#counterterrorism-measures

[ follow ]
fromwww.mediaite.com
1 day ago

Weird Obsession With Death': Current and Former Defense Officials Sound the Alarm on Hegseth

Retired Army Special Forces officer Mike Nelson criticized Hegseth's rhetoric, stating, 'That's a necessary end to achieve goals through military force - you have to kill people to achieve them. That's not the end. It's a weird obsession with death for the sake of it.'
Right-wing politics
#cybersecurity
fromNextgov.com
1 day ago
Information security

US push to counter hackers draws industry deeper into offensive cyber debate

fromFortune
1 day ago
Privacy professionals

First they went after medtech, then Kash Patel. Iranian hackers' next target is likely 'low-hanging fruit' in water, energy, and tourism, experts say | Fortune

fromZDNET
1 day ago
Information security

Your router may be vulnerable to Russian hackers, FBI warns: 5 steps to take now

fromSecurityWeek
1 day ago
Information security

Industry Reactions to Iran Hacking ICS in Critical Infrastructure: Feedback Friday

Information security
fromNextgov.com
1 day ago

US push to counter hackers draws industry deeper into offensive cyber debate

The U.S. government seeks private sector involvement in cyber defense, but clarity on offensive roles remains uncertain.
Privacy professionals
fromFortune
1 day ago

First they went after medtech, then Kash Patel. Iranian hackers' next target is likely 'low-hanging fruit' in water, energy, and tourism, experts say | Fortune

Iran-linked hackers are targeting high-profile figures and critical infrastructure in the U.S. and Israel to sow disruption.
Cryptocurrency
fromnews.bitcoin.com
2 days ago

Treasury Launches Cybersecurity Initiative Expanding Threat Intelligence Access for Digital Asset Firms

U.S. Treasury expands cybersecurity coordination with digital asset firms to enhance protections and integrate with traditional finance.
Information security
fromZDNET
1 day ago

Your router may be vulnerable to Russian hackers, FBI warns: 5 steps to take now

FBI and NSA warn of Russian hackers targeting vulnerable routers, urging users to update firmware and strengthen passwords.
Information security
fromSecurityWeek
1 day ago

Industry Reactions to Iran Hacking ICS in Critical Infrastructure: Feedback Friday

Iran-linked hackers are targeting critical infrastructure, exploiting vulnerabilities in industrial control systems and operational technology.
Artificial intelligence
fromwww.theguardian.com
2 days ago

US summoned bank bosses to discuss cyber risks posed by Anthropic's latest AI model

US Treasury secretary convened bank chiefs to address cybersecurity risks from Anthropic's AI model, Claude Mythos, which poses unprecedented threats.
fromwww.theguardian.com
1 day ago

From Isis recruit to influencer: People think: you're that evil girl who ran away'

Tareena Shakil, now 36, presents a glamorous image, wearing a tailored dress and carrying a Louis Vuitton handbag, contrasting sharply with her past as a convicted terrorist.
Women in technology
fromThe Cipher Brief
1 day ago

Why Australia Needs a National Spy Museum

Many of the foundations that have underpinned Australia's security, prosperity and democracy are being tested: social cohesion is eroding, trust in institutions is declining, intolerance is growing, even truth itself is being undermined by conspiracy, mis- and disinformation.
World politics
#ai
fromFortune
22 hours ago
Artificial intelligence

These niche AI startups are trying to protect the Pentagon's secrets | Fortune

fromFast Company
1 day ago
Artificial intelligence

Is Mythos a blessing or a curse for cybersecurity? It depends on whom you ask

Information security
fromFortune
1 day ago

Anthropic's Mythos is a wake up call, but experts say the era of AI-driven hacking is already here | Fortune

Anthropic's Mythos AI model is too dangerous to release widely due to its ability to exploit software vulnerabilities.
Information security
fromNextgov.com
3 days ago

Anthropic's Glasswing initiative raises questions for US cyber operations

Anthropic is prioritizing cybersecurity by withholding a powerful AI model and launching Project Glasswing to enhance defenses against AI-driven attacks.
Artificial intelligence
fromFortune
22 hours ago

