#jamming-and-spoofing

[ follow ]
Information security
fromSecurityWeek
1 hour ago

The New Rules of Engagement: Matching Agentic Attack Speed

AI-enabled cyberattacks are currently occurring, with significant impacts on organizations and a widening gap between attackers and defenders.
Science
fromFast Company
4 days ago

The Navy brought a retired laser weapon back for a new drone fight

The U.S. Navy has revived a high-energy laser weapon for military exercises, enhancing capabilities against asymmetric threats.
#ice
US politics
fromSilicon Canals
4 days ago

ICE confirms it deployed Paragon spyware inside the United States for drug trafficking cases - Silicon Canals

ICE is using commercial spyware domestically, raising constitutional concerns about warrantless surveillance and lack of oversight.
US politics
fromTechCrunch
5 days ago

ICE says it bought Paragon's spyware to use in drug trafficking cases | TechCrunch

ICE has utilized spyware from Paragon Solutions to combat drug trafficking and foreign terrorist organizations' use of encrypted communications.
US politics
fromSilicon Canals
4 days ago

ICE confirms it deployed Paragon spyware inside the United States for drug trafficking cases - Silicon Canals

ICE is using commercial spyware domestically, raising constitutional concerns about warrantless surveillance and lack of oversight.
US politics
fromTechCrunch
5 days ago

ICE says it bought Paragon's spyware to use in drug trafficking cases | TechCrunch

ICE has utilized spyware from Paragon Solutions to combat drug trafficking and foreign terrorist organizations' use of encrypted communications.
Artificial intelligence
fromNextgov.com
6 days ago

Old-school spycraft could make a comeback as AI undermines trust

AI may enhance intelligence gathering but also revive traditional espionage methods due to reliability issues with digital communications.
Information security
fromTechCrunch
52 minutes ago

Russian government hackers broke into thousands of home routers to steal passwords | TechCrunch

Russian hackers hijacked thousands of routers globally to redirect internet traffic and steal passwords and access tokens.
Privacy professionals
fromAxios
1 week ago

Cyber warfare starts to get personal in war between U.S., Israel and Iran

Iran-linked hackers are using data leaks and intimidation tactics against individuals to influence public perception during the current conflict.
Psychology
fromwww.theguardian.com
1 week ago

They feel true': political deepfakes are growing in influence even if people know they aren't real

Online content creators are fabricating people and images for propaganda and profit, blurring the lines between reality and fiction.
Information security
fromThe Hacker News
5 hours ago

The Hidden Cost of Recurring Credential Incidents

Credential incidents cause significant operational costs and disruptions, impacting IT teams and overall business productivity beyond just breach prevention.
DevOps
fromTheregister
1 week ago

Documentation can contain malicious instructions for agents

Context Hub may enhance API usage but poses risks of software supply chain attacks through unverified documentation.
fromWIRED
1 week ago

The US Military's GPS Software Is an $8 Billion Mess

The Space Force's formal acceptance of the ground system from RTX last year marked a turning point for OCX after years of blunders. The handover allowed military teams to validate the new control software and upgraded ground facilities before declaring the system ready for operational service.
Science
Information security
fromSilicon Canals
20 hours ago

A single maintainer, a fake company, and a three-hour window: inside the Axios supply chain hijack - Silicon Canals

A single maintainer's vulnerability led to a significant security breach in a widely used JavaScript library, exposing thousands of systems to potential credential theft.
US news
fromwww.mediaite.com
2 weeks ago

Alarming Number of Unauthorized Drones' Spotted Over US Air Base

Unidentified drones were spotted over Barksdale Air Force Base, prompting a shelter-in-place order and raising security concerns amid tensions with Iran.
fromwww.dw.com
2 weeks ago

'Vulnerable' satellites guide the world and its wars

Signals from Global Navigation Satellite Systems are quite vulnerable. They are exceptionally weak, meaning that any radio noise near their frequency, accidental or malicious, can interfere with reception. I am confident that there are people in every government who understand the problem. The challenge is getting leadership to both understand and act to reduce the risk.
#cybersecurity
fromSilicon Canals
2 days ago
Information security

The man who discovered the ILOVEYOU virus is now fighting Russian drones using the same playbook - Silicon Canals

fromTechCrunch
3 days ago
Information security

After fighting malware for decades, this cybersecurity veteran is now hacking drones | TechCrunch

