#us-national-security-threat-assessment

[ follow ]
World news
fromThe Washington Post
8 hours ago

Chinese firms market Iran war intelligence 'exposing' U.S. forces

Chinese firms are leveraging AI and open-source data to track U.S. military movements, posing potential security risks amid the Iran conflict.
#cybersecurity
fromTechCrunch
4 hours ago
Information security

After fighting malware for decades, this cybersecurity veteran is now hacking drones | TechCrunch

fromTechCrunch
1 day ago
EU data protection

Europe's cyber agency blames hacking gangs for massive data breach and leak | TechCrunch

Information security
fromTechCrunch
4 hours ago

After fighting malware for decades, this cybersecurity veteran is now hacking drones | TechCrunch

Mikko Hyppönen emphasizes the invisible nature of cybersecurity work, comparing it to Tetris where successes vanish and failures accumulate.
EU data protection
fromTechCrunch
1 day ago

Europe's cyber agency blames hacking gangs for massive data breach and leak | TechCrunch

A cybercriminal group known as TeamPCP hacked the EU's executive body, stealing 92 gigabytes of data, including personal information.
Information security
fromThe Hacker News
23 hours ago

China-Linked TA416 Targets European Governments with PlugX and OAuth-Based Phishing

TA416 has intensified cyberattacks on European government and diplomatic organizations since mid-2025, utilizing advanced malware delivery techniques.
Information security
fromSecurityWeek
1 day ago

TrueConf Zero-Day Exploited in Asian Government Attacks

Chinese hackers exploited a zero-day vulnerability in TrueConf software to attack government entities in Asia, allowing execution of malicious code.
Privacy professionals
fromTechRepublic
5 days ago

Iran-Linked Hackers Breach FBI Director Kash Patel's Email, Leak Messages Online

An Iran-linked hacking group breached FBI Director Kash Patel's personal email, releasing non-sensitive information as a retaliatory cyber attack.
Privacy professionals
fromNextgov.com
1 day ago

Suspected Chinese breach of FBI system exposed surveillance targets' phone numbers

A breach linked to China exposed phone numbers of FBI surveillance targets, raising concerns about counterintelligence risks.
Intellectual property law
fromNextgov.com
21 hours ago

Tech bills of the week: Limiting adversaries' access to US tech; and boosting cyber apprenticeships

New legislation aims to strengthen U.S. export controls on sensitive technologies to prevent adversaries from exploiting them for economic gain.
European startups
fromFortune
23 minutes ago

Trump sons to Gulf states: we've got some drone interception tech to sell you | Fortune

A drone company backed by Trump’s sons is selling to Gulf nations amid conflict with Iran, potentially profiting from the war initiated by their father.
US politics
fromIntelligencer
1 day ago

Trump's Priority Is Now Militarism, at Home and Abroad

Trump and Republicans are pre-funding ICE and Border Patrol without new regulations, limiting Democratic influence on immigration enforcement.
#trump
US Elections
fromAxios
8 hours ago

"We're fighting wars": Trump bets his presidency on the Pentagon

Trump's budget prioritizes military spending, significantly cutting non-defense programs amid declining approval ratings and rising gas prices.
fromwww.theguardian.com
2 days ago
US politics

Trump polled advisers about replacing Tulsi Gabbard as intelligence chief

Trump is considering replacing Tulsi Gabbard as director of national intelligence due to frustrations over her defense of a former deputy's stance on Iran.
US Elections
fromAxios
8 hours ago

"We're fighting wars": Trump bets his presidency on the Pentagon

Trump's budget prioritizes military spending, significantly cutting non-defense programs amid declining approval ratings and rising gas prices.
US politics
fromwww.theguardian.com
2 days ago

Trump polled advisers about replacing Tulsi Gabbard as intelligence chief

Trump is considering replacing Tulsi Gabbard as director of national intelligence due to frustrations over her defense of a former deputy's stance on Iran.
US news
fromwww.theguardian.com
21 hours ago

Senator decries new shoes-on security policy at US airports as reckless'

The new TSA policy allowing shoes on during scans raises security concerns, according to Senator Tammy Duckworth.
Media industry
fromAxios
1 day ago