These niche AI startups are trying to protect the Pentagon's secrets | Fortune

AI companies face challenges in balancing technology use with government secrecy, highlighted by Anthropic's conflict with the Pentagon.
Artificial intelligence
fromFast Company
1 day ago

Is Mythos a blessing or a curse for cybersecurity? It depends on whom you ask

Claude Mythos AI model may enhance cybersecurity defenses but also poses risks for hackers due to its ability to identify vulnerabilities and create exploits.
Information security
fromFortune
1 day ago

Anthropic's Mythos is a wake up call, but experts say the era of AI-driven hacking is already here | Fortune

Anthropic's Mythos AI model is too dangerous to release widely due to its ability to exploit software vulnerabilities.
Information security
fromPsychology Today
1 day ago

What If We Used AI to Detect Threats to Humanity?

AI model Mythos escaped its sandbox, demonstrating capabilities to find software vulnerabilities, raising concerns about technological risks and threat assessment.
Information security
fromNextgov.com
3 days ago

Anthropic's Glasswing initiative raises questions for US cyber operations

Anthropic is prioritizing cybersecurity by withholding a powerful AI model and launching Project Glasswing to enhance defenses against AI-driven attacks.
#terrorism
Brooklyn
fromDailywire
3 days ago

Inspired By ISIS To Attack A NYC Jewish Center, A Pakistani National Just Entered A Surprising Plea

Muhammad Shahzeb Khan pleaded guilty to plotting an ISIS-inspired attack on a Jewish center in New York City, facing a potential life sentence.
France news
fromThe Local France
2 weeks ago

French anti-terror prosecutors probing foiled Paris bomb plot

France's counter-terrorism prosecutor is investigating a foiled bomb attack outside a Bank of America branch in Paris.
Right-wing politics
fromThe Atlantic
1 month ago

The Peculiar State of Islamic Terror in America

Two men threw homemade bombs at an anti-Muslim demonstration outside NYC's mayor's home, claiming ISIS inspiration, though no direct terrorist group connection was established.
Brooklyn
fromDailywire
3 days ago

Inspired By ISIS To Attack A NYC Jewish Center, A Pakistani National Just Entered A Surprising Plea

Muhammad Shahzeb Khan pleaded guilty to plotting an ISIS-inspired attack on a Jewish center in New York City, facing a potential life sentence.
France news
fromThe Local France
2 weeks ago

French anti-terror prosecutors probing foiled Paris bomb plot

France's counter-terrorism prosecutor is investigating a foiled bomb attack outside a Bank of America branch in Paris.
Right-wing politics
fromThe Atlantic
1 month ago

The Peculiar State of Islamic Terror in America

Two men threw homemade bombs at an anti-Muslim demonstration outside NYC's mayor's home, claiming ISIS inspiration, though no direct terrorist group connection was established.
Washington DC
fromNextgov.com
1 day ago

DHS intelligence office restructuring would still keep it under ODNI oversight

The White House plans to restructure DHS's intelligence unit while maintaining its oversight under the Office of the Director of National Intelligence.
US news
fromSecuritymagazine
2 days ago

Top Secret Clearance Holder Charged With Leaking Classified National Defense Information

Courtney Williams was arrested for allegedly sharing classified national defense information with unauthorized individuals, including a journalist, from 2022 to 2025.
Education
fromSecuritymagazine
2 days ago

School's Out, But Security's Not: Preparing for K-12 Summertime Security

Summer vacation does not reduce security threats in K-12 environments; instead, the nature of risks changes significantly.
SF politics
fromWIRED
3 days ago

Politicians Are Spending More Money on Security as They Increasingly Become Targets

Federal campaign spending on security for the 2024 election cycle exceeds five times that of the 2016 election due to rising threats against public servants.
fromThe Cipher Brief
3 days ago

Drones Are Changing Warfare And America Isn't Ready

The U.S. has discovered that air superiority and missile defense systems designed to counter tens/hundreds of aircraft and missiles is insufficient against asymmetric attacks of thousands of drones.
Russo-Ukrainian War
Apple
fromTheregister
2 days ago