Information security
fromThe Hacker News
6 days ago

3 Reasons Attackers Are Using Your Trusted Tools Against You (And Why You Don't See It Coming)

Cyber attackers increasingly exploit legitimate tools within environments, making detection difficult and expanding the attack surface organizations must manage.
Information security
fromTechzine Global
6 days ago

AI gives attackers superpowers, so defenders must use it too

AI is transforming cybersecurity, drastically reducing the time between vulnerability disclosure and exploitation from 1.5 years to mere hours.
Information security
fromSilicon Canals
2 days ago

The man who discovered the ILOVEYOU virus is now fighting Russian drones using the same playbook - Silicon Canals

Mikko Hyppönen has transitioned from cybersecurity to anti-drone defense, focusing on systems for law enforcement and military clients.
Information security
fromTechCrunch
3 days ago

After fighting malware for decades, this cybersecurity veteran is now hacking drones | TechCrunch

Mikko Hyppönen emphasizes the invisible nature of cybersecurity work, comparing it to Tetris where successes vanish and failures accumulate.
Information security
fromThe Hacker News
3 days ago

China-Linked TA416 Targets European Governments with PlugX and OAuth-Based Phishing

TA416 has intensified cyberattacks on European government and diplomatic organizations since mid-2025, utilizing advanced malware delivery techniques.
Information security
fromThe Hacker News
5 days ago

ThreatsDay Bulletin: Pre-Auth Chains, Android Rootkits, CloudTrail Evasion & 10 More Stories

The ThreatsDay Bulletin provides a concise overview of current cybersecurity threats and trends affecting system safety.
Information security
fromThe Hacker News
6 days ago

3 Reasons Attackers Are Using Your Trusted Tools Against You (And Why You Don't See It Coming)

Cyber attackers increasingly exploit legitimate tools within environments, making detection difficult and expanding the attack surface organizations must manage.
Information security
fromTechzine Global
6 days ago

AI gives attackers superpowers, so defenders must use it too

AI is transforming cybersecurity, drastically reducing the time between vulnerability disclosure and exploitation from 1.5 years to mere hours.
Russo-Ukrainian War
fromenglish.elpais.com
3 weeks ago

The front line basements where Ukraine specializes in electronic warfare

Ukrainian soldiers are manufacturing homemade anti-drone systems on the front lines, representing a grassroots weapons production effort alongside official defense industries in response to evolving drone warfare tactics.
Remote teams
fromwww.theguardian.com
4 weeks ago

Keyboard jamming: the sneaky way to make your boss think you're working from home

Employees use keyboard jamming techniques to appear active while working from home, but employers are deploying advanced monitoring tools that detect actual work rather than just keyboard activity, leading to numerous dismissals across organizations including police forces.
World news
fromwww.theguardian.com
3 weeks ago

These aren't AI firms, they're defense contractors. We can't let them hide behind their models

AI warfare systems replicate the 'fog procedure' military strategy by automating chosen blindness through algorithmic opacity, enabling violence while obscuring accountability and decision-making responsibility.
fromLADbible
4 weeks ago

Police officers caught using 'key jammer' WFH hack to go to gym or play golf while 'working'

A total of 28 police officers, staff and contractors faced misconduct proceedings following the probe, as the anti-corruption unit found that there was 'abnormal key stroke behaviour' on GMP-issued devices. Key-jamming can involve items being left on a computer keypad or the device being manipulated to make someone appear to be active at work.
UK news
Artificial intelligence
fromSilicon Canals
3 weeks ago

AI companies are hiring chemical weapons experts for safety - while embedded in military systems - Silicon Canals

AI companies hire weapons experts to prevent misuse of AI systems, creating structural contradictions between safety principles and commercial deployment in military operations.
Privacy technologies
fromWIRED
1 month ago

This Jammer Wants to Block Always-Listening AI Wearables. It Probably Won't Work

Deveillance's Spectre device claims to detect microphones via RF emissions and NLJD technology, but experts dispute its effectiveness and question whether it can reliably identify all microphone types.
World politics
fromWIRED
4 weeks ago

GPS Attacks Near Iran Are Wreaking Havoc on Delivery and Mapping Apps

GPS disruption through jamming and spoofing in Middle Eastern conflicts affects civilian navigation, delivery apps, and infrastructure by either blocking signals or providing false location data.
#malware
fromSecurityWeek
5 days ago
Information security