Hegseth's wartime firing of top generals stuns officials: "It's insane"

George's dismissal was due to personality clashes, not strategic disagreements, during a critical time for the Army.
#openclaw
fromInfoWorld
1 day ago
DevOps

Understanding the risks of OpenClaw

OpenClaw is an orchestration layer that requires external services to function effectively, rather than being a standalone cloud platform.
fromArs Technica
21 hours ago
Information security

OpenClaw gives users yet another reason to be freaked out about security

OpenClaw's vulnerabilities pose severe security risks, allowing attackers to gain administrative access with minimal permissions.
DevOps
fromInfoWorld
1 day ago

Understanding the risks of OpenClaw

OpenClaw is an orchestration layer that requires external services to function effectively, rather than being a standalone cloud platform.
Information security
fromArs Technica
21 hours ago

OpenClaw gives users yet another reason to be freaked out about security

OpenClaw's vulnerabilities pose severe security risks, allowing attackers to gain administrative access with minimal permissions.
fromThe New Yorker
23 hours ago

How Donald Trump's War on Iran Helps Vladimir Putin's War on Ukraine

In 2021, when Olga Rudenko and other journalists launched the Kyiv Independent, they were committed to making a publication that wouldn't face political pressure from an owner. A few months later, Russia launched a full-scale invasion of Ukraine, and the Independent began reporting breaking news from the front lines.
Russo-Ukrainian War
#iran
Podcast
fromWIRED
1 day ago

'Uncanny Valley': Iran's Threats on US Tech, Trump's Plans for Midterms, and Polymarket's Pop-up Flop

Iran threatens US tech firms amid ongoing tensions and preparations for midterm elections are underway.
SF politics
fromPOLITICO
1 week ago

Troop deployments test Republicans' nerves on Capitol Hill

Republican concerns grow over potential ground invasion of Iran, fearing significant political backlash and advocating for congressional input on military actions.
World news
fromwww.mediaite.com
15 hours ago

Former Trump NatSec Advisor Says President Probably in Panic Mode' After Two U.S. Jets Shot Down

Trump's credibility is undermined after Iran shot down U.S. military planes, contradicting his claims of air supremacy.
Privacy professionals
fromAxios
4 days ago

Cyber warfare starts to get personal in war between U.S., Israel and Iran

Iran-linked hackers are using data leaks and intimidation tactics against individuals to influence public perception during the current conflict.
World news
fromTruthout
2 hours ago

IAEA Sounds Alarm on US-Israeli Strike Near Iran Nuclear Plant

A strike near Iran's Bushehr nuclear plant killed one person, raising significant safety concerns regarding nuclear facilities during military conflicts.
Podcast
fromWIRED
1 day ago

'Uncanny Valley': Iran's Threats on US Tech, Trump's Plans for Midterms, and Polymarket's Pop-up Flop

Iran threatens US tech firms amid ongoing tensions and preparations for midterm elections are underway.
SF politics
fromPOLITICO
1 week ago

Troop deployments test Republicans' nerves on Capitol Hill

Republican concerns grow over potential ground invasion of Iran, fearing significant political backlash and advocating for congressional input on military actions.
World news
fromwww.mediaite.com
15 hours ago

Former Trump NatSec Advisor Says President Probably in Panic Mode' After Two U.S. Jets Shot Down

Trump's credibility is undermined after Iran shot down U.S. military planes, contradicting his claims of air supremacy.
Privacy professionals
fromAxios
4 days ago

Cyber warfare starts to get personal in war between U.S., Israel and Iran

Iran-linked hackers are using data leaks and intimidation tactics against individuals to influence public perception during the current conflict.
World news
fromTruthout
2 hours ago

IAEA Sounds Alarm on US-Israeli Strike Near Iran Nuclear Plant

A strike near Iran's Bushehr nuclear plant killed one person, raising significant safety concerns regarding nuclear facilities during military conflicts.
Silicon Valley
fromSilicon Canals
1 day ago

U.S. and China control 90% of AI data centres - the Global South is building a different kind of AI - Silicon Canals