Security reserchers tricked Apple Intelligence into cursing

Apple Intelligence can be hijacked through prompt injection, exposing millions of users to risk, but a fix was implemented in iOS 26.4 and macOS 26.4.
#iran
World news
fromTechCrunch
5 days ago

Iran threatens 'Stargate' AI data centers | TechCrunch

Iran threatens retaliation against U.S. data centers in response to ongoing military actions and threats from the United States.
Privacy professionals
fromAxios
1 week ago

Cyber warfare starts to get personal in war between U.S., Israel and Iran

Iran-linked hackers are using data leaks and intimidation tactics against individuals to influence public perception during the current conflict.
Information security
fromWIRED
4 days ago

Iran-Linked Hackers Are Sabotaging US Energy and Water Infrastructure

Iran has launched a hacking campaign targeting US industrial control systems, causing disruptions in critical infrastructure.
World news
fromTechCrunch
5 days ago

Iran threatens 'Stargate' AI data centers | TechCrunch

Iran threatens retaliation against U.S. data centers in response to ongoing military actions and threats from the United States.
Privacy professionals
fromAxios
1 week ago

Cyber warfare starts to get personal in war between U.S., Israel and Iran

Iran-linked hackers are using data leaks and intimidation tactics against individuals to influence public perception during the current conflict.
Information security
fromWIRED
4 days ago

Iran-Linked Hackers Are Sabotaging US Energy and Water Infrastructure

Iran has launched a hacking campaign targeting US industrial control systems, causing disruptions in critical infrastructure.
fromFortune
2 days ago

'This utter lack of communication and consultation flies in the face of federal law': states push against immigration detention plans | Fortune

ICE purchased a 418,000-square-foot warehouse in Surprise, Arizona, for $70 million, with plans for a processing site capable of handling 1,000 to 1,500 immigrants daily.
US politics
Intellectual property law
fromComputerworld
2 days ago

US court refuses to stay Pentagon's 'supply-chain risk' blacklisting of Anthropic

The federal appeals court upheld the Pentagon's supply-chain risk designation against Anthropic, conflicting with a California court's earlier decision.
Left-wing politics
fromwww.mediaite.com
4 days ago

Navy SEAL Who Killed Osama Bin Laden Says Trump Needs to Stop Making Inappropriate' Truth Social Posts: Take a Deep Breath'

Robert O'Neill advises Trump to reconsider his social media posts regarding threats to Iran, emphasizing the importance of presidential decorum and Geneva Convention rules.
fromwww.bbc.com
3 days ago

Teen tried to buy gun for terrorist attack, court told

Alfie Coleman, 21, from Great Notley, Essex, had spent the previous months messaging people who he thought were fellow extremists in 2023. In fact, they were MI5 operatives who arranged to sell him a pistol and ammunition.
London politics
Privacy professionals
fromSecurityWeek
3 days ago

The Hidden ROI of Visibility: Better Decisions, Better Behavior, Better Security

Visibility through security measures can deter undesirable behavior and enhance safety in challenging situations.
#artificial-intelligence
Artificial intelligence
fromNextgov.com
1 week ago

Old-school spycraft could make a comeback as AI undermines trust

AI may enhance intelligence gathering but also revive traditional espionage methods due to reliability issues with digital communications.
Artificial intelligence
fromNextgov.com
1 week ago

Old-school spycraft could make a comeback as AI undermines trust

AI may enhance intelligence gathering but also revive traditional espionage methods due to reliability issues with digital communications.
World politics
fromThe Cipher Brief
3 days ago

America's Drone Strategy Has a Supply Chain Problem

The U.S. defense technology ecosystem is shifting towards a model prioritizing rapid adaptation and drone technology in response to modern warfare challenges.
#ice
US politics
fromwww.theguardian.com
4 days ago

ICE arrested more than 800 people after tips from TSA, investigation shows

ICE arrested over 800 individuals based on TSA tips during Trump's second presidency, significantly increasing immigration enforcement efforts at airports.
fromSilicon Canals
1 week ago
US politics

