#fleet-security

[ follow ]
World politics
fromFortune
2 hours ago

Trump risks confidence in U.S. role as guardian of global shipping | Fortune

Withdrawing US security from the Persian Gulf could disrupt global commerce and energy markets significantly.
from24/7 Wall St.
3 hours ago

Iran Wars Fuels RTX Growth Story as Defense Demand Rockets Higher

CEO Chris Calio emphasized the urgency of delivering critical products for national security, stating, 'We understand that our products are critical to national security. And I can tell you across the organization, we absolutely feel the responsibility and urgency to deliver more and to deliver it faster.'
Business
US politics
fromArs Technica
11 hours ago

CBP facility codes sure seem to have leaked via online flashcards

Immigration offenses and internal systems of CBP are detailed in flashcards, highlighting procedures and responsibilities of agents.
#cybersecurity
fromTechCrunch
1 day ago
Information security

After fighting malware for decades, this cybersecurity veteran is now hacking drones | TechCrunch

EU data protection
fromTechCrunch
2 days ago

Europe's cyber agency blames hacking gangs for massive data breach and leak | TechCrunch

A cybercriminal group known as TeamPCP hacked the EU's executive body, stealing 92 gigabytes of data, including personal information.
Information security
fromTNW | Eu
1 day ago

European Commission breached after hackers poisoned open-source security tool Trivy

A major data breach at the European Commission was caused by TeamPCP exploiting a supply chain attack on the Trivy security tool.
EU data protection
fromSecurityWeek
1 day ago

European Commission Confirms Data Breach Linked to Trivy Supply Chain Attack

Hackers stole over 300GB of data from the European Commission's AWS environment using a compromised API key from the Trivy supply chain attack.
Information security
fromTechCrunch
1 day ago

After fighting malware for decades, this cybersecurity veteran is now hacking drones | TechCrunch

Mikko Hyppönen emphasizes the invisible nature of cybersecurity work, comparing it to Tetris where successes vanish and failures accumulate.
Node JS
fromInfoQ
6 days ago

Are We Ready for the Next Cyber Security Crisis Like Log4shell?

Organizations are not prepared for the next cybersecurity crisis, similar to Log4Shell.
EU data protection
fromTechCrunch
2 days ago

Europe's cyber agency blames hacking gangs for massive data breach and leak | TechCrunch

A cybercriminal group known as TeamPCP hacked the EU's executive body, stealing 92 gigabytes of data, including personal information.
Information security
fromTNW | Eu
1 day ago

European Commission breached after hackers poisoned open-source security tool Trivy

A major data breach at the European Commission was caused by TeamPCP exploiting a supply chain attack on the Trivy security tool.
Cryptocurrency
fromnews.bitcoin.com
1 day ago

Human Error, Not Hacking, Cited as Top Cause for Crypto Access Loss

Human error is the leading cause of cryptocurrency access loss, affecting 35% of holders, primarily due to forgotten passwords and lost seed phrases.
Travel
fromTravel + Leisure
1 day ago

A Former TSA Agent Shares The No. 1 Reason Bags Get Flagged at Security-and How to Prevent It From Happening

Human error, especially with laptops, is the primary reason for carry-on luggage being flagged at airport security.
#strait-of-hormuz
World politics
fromwww.aljazeera.com
3 days ago

UK-led coalition of 40 countries vows action on Hormuz Strait gridlock

British PM Keir Starmer emphasizes diplomatic solutions to reopen the Strait of Hormuz amid tensions from Iran's actions against commercial shipping.
World politics
fromwww.aljazeera.com
3 days ago

UK-led coalition of 40 countries vows action on Hormuz Strait gridlock

British PM Keir Starmer emphasizes diplomatic solutions to reopen the Strait of Hormuz amid tensions from Iran's actions against commercial shipping.
fromFuturism
3 days ago

Delivery Robot Companies in Trouble as Bot Become Targets for Vandalism

Out of the company's first 80,000 deliveries the bots finished on campus, about 1,600 involved incidents of vandalism. At a cost of $2,500 per Kiwibot, the damage adds up quick.
London startup
fromWIRED
2 days ago

CBP Facility Codes Sure Seem to Have Leaked Via Online Flashcards

The public Quizlet set contained information about alleged codes for specific facility entrances. 'Checkpoint doors code?' asked one card, with a specific four-digit combination listed in response.
Privacy professionals
Science
fromFast Company
2 days ago

The Navy brought a retired laser weapon back for a new drone fight

The U.S. Navy has revived a high-energy laser weapon for military exercises, enhancing capabilities against asymmetric threats.
#iran
World news
fromwww.npr.org
4 days ago

Is the U.S. Navy ready to clear sea mines in the Persian Gulf?