Frugal AI movements in the Global South aim to reclaim sovereignty by developing independent, low-cost AI systems for critical services.
#military-leadership
Washington DC
fromThe Atlantic
1 day ago

An Army Shake-Up in the Middle of a War

Major military leadership changes are occurring amid ongoing hostilities against Iran, with significant implications for Army operations and stability.
Washington DC
fromThe Atlantic
1 day ago

Hegseth's War on America's Military

Secretary of Defense Pete Hegseth fired General Randy George and other senior officers amid ongoing military conflict, reflecting a purge influenced by personal grievances.
Washington DC
fromThe Atlantic
1 day ago

An Army Shake-Up in the Middle of a War

Major military leadership changes are occurring amid ongoing hostilities against Iran, with significant implications for Army operations and stability.
Washington DC
fromThe Atlantic
1 day ago

Hegseth's War on America's Military

Secretary of Defense Pete Hegseth fired General Randy George and other senior officers amid ongoing military conflict, reflecting a purge influenced by personal grievances.
London politics
fromwww.theguardian.com
2 days ago

Overwhelmed' Prevent at risk of missing threats as referrals rise, UK counter-terror chief says

Prevent scheme faces overwhelming referrals, risking identification of genuine threats due to increased volume and lack of triage system.
Artificial intelligence
fromNextgov.com
3 days ago

Old-school spycraft could make a comeback as AI undermines trust

AI may enhance intelligence gathering but also revive traditional espionage methods due to reliability issues with digital communications.
#us-foreign-policy
World politics
fromThe Cipher Brief
2 days ago

Taking a Stand on Adversaries' Influence in the Western Hemisphere

The US operation on January 3rd aimed to counteract adversarial influence in Latin America, particularly against Venezuela and Cuba.
World politics
fromThe Cipher Brief
2 days ago

Taking a Stand on Adversaries' Influence in the Western Hemisphere

The US operation on January 3rd aimed to counteract adversarial influence in Latin America, particularly against Venezuela and Cuba.
#axios
Node JS
fromAxios
3 days ago

North Korean hackers implicated in major supply chain attack

A compromised maintainer account for the Axios npm package led to the publication of malicious software versions targeting various operating systems.
Information security
fromTechzine Global
3 days ago

North Korea behind social engineering attack on Axios project

Attackers compromised the Axios maintainer's account through social engineering, publishing malicious versions that installed a Remote Access Trojan on victims' systems.
Node JS
fromAxios
3 days ago

North Korean hackers implicated in major supply chain attack

A compromised maintainer account for the Axios npm package led to the publication of malicious software versions targeting various operating systems.
Information security
fromTechzine Global
3 days ago

North Korea behind social engineering attack on Axios project

Attackers compromised the Axios maintainer's account through social engineering, publishing malicious versions that installed a Remote Access Trojan on victims' systems.
Roam Research
fromThe Cipher Brief
4 days ago

The Chalk Mark Still Matters: Russian Espionage Handling in the Modern Era

Russian intelligence tradecraft has evolved in agent handling, incorporating advanced communication techniques and urban geography for signaling.
#data-integrity
fromComputerworld
4 days ago
Data science

IT lesson from the Iran war: AI makes your data problems so much worse

AI can exacerbate existing data issues in enterprises, as demonstrated by the US military's bombing due to outdated intelligence.
Information security
fromSecurityWeek
4 days ago

The Next Cybersecurity Crisis Isn't Breaches-It's Data You Can't Trust

Data integrity now encompasses data trust, emphasizing the importance of reliable data in AI-driven decision-making.
Data science
fromComputerworld
4 days ago

IT lesson from the Iran war: AI makes your data problems so much worse

AI can exacerbate existing data issues in enterprises, as demonstrated by the US military's bombing due to outdated intelligence.
Information security
fromSecurityWeek
4 days ago

The Next Cybersecurity Crisis Isn't Breaches-It's Data You Can't Trust

Data integrity now encompasses data trust, emphasizing the importance of reliable data in AI-driven decision-making.
fromThe Walrus
4 days ago

The Man Who Put AI at the Centre of America's War Machine | The Walrus

"War is terrible, war is terrible, war is terrible," he intones, holding my gaze and giving voice to a universal chorus.
DC food
#government-shutdown
fromThe New Yorker
21 hours ago
US politics

What Did the Partial D.H.S. Shutdown Accomplish?