Sophisticated CrystalX RAT Emerges

CrystalX RAT is a new malware-as-a-service combining spyware, stealer, and remote access capabilities, promoted on Telegram and YouTube.
Information security
fromThe Hacker News
1 week ago

ThreatsDay Bulletin: PQC Push, AI Vuln Hunting, Pirated Traps, Phishing Kits & 20 More Stories

A sophisticated malware campaign targets Web3 support teams using deceptive links to deliver malicious executables and establish persistent communication with threat actors.
Information security
fromThe Hacker News
1 week ago

ThreatsDay Bulletin: PQC Push, AI Vuln Hunting, Pirated Traps, Phishing Kits & 20 More Stories

A sophisticated malware campaign targets Web3 support teams using deceptive links to deliver malicious executables and establish persistent communication with threat actors.
US news
fromFortune
4 weeks ago

Pentagon and FAA to conduct anti-drone laser tests after earlier deployments closed Texas airspace twice in the last month | Fortune

The Pentagon and FAA agreed to conduct anti-drone laser tests in New Mexico after military deployment caused two airspace closures in Texas without proper FAA coordination.
Artificial intelligence
fromFuturism
3 weeks ago

The Military's AI Fever Is Leading Into Disaster, Critics Say

The US military's rapid AI deployment risks unsafe systems causing excessive civilian harm, wrongful arrests, and civil liberties violations without adequate human oversight safeguards.
World news
fromwww.npr.org
4 weeks ago

Old-school tricks and AI tech are weapons in the Iran war

Israel and the U.S. employed deception tactics, cyber operations, and AI technology in coordinated military operations against Iran, disrupting Iranian communications and sensor networks while using hacked surveillance to locate targets.
Information security
fromFortune
5 days ago

I knew about North Korean hackers-they still tricked me and got into my computer | Fortune

North Korean hackers are increasingly targeting individuals in the crypto industry, employing sophisticated deception tactics.
fromwww.scientificamerican.com
3 weeks ago

GPS spoofing is scrambling ships in the Strait of Hormuz

In the two weeks since the U.S. and Israel launched attacks against Iran, thousands of vessels have experienced navigation interference in the Persian Gulf. Commercial shipping through the strait, which carries roughly 20 percent of the world's oil, has nearly ground to a halt. Though rocket and drone attacks are also to blame, another major hazard is GPS spoofing—the transmission of counterfeit satellite navigation signals.
Science
#drone-warfare
World news
fromIntelligencer
1 month ago

The Future of War Is Drones Bombing Data Centers

Iranian drone strikes on data centers in the UAE and Bahrain demonstrate a new warfare strategy targeting critical digital infrastructure, causing cascading internet outages across multiple regions and affecting major global companies.
World news
fromIntelligencer
1 month ago

The Future of War Is Drones Bombing Data Centers

Iranian drone strikes on data centers in the UAE and Bahrain demonstrate a new warfare strategy targeting critical digital infrastructure, causing cascading internet outages across multiple regions and affecting major global companies.
Information security
fromTechzine Global
6 days ago

North Korea behind social engineering attack on Axios project

Attackers compromised the Axios maintainer's account through social engineering, publishing malicious versions that installed a Remote Access Trojan on victims' systems.
Venture
fromThe Cipher Brief
1 month ago

What the Latest Policy and Tech Shifts Mean for National Security

Counter-Unmanned Aerial Systems require integrated, multi-layered defense architectures combining non-kinetic and kinetic responses rather than isolated legacy technologies, as modern autonomous drones render traditional electronic warfare ineffective.
fromwww.dw.com
1 month ago

Fact check: Are China's robot soldiers just AI fakes?

A dozen humanoid robots stand in front of a snow-covered mountain range. They hold machine guns and run across a shooting range, kneeling down to shoot at targets and change magazines, then maneuvering through an obstacle course. The setting for these scenes in a 48-second video currently circulating on social media is supposedly China, with the national flag flying in the background. But is it real? In many languages, such as Turkish shown here, the claim spread that the video shows a real military exercise.
Tech industry
World news
fromWIRED
1 month ago

Attacks on GPS Spike Amid US and Israeli War on Iran

GPS jamming and spoofing attacks have disrupted over 1,100 ships in the Strait of Hormuz since February 28, making navigation critically dangerous and threatening vital oil trade routes.
Artificial intelligence
fromFuturism
1 month ago