ICE confirms it deployed Paragon spyware inside the United States for drug trafficking cases - Silicon Canals

US politics
fromThe Atlantic
2 months ago

Patriot! Here's How to Identify a Domestic Terrorist

Authorities label community members who resist ICE and aid migrants as domestic terrorists while targeting their protests and compassion.
US politics
fromwww.theguardian.com
4 days ago

ICE arrested more than 800 people after tips from TSA, investigation shows

ICE arrested over 800 individuals based on TSA tips during Trump's second presidency, significantly increasing immigration enforcement efforts at airports.
US politics
fromTechCrunch
1 week ago

ICE says it bought Paragon's spyware to use in drug trafficking cases | TechCrunch

ICE has utilized spyware from Paragon Solutions to combat drug trafficking and foreign terrorist organizations' use of encrypted communications.
US politics
fromSilicon Canals
1 week ago

ICE confirms it deployed Paragon spyware inside the United States for drug trafficking cases - Silicon Canals

ICE is using commercial spyware domestically, raising constitutional concerns about warrantless surveillance and lack of oversight.
#us-military
US news
fromNextgov.com
3 days ago

As aircraft losses mount, Pentagon wants a software fix to see through the fog of war

U.S. planes in the Middle East lack a common operating picture, leading to communication errors and aircraft losses.
World news
fromwww.businessinsider.com
5 days ago

Why the US military risks so much to save downed airmen stuck behind enemy lines

US forces conducted high-risk missions in Iran to rescue a downed pilot, reaffirming the commitment to never leave an American behind.
US news
fromNextgov.com
3 days ago

As aircraft losses mount, Pentagon wants a software fix to see through the fog of war

U.S. planes in the Middle East lack a common operating picture, leading to communication errors and aircraft losses.
World news
fromwww.businessinsider.com
5 days ago

Why the US military risks so much to save downed airmen stuck behind enemy lines

US forces conducted high-risk missions in Iran to rescue a downed pilot, reaffirming the commitment to never leave an American behind.
#cisa
SF politics
fromSecurityWeek
5 days ago

White House Seeks to Slash CISA Funding by $707 Million

The Trump administration proposes a $707 million budget cut for CISA to refocus on core missions and eliminate inefficiencies.
SF politics
fromSecurityWeek
5 days ago

White House Seeks to Slash CISA Funding by $707 Million

The Trump administration proposes a $707 million budget cut for CISA to refocus on core missions and eliminate inefficiencies.
Privacy professionals
fromWIRED
4 days ago

Men Are Buying Hacking Tools to Use Against Their Wives and Friends

Telegram groups facilitate the sale of hacking and surveillance services, promoting abusive content targeting women and girls.
Right-wing politics
fromTruthout
4 days ago

Trump's Budget Request Includes Funding an FBI Anti-"Domestic Terrorism" Center

Trump's budget includes a significant increase in counterterrorism funding and establishes an FBI-led center to identify domestic terrorists.
#cia
London politics
fromwww.theguardian.com
1 week ago

Overwhelmed' Prevent at risk of missing threats as referrals rise, UK counter-terror chief says

Prevent scheme faces overwhelming referrals, risking identification of genuine threats due to increased volume and lack of triage system.
#fbi
Privacy professionals
fromSecuritymagazine
6 days ago

Breach of FBI Surveillance System Considered a "Major Incident," Security Experts Weigh In

FBI confirms major breach of surveillance system, exposing sensitive data and potentially revealing criminal probes and surveillance targets.
Privacy professionals
fromTechRepublic
1 week ago

FBI Declares Surveillance System Breach a 'Major Incident'

A China-linked breach of an FBI surveillance system has been classified as a major incident, posing significant risks to US national security.
fromSecurityWeek
2 days ago

MITRE Releases Fight Fraud Framework

"These incidents involve the intentional use of deceptive or illegal practices to fraudulently obtain money, assets, or information from individuals or institutions, and include actions carried out over cyber channels."
Information security
NYC politics
fromwww.dw.com
1 month ago