Iran threatens to mine the Strait of Hormuz, prompting U.S. Navy preparations for mine-clearing operations.
World news
fromwww.npr.org
4 days ago

Is the U.S. Navy ready to clear sea mines in the Persian Gulf?

Iran threatens to mine the Strait of Hormuz, prompting U.S. Navy preparations for mine-clearing operations.
#human-trafficking
European startups
fromTechCrunch
5 days ago

FedEx chooses partnerships over proprietary tech for its automation strategy | TechCrunch

FedEx partners with Berkshire Grey to develop robots for bulk package unloading, aiming to enhance warehouse automation.
UK politics
fromwww.independent.co.uk
5 days ago

Russia's shadow fleet pass through UK waters after boarding threat

The Independent provides critical reporting on various issues, emphasizing the need for on-ground journalism and accessible news without paywalls.
#ai
Artificial intelligence
fromSecurityWeek
6 days ago

Silent Drift: How LLMs Are Quietly Breaking Organizational Access Control

AI assistance in policy as code can introduce serious flaws, leading to incorrect access permissions despite syntactically valid policies.
London politics
fromwww.bbc.com
5 days ago

'Ship disaster victims deserve to have story told'

The sinking of the Princess Alice in 1878 resulted in over 700 deaths, yet remains largely forgotten despite its significance in maritime safety reforms.
#data-integrity
fromComputerworld
5 days ago
Data science

IT lesson from the Iran war: AI makes your data problems so much worse

AI can exacerbate existing data issues in enterprises, as demonstrated by the US military's bombing due to outdated intelligence.
Information security
fromSecurityWeek
5 days ago

The Next Cybersecurity Crisis Isn't Breaches-It's Data You Can't Trust

Data integrity now encompasses data trust, emphasizing the importance of reliable data in AI-driven decision-making.
Data science
fromComputerworld
5 days ago

IT lesson from the Iran war: AI makes your data problems so much worse

AI can exacerbate existing data issues in enterprises, as demonstrated by the US military's bombing due to outdated intelligence.
Information security
fromSecurityWeek
5 days ago

The Next Cybersecurity Crisis Isn't Breaches-It's Data You Can't Trust

Data integrity now encompasses data trust, emphasizing the importance of reliable data in AI-driven decision-making.
fromwww.theguardian.com
5 days ago

US marine detained after TSA finds live explosive round in checked bag

The marine told investigators he found the round in the field about a year ago and kept it, thinking it wasn't live. Due to extensive rust and corrosion, the round's original identifying paint markings were no longer visible, making it difficult to determine whether it was an inert training munition or a live explosive device.
Los Angeles
SF politics
fromNextgov.com
6 days ago

New contract for background investigations raises concerns about scale and risk

DCSA is modernizing its Case Processing Operations Center to enhance background investigations and incorporate Continuous Vetting for national security.
#gps
Science
fromWIRED
5 days ago

The US Military's GPS Software Is an $8 Billion Mess

The GPS OCX system, despite being delivered, remains nonoperational and faces potential cancellation due to ongoing issues.
Science
fromWIRED
5 days ago

The US Military's GPS Software Is an $8 Billion Mess

The GPS OCX system, despite being delivered, remains nonoperational and faces potential cancellation due to ongoing issues.
Remote teams
fromTheregister
6 days ago

Security contractor blew the whistle on shabby support crew

Brad, a security contractor, faced challenges with antivirus alerts while working in a labor hire company's office without proper IT support.
fromSecurityWeek
6 days ago