AI Tools Are Supercharging Hackers

AI systems are increasingly weaponized for cybercrime, enabling hackers to exploit vulnerabilities at scale with minimal technical expertise, as demonstrated by recent attacks on Mexican government networks and global firewall systems.
US news
fromwww.npr.org
1 month ago

Lawmakers say US military used laser to take down Border Protection drone

The U.S. military used a laser to shoot down a CBP drone near El Paso, Texas, prompting the FAA to close additional airspace, marking the second laser deployment in two weeks without proper coordination.
Science
fromArs Technica
1 month ago

ULA isn't making the Space Force's GPS interference problem any easier

The US Space Force is launching new GPS satellites to replace aging constellation members and introduce advanced military capabilities like jam-resistant M-code signals.
#drone-hacking
Information security
fromSecurityWeek
2 weeks ago

Aisuru and Kimwolf DDoS Botnets Disrupted in International Operation

The US Justice Department disrupted several IoT botnets used for DDoS attacks, targeting Aisuru, Kimwolf, JackSkid, and Mossad.
fromTheregister
2 months ago

How hackers fight back against ICE surveillance tech

The Electronic Frontier Foundation (EFF) has rounded up several of these counter surveillance projects, and perhaps unsurprisingly many of these have to do with Flock, best known for its automated license plate reader (ALPR). Flock operates the largest network of surveillance cameras in America, and, while it has contracts with thousands of police departments and municipalities across the US, sometimes ICE gains access to this footage, according to US Senator Ron Wyden (D-OR) and those who have looked into Flock's misuse.
Privacy technologies
Information security
fromTechzine Global
2 weeks ago

Identity has become malleable for cyber attackers

Modern cyberattacks combine psychological manipulation, deepfakes, voice phishing, and stolen data to breach even well-defended organizations without exploiting software vulnerabilities.
Information security
fromSecurityWeek
3 weeks ago

Security Firm Executive Targeted in Sophisticated Phishing Attack

A C-level executive at Outpost24 was targeted by a sophisticated phishing attack using the Kratos phishing-as-a-service kit that exploited legitimate services like Cisco and Nylas to bypass security defenses.
Information security
fromTheregister
3 weeks ago

Credential-stealing crew spoofs Ivanti, Fortinet, Cisco VPNs

Storm-2561 cybercriminals distribute fake VPN clients through manipulated search results to steal user credentials via malicious MSI installers.
Information security
fromSecurityWeek
3 weeks ago

Iran-Linked Hackers Take Aim at US and Other Targets, Raising Risk of Cyberattacks During War

Pro-Iranian hackers are expanding cyberattacks from the Middle East into the United States, targeting defense contractors, medical device companies, and critical infrastructure like power stations and water plants.
fromBusiness Insider
1 month ago

The US Army jammed its new command-and-control tech to see if electronic warfare would break it

Much like the war in Ukraine, future battlefields could be drowning in electronic interference, so the US Army stress-tested new command-and-control tech against that threat. The need to maintain connections between command and deployed weapons and crews, or reestablish those links when they're lost, is shaping how soldiers train on the service's Next Generation Command and Control, a new software-driven system that's being developed for the Army.
US news
Information security
fromTheregister
3 weeks ago

Rogue AI agents can work together to hack systems

AI agents independently discovered and exploited vulnerabilities, escalated privileges, and bypassed security controls to steal sensitive data without explicit instructions to do so.
Science
fromwww.aljazeera.com
1 month ago

Are lasers the future of anti-drone warfare?

High-energy lasers are emerging as cost-effective defensive weapons to counter mass drone attacks, driving intense industry investment and new military contracts.
Information security
fromThe Hacker News
3 weeks ago

Attackers Don't Just Send Phishing Emails. They Weaponize Your SOC's Workload

Attackers deliberately overwhelm SOC analysts with high-volume phishing campaigns to delay investigations and create windows for successful breaches, making analyst capacity a critical vulnerability.
Information security
fromTheregister
4 weeks ago

Hackers: Democracy's last line of cyber defense

The hacker mindset—analytical curiosity combined with systemic thinking—can defend democracy by creating decentralized communication tools that resist censorship and empower oppressed communities.
Information security
fromTechCrunch
4 weeks ago

The mystery of a globetrotting iPhone-hacking toolkit

A sophisticated iPhone hacking toolkit called Coruna, likely developed by U.S. military contractor L3Harris, was stolen and used by Russian and Chinese hackers to target victims in Ukraine and China.
Science
from24/7 Wall St.
2 months ago

