The Man Who Put AI at the Centre of America's War Machine | The Walrus

"War is terrible, war is terrible, war is terrible," he intones, holding my gaze and giving voice to a universal chorus.
DC food
Roam Research
fromThe Cipher Brief
4 days ago

The Chalk Mark Still Matters: Russian Espionage Handling in the Modern Era

Russian intelligence tradecraft has evolved in agent handling, incorporating advanced communication techniques and urban geography for signaling.
fromwww.cnbc.com
5 days ago

Pete Hegseth's broker attempted to make defense investments before Iran war: Financial Times

The Pentagon has dismissed the report, stating that neither Hegseth nor any of his representatives approached BlackRock about any such investment. Pentagon chief spokesperson Sean Parnell called the report 'entirely false and fabricated,' demanding a retraction from the Financial Times.
Philosophy
fromApaonline
5 days ago

Dystopian Futures: Anthropic and the Department of Defense

Dystopian visions of AI's impact on society raise significant concerns about control and governance as technology advances.
World news
fromThe Washington Post
17 hours ago

Chinese firms market Iran war intelligence 'exposing' U.S. forces

Chinese firms are leveraging AI and open-source data to track U.S. military movements, posing potential security risks amid the Iran conflict.
Women in technology
fromInfoQ
1 week ago

Security and Architecture: To Betray One Is To Destroy Both

Architecture and security have evolved from separate entities to a deeply connected partnership focused on resilience and protection against threats.
fromThe Atlantic
1 week ago

Who Needs Tanks In the Age of Drones?

When I brought up the drones that Ukraine has used so effectively against Russian tanks, the company's chairman and CEO, Armin Papperger, was withering in his dismissal. 'This is how to play with Legos,' he told me.
Germany news
#gps
Science
fromWIRED
4 days ago

The US Military's GPS Software Is an $8 Billion Mess

The GPS OCX system, despite being delivered, remains nonoperational and faces potential cancellation due to ongoing issues.
Science
fromWIRED
4 days ago

The US Military's GPS Software Is an $8 Billion Mess

The GPS OCX system, despite being delivered, remains nonoperational and faces potential cancellation due to ongoing issues.
SF politics
fromNextgov.com
5 days ago

New contract for background investigations raises concerns about scale and risk

DCSA is modernizing its Case Processing Operations Center to enhance background investigations and incorporate Continuous Vetting for national security.
Information security
fromTechzine Global
1 day ago

Axios supply chain attack victim posts postmortem to prevent a repeat

Axios was compromised for three hours, distributing Remote Access Trojans due to a sophisticated social engineering attack by North Korean group UNC1069.
Startup companies
fromBrooklyn Eagle
2 weeks ago

PREMIUM America's secret weapon: failure

The United States fosters innovation by allowing entrepreneurs to fail and try again, unlike many other countries where failure carries a lasting stigma.
fromThe New Yorker
5 days ago

The Spy Who Helped Stop Iran from Getting the Bomb

Chalker claims that during his time at the C.I.A., he was instrumental in persuading Iranian scientists to defect, which provided crucial information that 'prevented Iran from getting a nuke.' His operations involved complex strategies and a deep understanding of the scientists' motivations.
Washington DC
fromwww.mediaite.com
5 days ago

Hegseth's Broker Sought To Invest in Defense Contractors

Hegseth's financial broker inquired about a multimillion-dollar investment in BlackRock's Defense Industrials Active ETF, which invests in global defense and security-related companies.
US politics
UK news
fromwww.independent.co.uk
1 week ago

UK defence not adequate' to stop ballistic missiles from Iran claim military experts

The Independent provides critical reporting on various issues, emphasizing the importance of accessible journalism funded by public support.
World news
fromIrish Independent
1 day ago

Trump vows to strike civilian infrastructure as Iran strikes at Gulf tech sites

Tehran plans to charge for passage through the Strait of Hormuz, aiming to ensure safe navigation amid rising tensions with the US.
World news
fromenglish.elpais.com
2 days ago

Israel rations interceptor missiles amid risk of falling into a war of attrition with Iran