Telnyx Targeted in Growing TeamPCP Supply Chain Attack

The WAV file is a valid audio file. It passes MIME-type checks. But the audio frame data contains a base64-encoded payload. Decode the frames, take the first 8 bytes as the XOR key, XOR the rest, and you have your executable or Python script.
Python
#ice
US politics
fromSilicon Canals
3 days ago

ICE confirms it deployed Paragon spyware inside the United States for drug trafficking cases - Silicon Canals

ICE is using commercial spyware domestically, raising constitutional concerns about warrantless surveillance and lack of oversight.
US politics
fromTechCrunch
3 days ago

ICE says it bought Paragon's spyware to use in drug trafficking cases | TechCrunch

ICE has utilized spyware from Paragon Solutions to combat drug trafficking and foreign terrorist organizations' use of encrypted communications.
US politics
fromSilicon Canals
3 days ago

ICE confirms it deployed Paragon spyware inside the United States for drug trafficking cases - Silicon Canals

ICE is using commercial spyware domestically, raising constitutional concerns about warrantless surveillance and lack of oversight.
US politics
fromTechCrunch
3 days ago

ICE says it bought Paragon's spyware to use in drug trafficking cases | TechCrunch

ICE has utilized spyware from Paragon Solutions to combat drug trafficking and foreign terrorist organizations' use of encrypted communications.
#data-breach
Privacy professionals
fromSilicon Canals
2 days ago

A fintech app asked users for their passports - then left 360,000 files unprotected for five years - Silicon Canals

A money transfer app exposed over 360,000 sensitive files on a public server for nearly five years, including unencrypted personal documents.
Information security
fromTheregister
3 days ago

The company's biggest security hole lived in the breakroom

An internet-connected coffee machine caused a major data breach by exploiting security vulnerabilities in a corporate network.
Privacy professionals
fromSilicon Canals
2 days ago

A fintech app asked users for their passports - then left 360,000 files unprotected for five years - Silicon Canals

A money transfer app exposed over 360,000 sensitive files on a public server for nearly five years, including unencrypted personal documents.
Information security
fromTheregister
3 days ago

The company's biggest security hole lived in the breakroom

An internet-connected coffee machine caused a major data breach by exploiting security vulnerabilities in a corporate network.
Podcast
fromSecuritymagazine
1 week ago

What Does It Take to Be an Outstanding CSO or CISO?

Outstanding security leaders often come from non-traditional backgrounds, with 40% of recent CSO-CISO Hall of Fame honorees starting in the private sector.
DevOps
fromInfoQ
1 week ago

Panel: Security Against Modern Threats

Modern threats to software supply chains require resilience by design, integrating security into engineering workflows and empowering developers with the right tools.
UK news
fromwww.independent.co.uk
4 days ago

First sea lord admits Royal Navy is not ready for war

The Royal Navy is not currently ready for war, according to General Sir Gwyn Jenkins, who emphasizes the need for further preparation.
fromComputerworld
2 days ago

A core infrastructure engineer pleads guilty to federal charges in insider attack

Rhyne's attack involved unauthorized remote desktop sessions, deletion of network administrator accounts, and changing of passwords, showcasing significant security vulnerabilities.
Information security
#cyberattack
Privacy professionals
fromTechCrunch
4 days ago

Hasbro says it was hacked, and may take 'several weeks' to recover | TechCrunch

Hasbro confirmed a cyberattack, prompting system shutdowns and ongoing investigations, with potential operational disruptions lasting several weeks.
Information security
fromTechCrunch
2 weeks ago

Cyberattack on vehicle breathalyzer company leaves drivers stranded across the US | TechCrunch

A cyberattack on Intoxalock has stranded drivers nationwide by preventing vehicle breathalyzer calibrations.
Privacy professionals
fromTechCrunch
4 days ago

Hasbro says it was hacked, and may take 'several weeks' to recover | TechCrunch

Hasbro confirmed a cyberattack, prompting system shutdowns and ongoing investigations, with potential operational disruptions lasting several weeks.
Information security
fromTechCrunch
2 weeks ago

Cyberattack on vehicle breathalyzer company leaves drivers stranded across the US | TechCrunch