Democrats faced challenges in funding negotiations, leading to multiple government shutdowns and unresolved immigration enforcement issues.
US politics
fromwww.aljazeera.com
1 day ago

US Homeland Security shutdown to stretch on, despite Senate passing funding

The House has not voted on the Senate bill, prolonging the partial government shutdown affecting DHS funding and federal workers.
US politics
fromThe New Yorker
21 hours ago

What Did the Partial D.H.S. Shutdown Accomplish?

Democrats faced challenges in funding negotiations, leading to multiple government shutdowns and unresolved immigration enforcement issues.
US politics
fromwww.aljazeera.com
1 day ago

US Homeland Security shutdown to stretch on, despite Senate passing funding

The House has not voted on the Senate bill, prolonging the partial government shutdown affecting DHS funding and federal workers.
Privacy professionals
fromSecurityWeek
3 days ago

FBI Warns of Data Security Risks From China-Made Mobile Apps

Foreign-developed mobile applications pose significant data security risks, particularly those from China, according to an FBI alert.
DevOps
fromComputerWeekly.com
2 days ago

How 'Wikipedia of cyber' helps SAP make sense of threat data | Computer Weekly

SAP faces significant challenges in securing enterprise data amidst a complex threat landscape and evolving compliance requirements.
fromwww.theguardian.com
3 days ago

Chatter and fear about US military draft emerge as Trump's Iran war drags on

The provocative military activity has led to speculative conversation about what it would take to invade a country twice the population and three times the territory of Iraq.
US Elections
SF politics
fromNextgov.com
5 days ago

New contract for background investigations raises concerns about scale and risk

DCSA is modernizing its Case Processing Operations Center to enhance background investigations and incorporate Continuous Vetting for national security.
US politics
fromNextgov.com
23 hours ago

President's budget proposes folding beleaguered DHS intelligence office into headquarters

The Department of Homeland Security's intelligence office faces consolidation and potential workforce reductions under Trump's proposed budget for 2027.
fromTheregister
1 week ago

Only Trump decides when cyberwar turns into real war

The president should have a lot of leeway in which he determines whether or not the nation's going to respond kinetically. This flexibility is crucial in the evolving landscape of cyber warfare.
World politics
US news
fromwww.npr.org
1 week ago

Thousands of U.S. troops deploy to Middle East. And, the latest on DHS funding talks

President Trump is deploying more troops to the Middle East amid ongoing diplomatic talks with Iran.
#f-15e
US politics
fromTheregister
19 hours ago

Trump wants to slash $707M from CISA's budget

CISA faces a proposed $707 million budget cut, risking national cybersecurity and critical infrastructure management.
Information security
fromSecurityWeek
1 day ago

Mobile Attack Surface Expands as Enterprises Lose Control

Mobile device security is inadequate, with many organizations using critically outdated operating systems and exposing sensitive data to potential attacks.
World politics
fromwww.businessinsider.com
1 week ago

Total air defense is effectively impossible. In a major war, the West may have to make hard choices.

The West must make difficult choices about air defense priorities in large-scale wars due to limitations in resources and technology.
Artificial intelligence
fromAxios
2 weeks ago

Pentagon: Anthropic's foreign workforce poses security risks

Anthropic's employment of foreign nationals raises national security concerns, particularly regarding compliance with China's National Intelligence Law.
fromThe New Yorker
4 days ago

The Spy Who Helped Stop Iran from Getting the Bomb

Chalker claims that during his time at the C.I.A., he was instrumental in persuading Iranian scientists to defect, which provided crucial information that 'prevented Iran from getting a nuke.' His operations involved complex strategies and a deep understanding of the scientists' motivations.
Washington DC
US politics
fromwww.mediaite.com
18 hours ago

GOP Senator Says He Won't Back More Middle East Operations Without Declaration of War