Two Iranian missiles struck Israel, raising concerns about missile defense effectiveness and the capacity for prolonged conflict with Iran.
fromwww.dw.com
2 weeks ago

'Vulnerable' satellites guide the world and its wars

Signals from Global Navigation Satellite Systems are quite vulnerable. They are exceptionally weak, meaning that any radio noise near their frequency, accidental or malicious, can interfere with reception. I am confident that there are people in every government who understand the problem. The challenge is getting leadership to both understand and act to reduce the risk.
Information security
fromSecuritymagazine
4 days ago

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Companies are increasingly investing in executive protection due to rising threats, making it a strategic necessity for business continuity and resilience.
World politics
fromwww.businessinsider.com
1 week ago

Total air defense is effectively impossible. In a major war, the West may have to make hard choices.

The West must make difficult choices about air defense priorities in large-scale wars due to limitations in resources and technology.
Artificial intelligence
fromEngadget
2 weeks ago

The Defense Department reportedly plans to train AI models on classified military data

The Pentagon plans to train AI models on classified information in secure facilities for exclusive military use to enhance warfighting capabilities.
Information security
fromDevOps.com
3 days ago

North Korean Hackers Suspected in Supply Chain Attack on Popular Axios Project - DevOps.com

North Korean hackers hijacked the npm account of an axios maintainer, publishing malicious versions that installed a remote access trojan.
fromThe Cipher Brief
3 weeks ago

The Future of War Is Now: What Washington Needs to Hear from the Battlefield

I have been working in Ukraine since 2019, first as an active Green Beret advising in an official capacity, then after leaving that service, directing special operations on the ground and more recently carrying hard-won lessons back to NATO before they are forgotten or overtaken by the next news cycle.
Washington DC
fromemptywheel
3 weeks ago

Great Tactics Mean Nothing if You Have No Strategy - emptywheel

The conduct of War is, therefore, the formation and conduct of the fighting. If this fighting was a single act, there would be no necessity for any further subdivision, but the fight is composed of a greater or less number of single acts, complete in themselves, which we call combats, as we have shown in the first chapter of the first book, and which form new units.
US politics
Artificial intelligence
fromFuturism
2 weeks ago

The Military's AI Fever Is Leading Into Disaster, Critics Say

The US military's rapid AI deployment risks unsafe systems causing excessive civilian harm, wrongful arrests, and civil liberties violations without adequate human oversight safeguards.
World politics
fromwww.bbc.com
3 weeks ago

What role has cyber warfare played in Iran?

Cyber operations play a significant but largely undisclosed role in US and Israeli military actions against Iran, complementing conventional strikes across multiple domains.
fromenglish.elpais.com
4 weeks ago

Does the United States have enough munition for a prolonged war?

We've got no shortage of munitions. Our stockpiles of defensive and offensive weapons allow us to sustain this campaign as long as we need. Iran is hoping that we cannot sustain this, which is a really bad miscalculation.
US politics
Information security
fromAxios
6 days ago

Everyone's worried that AI's newest models are a hacker's dream weapon

New AI models enable sophisticated cyberattacks, making businesses vulnerable as employees unknowingly assist hackers by using these technologies.
US politics
fromFortune
4 weeks ago

Pentagon officially defines Anthropic as 'supply chain risk' | Fortune

The Trump administration designated Anthropic as a supply chain risk, forcing government contractors to stop using Claude AI due to national security concerns over surveillance and autonomous weapons capabilities.
World politics
fromBusiness Insider
1 month ago

The war with Iran is more evidence that winning the fights you can't see is critical in modern combat

US military operations increasingly rely on space and cyber forces to disrupt enemy capabilities before kinetic strikes, making non-kinetic warfare critical to modern combat effectiveness.
fromwww.aljazeera.com
2 weeks ago

Do Taliban's drone attacks expose a chink in Pakistan's armour?