A cyberattack on Intoxalock has stranded drivers nationwide by preventing vehicle breathalyzer calibrations.
fromWIRED
5 days ago

The Broken System That Keeps Shipping Crews Stranded in the Strait of Hormuz

When the war broke out, we put a Warlike Operations Area Committee in place to address the protection of seafarers in the region. The organization has identified certain maritime routes in the region, including the Arabian Gulf, the Strait of Hormuz, and some parts of the Gulf of Oman as high-risk areas, encouraging ship owners to allow seafarers to terminate contracts if they choose not to operate in those zones.
World politics
fromwww.theguardian.com
5 days ago

35,000 pints of stolen Guinness, 950 wheels of pilfered cheese: can the UK's cargo theft crisis be stopped?

Dawber noticed 17 pallets of golfing equipment, stolen three weeks prior, worth about 1 million. He also found 18 pallets of Asics trainers stolen three years earlier.
UK news
Information security
fromSecurityWeek
2 days ago

Mobile Attack Surface Expands as Enterprises Lose Control

Mobile device security is inadequate, with many organizations using critically outdated operating systems and exposing sensitive data to potential attacks.
#supply-chain-security
Information security
fromTechzine Global
2 days ago

Axios supply chain attack victim posts postmortem to prevent a repeat

Axios was compromised for three hours, distributing Remote Access Trojans due to a sophisticated social engineering attack by North Korean group UNC1069.
Information security
fromTechzine Global
2 days ago

Axios supply chain attack victim posts postmortem to prevent a repeat

Axios was compromised for three hours, distributing Remote Access Trojans due to a sophisticated social engineering attack by North Korean group UNC1069.
Information security
fromSecuritymagazine
2 weeks ago

Threat Actors Target the Entire Retail Supply Chain

Threat actors exploit shared supply chain vulnerabilities between wholesalers and retailers, with over 70% of retailers and 60% of wholesalers having exposed credentials, enabling widespread initial access.
fromwww.dw.com
2 weeks ago

'Vulnerable' satellites guide the world and its wars

Signals from Global Navigation Satellite Systems are quite vulnerable. They are exceptionally weak, meaning that any radio noise near their frequency, accidental or malicious, can interfere with reception. I am confident that there are people in every government who understand the problem. The challenge is getting leadership to both understand and act to reduce the risk.
Information security
fromInfoWorld
2 days ago

CERT-EU blames Trivy supply chain attack for Europa.eu data breach

TeamPCP exploited Trivy to access sensitive cloud credentials and data, creating significant vulnerabilities for organizations.
#fcc
Information security
fromComputerWeekly.com
5 days ago

Banning routers won't fix what's already broken | Computer Weekly

The FCC's ban on foreign-made routers addresses future procurement, not current security risks, as routers are already vulnerable and widely deployed.
Information security
fromComputerWeekly.com
5 days ago

Banning routers won't fix what's already broken | Computer Weekly

The FCC's ban on foreign-made routers addresses future procurement, not current security risks, as routers are already vulnerable and widely deployed.
Business
fromLondon Business News | Londonlovesbusiness.com
3 weeks ago

Why UK businesses are taking physical security more seriously - London Business News | Londonlovesbusiness.com

UK businesses are shifting physical security from a background facilities concern to a central risk management priority as operational complexity and vulnerabilities increase.
Information security
fromInfoQ
2 days ago

Open Source Security Tool Trivy Hit by Supply Chain Attack, Prompting Urgent Industry Response

A malicious release of the Trivy vulnerability scanner exposed critical weaknesses in software supply chain security, allowing for potential credential theft.
fromwww.scientificamerican.com
3 weeks ago

GPS spoofing is scrambling ships in the Strait of Hormuz

In the two weeks since the U.S. and Israel launched attacks against Iran, thousands of vessels have experienced navigation interference in the Persian Gulf. Commercial shipping through the strait, which carries roughly 20 percent of the world's oil, has nearly ground to a halt. Though rocket and drone attacks are also to blame, another major hazard is GPS spoofing—the transmission of counterfeit satellite navigation signals.
Science
UK news
fromComputerWeekly.com
3 weeks ago