Senator John Curtis insists on a formal declaration of war from Congress before funding further military operations in Iran.
fromLondon Business News | Londonlovesbusiness.com
2 hours ago

Bolton believes Trump is 'probably in panic mode' US hunt for the missing pilot - London Business News | Londonlovesbusiness.com

It sounds to me like he's probably back in a panic mode. Wishing he could find a way to declare victory and get out of this war, regardless of whether or not he opens the Strait of Hormuz before he does it.
World news
fromComputerworld
22 hours ago

A core infrastructure engineer pleads guilty to federal charges in insider attack

Rhyne's attack involved unauthorized remote desktop sessions, deletion of network administrator accounts, and changing of passwords, showcasing significant security vulnerabilities.
Information security
US politics
fromwww.npr.org
1 day ago

As DOJ prepares to share state voter data with DHS, a key privacy officer resigns

The DOJ is acquiring sensitive voter registration data, raising privacy concerns, as a key privacy officer resigns amid ongoing legal challenges.
Privacy professionals
fromTheregister
1 week ago

Private sector wants Feds' help to tackle China's Typhoons

Real-time collaboration between public and private sectors on cyber threats was proposed but never implemented, leading to ongoing challenges in combating cybercrime.
World news
fromIrish Independent
1 day ago

Trump vows to strike civilian infrastructure as Iran strikes at Gulf tech sites

Tehran plans to charge for passage through the Strait of Hormuz, aiming to ensure safe navigation amid rising tensions with the US.
US politics
fromenglish.elpais.com
1 day ago

The partial shutdown of the Department of Homeland Security: What's next, and Trump's deadline

Congress is deadlocked over immigration funding, leading to the longest partial shutdown of the Department of Homeland Security in U.S. history.
#data-breach
Information security
fromSecuritymagazine
1 day ago

AI Startup Mercor, Which Works With Open AI and Anthropic, Confirms Data Breach

Mercor, an AI startup, experienced a data breach involving 4 terabytes of stolen data linked to a supply chain attack by hacking groups.
Information security
fromTheregister
2 days ago

The company's biggest security hole lived in the breakroom

An internet-connected coffee machine caused a major data breach by exploiting security vulnerabilities in a corporate network.
Information security
fromSecuritymagazine
1 day ago

AI Startup Mercor, Which Works With Open AI and Anthropic, Confirms Data Breach

Mercor, an AI startup, experienced a data breach involving 4 terabytes of stolen data linked to a supply chain attack by hacking groups.
Information security
fromTheregister
2 days ago

The company's biggest security hole lived in the breakroom

An internet-connected coffee machine caused a major data breach by exploiting security vulnerabilities in a corporate network.
#ice
US politics
fromSilicon Canals
1 day ago

ICE confirms it deployed Paragon spyware inside the United States for drug trafficking cases - Silicon Canals

ICE is using commercial spyware domestically, raising constitutional concerns about warrantless surveillance and lack of oversight.
US politics
fromTechCrunch
2 days ago

ICE says it bought Paragon's spyware to use in drug trafficking cases | TechCrunch

ICE has utilized spyware from Paragon Solutions to combat drug trafficking and foreign terrorist organizations' use of encrypted communications.
US politics
fromSilicon Canals
1 day ago

ICE confirms it deployed Paragon spyware inside the United States for drug trafficking cases - Silicon Canals

ICE is using commercial spyware domestically, raising constitutional concerns about warrantless surveillance and lack of oversight.
US politics
fromTechCrunch
2 days ago

ICE says it bought Paragon's spyware to use in drug trafficking cases | TechCrunch

ICE has utilized spyware from Paragon Solutions to combat drug trafficking and foreign terrorist organizations' use of encrypted communications.
Information security
fromThe Hacker News
1 day ago

Drift Loses $285 Million in Durable Nonce Social Engineering Attack Linked to DPRK

Drift decentralized exchange lost $285 million due to a sophisticated attack involving unauthorized access and social engineering.
Venture
fromThe Cipher Brief
1 month ago

What the Latest Policy and Tech Shifts Mean for National Security

Counter-Unmanned Aerial Systems require integrated, multi-layered defense architectures combining non-kinetic and kinetic responses rather than isolated legacy technologies, as modern autonomous drones render traditional electronic warfare ineffective.
#north-korea
fromFortune
2 days ago
Information security