US: Investigators looking at ISIS motive in NY bomb attack

Two men were arraigned on terrorism charges after throwing improvised explosive devices at far-right protesters outside NYC Mayor Zohran Mamdani's residence during a Christian nationalist anti-Islam demonstration.
Information security
fromTechRepublic
3 days ago

Why Operationalizing AI Security Is the Next Great Enterprise Hurdle

Security operations lag behind rapid tech advancements, leading to inefficiencies and risks in managing numerous security tools.
Information security
fromDevOps.com
2 days ago

Mallory Launches AI-Native Threat Intelligence Platform, Turning Global Threat Data Into Prioritized Action - DevOps.com

Mallory provides an AI-native threat intelligence platform that delivers actionable insights for enterprise security teams, focusing on real threats and vulnerabilities.
Information security
fromThe Hacker News
3 days ago

Shrinking the IAM Attack Surface through Identity Visibility and Intelligence Platforms (IVIP)

Enterprise IAM faces fragmentation, leading to Identity Dark Matter and a significant gap in visibility and security oversight.
US politics
fromLos Angeles Times
1 month ago

Iran's threats on U.S. soil: sleeper cells, lone wolves, cyberattacks and eerie numbers code

U.S. federal counterterrorism authorities warn Iran may launch retaliatory strikes on American soil through sleeper cells, terrorist groups, lone wolves, or cyberattacks following offensive operations against Iran.
Information security
fromSecurityWeek
4 days ago

The New Rules of Engagement: Matching Agentic Attack Speed

AI-enabled cyberattacks are currently occurring, with significant impacts on organizations and a widening gap between attackers and defenders.
US politics
fromDailycaller
1 month ago

FBI Reportedly Raids ISIS-Inspired Suspects' Homes, Says Bombs Thrown Outside Zohran Mamdani's Office

FBI raided two ISIS-inspired suspects' homes after improvised explosive devices were thrown during a protest clash outside New York City mayor's office, with six people apprehended and two held in custody.
fromThe New Yorker
2 months ago

National Security Begins Behind the Toaster

Dear Secretary Pete Hegseth, I realize that this is a big ask, but would you please invade and take possession of my son and daughter-in-law's apartment? Or maybe you'd like to make them an offer first? Either way, as a concerned mother and patriot who believes that national security begins at home, I feel it's my duty to let you know that Otis and Luna, the co-dictators of Unit 4-C, at 439 Bergen Street, in Park Slope, Brooklyn, must be overthrown.
Humor
US news
fromEmptywheel
2 months ago

NYPD's Spooks Didn't Find Two of the Most Significant Terrorists to Attempt Attacks on NYC

The NYPD built a secret intelligence unit targeting Muslim communities, using Israeli-derived mapping, informants in mosques, shredded records, and unofficial CIA links.
Information security
fromSecuritymagazine
4 days ago

Ransomware Response: How Businesses Regain Control Under Pressure

Ransomware attacks create urgent pressure, forcing quick decisions and impacting operations, legal obligations, and overall enterprise strategy.
Information security
fromThe Hacker News
4 days ago

The Hidden Cost of Recurring Credential Incidents

Credential incidents cause significant operational costs and disruptions, impacting IT teams and overall business productivity beyond just breach prevention.
Information security
fromThe Hacker News
5 days ago

Multi-OS Cyberattacks: How SOCs Close a Critical Risk in 3 Steps

Multi-OS attacks complicate SOC operations, leading to delays, fragmented evidence, and increased escalation volume, ultimately allowing attackers more time to operate.
fromSilicon Canals
5 days ago

When militaries share data centers with banks: how Gulf strikes exposed a structural flaw in global cloud infrastructure - Silicon Canals

When civilian banks, logistics platforms, and payment processors share physical data center infrastructure with military AI systems, those facilities become legitimate military targets under international humanitarian law - and the civilian services housed inside lose their legal protection.
Information security
US politics
fromwww.mediaite.com
1 month ago

High Alert': DHS and FBI Monitoring Potential Threats on US Soil During Strikes on Iran

U.S. homeland security officials are coordinating enhanced monitoring and threat prevention measures following military action against Iran.
[ Load more ]