Unreliable fleet connectivity driving employee exodus | Computer Weekly

UK fleet operators face significant connectivity challenges that threaten competitiveness, with unreliable networks causing customer complaints and operational disruptions despite limited failover protections.
Privacy professionals
fromMedCity News
2 weeks ago

The Evolving Landscape of Privacy and Cybersecurity: Essential Strategies for Legal and Compliance Professionals - MedCity News

Organizations must combine strong controls with comprehensive employee training and accountability culture to effectively protect sensitive data and comply with evolving privacy laws.
World news
fromWIRED
1 month ago

Attacks on GPS Spike Amid US and Israeli War on Iran

GPS jamming and spoofing attacks have disrupted over 1,100 ships in the Strait of Hormuz since February 28, making navigation critically dangerous and threatening vital oil trade routes.
Privacy professionals
fromwww.housingwire.com
2 weeks ago

Reducing risk: Why logging, protection, and review matter

Application logs are critical cybersecurity safeguards that provide visibility into system behavior, enabling early detection of security threats and operational issues in real estate and mortgage lending organizations.
#supply-chain-attack
Information security
fromInfoWorld
2 days ago

Claude Code leak puts enterprise trust at risk as security, governance concerns mount

Leaks threaten Anthropic's market position and raise security concerns about its AI coding tools.
Information security
fromSecuritymagazine
4 days ago

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Companies are increasingly investing in executive protection due to rising threats, making it a strategic necessity for business continuity and resilience.
Information security
fromnews.bitcoin.com
5 days ago

Chainalysis Deploys AI Agents to Counter Criminal Use of Artificial Intelligence in Crypto

Chainalysis introduces AI agents to enhance fraud detection and compliance without requiring deep technical expertise, ensuring data quality and human oversight.
Information security
fromSecurityWeek
5 days ago

Stolen Logins Are Fueling Everything From Ransomware to Nation-State Cyberattacks

Stolen credentials significantly enhance ransomware attacks, enabling illegitimate access and operational disruption within networks.
Information security
fromFortune
6 days ago

Cargo theft costs U.S. trucking $18 million a day and is 'unlike anything our industry has faced before,' logistics exec warns | Fortune

Cargo theft has become a significant threat to the U.S. supply chain, costing the industry billions annually.
fromComputerworld
5 days ago

Why the axios supply chain attack should have Apple worried

The attack illustrates the extent to which Big Tech relies on open-source software. Without the many contributions of open-source developers, Apple, Amazon, Google, Microsoft, and everyone else would need to invest vast sums in building more of the infrastructure of our digital world.
Information security
Information security
fromThe Hacker News
2 weeks ago

Why Security Validation Is Becoming Agentic

Security validation tools operate in silos while attackers exploit interconnected systems, creating a structural blind spot that Agentic Exposure Validation can address through continuous, autonomous, context-aware assessment.
Information security
fromThe Hacker News
3 weeks ago

Dozens of Vendors Patch Security Flaws Across Enterprise Software and Network Devices

SAP released security updates for two critical vulnerabilities enabling arbitrary code execution: CVE-2019-17571 in Quotation Management Insurance and CVE-2026-27685 in NetWeaver Enterprise Portal Administration.
Information security
fromTheregister
1 month ago

Threat intelligence supply chain is full of weak links

China's ban on foreign security software threatens the global threat intelligence ecosystem by risking data fragmentation and weakening international cybersecurity collaboration.
fromTechCrunch
2 months ago

Exclusive: US cargo tech company publicly exposed its shipping systems and customer data to the web

For the past year, security researchers have been urging the global shipping industry to shore up their cyber defenses after a spate of cargo thefts were linked to hackers. The researchers say they have seen elaborate hacks targeting logistics companies to hijack and redirect large amounts of their customers' products into the hands of criminals, in what has become an alarming collusion between hackers and real-life organized crime gangs.
Information security
Information security
fromSecuritymagazine
1 month ago

Understanding Breaches Before and After They Happen: What Every Organization Should Know

Most security breaches result from neglected fundamentals—human error, unpatched systems, weak authentication, and poor network segmentation—rather than advanced, novel exploits.
[ Load more ]