I knew about North Korean hackers-they still tricked me and got into my computer | Fortune

fromDevOps.com
3 days ago
Information security

North Korean Hackers Suspected in Supply Chain Attack on Popular Axios Project - DevOps.com

Information security
fromFortune
2 days ago

I knew about North Korean hackers-they still tricked me and got into my computer | Fortune

North Korean hackers are increasingly targeting individuals in the crypto industry, employing sophisticated deception tactics.
Information security
fromDevOps.com
3 days ago

North Korean Hackers Suspected in Supply Chain Attack on Popular Axios Project - DevOps.com

North Korean hackers hijacked the npm account of an axios maintainer, publishing malicious versions that installed a remote access trojan.
Information security
fromTechRepublic
3 days ago

New North Korean AI Hiring Scheme Targets US Companies

A North Korean operative attempted to infiltrate a cybersecurity firm using a stolen identity and AI-generated resume, highlighting vulnerabilities in hiring processes.
World news
fromThe Atlantic
3 days ago

The Most Important Decision of Trump's Presidency

U.S. military plans include potential ground assaults in Iran targeting Kharg Island and enriched uranium sites, pending President Trump's approval.
Information security
fromSecuritymagazine
3 days ago

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Companies are increasingly investing in executive protection due to rising threats, making it a strategic necessity for business continuity and resilience.
US politics
fromMail Online
3 days ago

Deadline issued for UFO videos as Congress warns of 'threat' to US

Lawmakers demand federal agencies release UFO videos by April 14, 2026, citing potential threats to US military forces.
US politics
fromNextgov.com
2 weeks ago

Annual intelligence assessment doesn't address foreign threats to US elections

The Trump administration's annual intelligence assessment omitted foreign election threats for the first time in nearly a decade, marking a significant policy shift during a midterm election year.
fromThe New Yorker
2 months ago

National Security Begins Behind the Toaster

Dear Secretary Pete Hegseth, I realize that this is a big ask, but would you please invade and take possession of my son and daughter-in-law's apartment? Or maybe you'd like to make them an offer first? Either way, as a concerned mother and patriot who believes that national security begins at home, I feel it's my duty to let you know that Otis and Luna, the co-dictators of Unit 4-C, at 439 Bergen Street, in Park Slope, Brooklyn, must be overthrown.
Humor
Information security
fromThe Cipher Brief
2 weeks ago

America Is Digitally Fragile - and Our Adversaries Know It

America faces unprecedented vulnerability as critical infrastructure systems are digitally dependent and interconnected, while adversaries possess capabilities to penetrate and pre-position for exploitation before conflict begins.
US politics
fromwww.mediaite.com
1 month ago

High Alert': DHS and FBI Monitoring Potential Threats on US Soil During Strikes on Iran

U.S. homeland security officials are coordinating enhanced monitoring and threat prevention measures following military action against Iran.
Information security
fromSecurityWeek
3 weeks ago

Iran-Linked Hackers Take Aim at US and Other Targets, Raising Risk of Cyberattacks During War

Pro-Iranian hackers are expanding cyberattacks from the Middle East into the United States, targeting defense contractors, medical device companies, and critical infrastructure like power stations and water plants.
Information security
fromNextgov.com
1 month ago

Potential US-built hacking tools obtained by foreign spies and cybercriminals, research says

A sophisticated iPhone hacking toolkit called Coruna, likely originating from U.S. government development, has proliferated to foreign intelligence agencies and criminal groups, compromising iOS devices through multiple exploit chains.
fromSecurityWeek
1 month ago

Cyber Insights 2026: Cyberwar and Rising Nation State Threats

Entering the cyber world is stepping into a warzone. Cyber is considered a war zone, and what happens there is described as cyberwar. But it's not that simple. War is conducted by nations (political), not undertaken by criminals (financial). Both are increasing in this war zone we call cyber, but the political threat is growing fast. Cyberwar is a complex subject, and a formal definition is difficult.
Information security
[ Load more ]