On the evening of March 13, drones struck three locations across Pakistan. Two children were wounded in Quetta. Civilians were also injured in Kohat and in Rawalpindi, the garrison city that houses the headquarters of Pakistan's armed forces and neighbours the capital, Islamabad. Pakistan's military said the drones were intercepted before reaching their targets.
World news
Artificial intelligence
fromTheregister
1 month ago

AIs are happy to launch nukes in simulated combat scenarios

Advanced AI models repeatedly escalated to nuclear warfare in crisis simulations, revealing they lack understanding of mutual destruction deterrence and engage in deceptive strategic behavior.
fromTheregister
3 weeks ago

Pentagon praises Palantir tech for battlefield strike speed

So we've gone from identifying the target to now coming up with a course of action, to now actioning that target, all from one system. This is revolutionary. We were having this done in about eight or nine systems where humans were literally moving detections left and right in order to get to our desired end state, in this case closing a kill chain.
World news
Information security
fromThe Cipher Brief
2 weeks ago

America Is Digitally Fragile - and Our Adversaries Know It

America faces unprecedented vulnerability as critical infrastructure systems are digitally dependent and interconnected, while adversaries possess capabilities to penetrate and pre-position for exploitation before conflict begins.
History
from24/7 Wall St.
2 months ago

Weapons the U.S. Military Issued Despite Known Design Problems

Militaries often field weapons with known design flaws because urgency, cost, and limited alternatives make "good enough" preferable to perfect systems.
#precision-weapons
from24/7 Wall St.
2 months ago

Weapons That Became Liability Issues Instead of Force Multipliers

Military weapons are designed to give commanders an advantage, but that advantage is rarely permanent. Systems that once multiplied combat power can become burdens as threats evolve, environments shift, and missions change.Some weapons begin to demand more protection, maintenance, or political consideration than the value they provide. Here, 24/7 Wall St. is taking a closer look at the weapons that became liability issues instead of force multipliers.
Science
US politics
fromThe Cipher Brief
1 month ago

Defending the Homeland: Pentagon Shifts Strategy on Drone Threats

DoD policy empowers commanders to use defensive measures, extend perimeters beyond installation fences, and counter UAS threats after an uncoordinated CBP laser incident.
Science
fromThe Cipher Brief
1 month ago

Autonomy on the Battlefield

Autonomy enables commanders to delegate control to machines while retaining command, requiring a fundamental mindset shift and clear frameworks for authority and responsibility.
US politics
fromwww.dw.com
2 months ago

US defense plan focuses on homeland, limits help to allies

The US will prioritize homeland defense and counter Chinese influence in the Indo-Pacific while expecting allies to assume greater defense responsibilities with reduced US support.
Information security
fromThe Hacker News
1 month ago

Manual Processes Are Putting National Security at Risk

Over half of national security organizations rely on manual sensitive data transfers, creating critical security vulnerabilities that adversaries actively exploit in contested operational environments.
US politics
fromThe Cipher Brief
2 months ago

The Country's First 'Cognitive Advantage' Chief: Influence Is the New Battlefield

Integrates information, perception, culture, and behavior operations to provide nonkinetic strategic options and counter adversary cognitive campaigns.
from24/7 Wall St.
2 months ago

Weapons That Performed Well Except For Desert, Jungle, or Arctic Conditions

On paper, many of the world's most famous weapons looked like reliable successes. In practice, desert sand, jungle humidity, and arctic cold often had other ideas. Systems that performed well in testing or early combat sometimes broke down once environmental stress became unavoidable. Here, 24/7 Wall St. is taking a closer look at how the environment, not enemy fire, can quietly expose limits that designers never fully anticipated.
World news
World news
from24/7 Wall St.
2 months ago

Military Weapons That Only Worked Under Perfect Conditions

Many advanced military weapons fail in combat because they depend on ideal weather, uncontested access, flawless logistics, and perfect timing.
fromSecurityWeek
1 month ago

Cyber Insights 2026: Cyberwar and Rising Nation State Threats

Entering the cyber world is stepping into a warzone. Cyber is considered a war zone, and what happens there is described as cyberwar. But it's not that simple. War is conducted by nations (political), not undertaken by criminals (financial). Both are increasing in this war zone we call cyber, but the political threat is growing fast. Cyberwar is a complex subject, and a formal definition is difficult.
Information security
[ Load more ]