Precision Weapons That Rendered Traditional Battlefield Cover Useless

Precision weapons erased the protective value of traditional cover, forcing militaries to prioritize movement, dispersion, detection, and new survivability strategies.
Information security
fromThe Cipher Brief
4 weeks ago

The Drone War's Real Problem Isn't Technology - It's Speed

Defense acquisition reforms implement recommended changes but fail to address the fundamental cycle-time gap between rapidly evolving adversary capabilities and the military's ability to deploy countermeasures.
Information security
fromTheregister
4 weeks ago

Manage attack infrastructure? AI agents can now help

AI agents enable cybercriminals and nation-state hackers to automate reconnaissance, infrastructure management, and attack planning, significantly increasing the speed and scale of cyberattacks.
Information security
fromTheregister
1 month ago

Spyware disguised as emergency-alert app sent to Israelis

Hamas-linked attackers distributed spyware disguised as an emergency-alert app to Israeli smartphones via SMS phishing messages impersonating the official Oref Alert rocket warning service.
Information security
fromThe Hacker News
1 month ago

Fake Tech Support Spam Deploys Customized Havoc C2 Across Organizations

Threat actors impersonate IT support via email and phone calls to deliver Havoc C2 framework for data exfiltration or ransomware attacks across multiple organizations.
Information security
fromTheregister
1 month ago

Israel hacks prayer app to push propaganda to Iran: report

Israel allegedly hacked the Iranian prayer app BadeSaba to distribute messages urging military members to oppose the regime, exploiting the app's 37 million users and their location data.
Information security
fromNextgov.com
1 month ago

Fake DOD memo about 'compromised' apps shows swift spread of deceptive messaging

A fake U.S. Cyber Command memo falsely claiming apps were compromised and revealing servicemembers' locations circulated during military channels, but DOD confirmed it was not authentic.
Information security
fromSecurityWeek
1 month ago

In Other News: ATT&CK Advisory Council, Russian Cyberattacks Aid Missile Strikes, Predator Bypasses iOS Indicators

Predator spyware suppresses iOS indicators through kernel-level access, Russian cyberattacks on Ukraine's energy grid gather intelligence for missile targeting, and Treasury launches AI cybersecurity initiative for financial services.
Information security
fromTheregister
1 month ago

Google and friends disrupt suspected Beijing espionage op

Google disrupted UNC2814, a China-linked group conducting widespread cyberattacks on telecommunications and government organizations across multiple continents using Google Sheets API for command-and-control operations.
Information security
fromThe Hacker News
1 month ago

Researchers Show Copilot and Grok Can Be Abused as Malware C2 Proxies

AI web-browsing assistants can be abused as stealthy command-and-control relays that tunnel attacker commands and exfiltrate data while evading account-based defenses.
Information security
fromAxios
2 months ago

Exclusive: Suspected Chinese hackers impersonate U.S. briefings in phishing lure

China-linked Mustang Panda used file-based phishing to infect diplomatic and election officials with data-stealing persistent malware, detected by an AI agent at Dream.
fromSecuritymagazine
2 months ago

Is Email the Entry Point to a Well-Rounded Disinformation Attack?

Generative models learn an executive's tone and syntax from public posts, press releases and meeting transcripts. Attackers then craft messages indistinguishable from authentic correspondence. But the real innovation isn't the text, it's the choreography. A fraudulent email may serve only as the opening move. Within minutes, the target receives a confirming voice message that sounds like the executive whose name appears in the signature block. A deepfaked video may follow, asking for "final authorization." Email opens the door; other channels walk through it.
Information security
fromZDNET
1 month ago

This new 'sleeperware' doesn't set off alarms or crash your system - it sneaks in and waits

In its annual Red Report, a body of research that analyzes real-world attacker techniques using large-scale attack simulation data, Picus Labs warns cybersecurity professionals that threat actors are rapidly shifting away from ransomware encryption to parasitic "sleeperware" extortion as their means to loot organizations for millions of dollars per attack. Released today and now in its sixth year, the 278-page Red Report gets its name from Picus-organized cybersecurity exercises that take the perspective of the attacker's team, otherwise known as the "red team."
Information security
fromSecurityWeek
2 months ago

Cyber Insights 2026: Cyberwar and Rising Nation State Threats

Entering the cyber world is stepping into a warzone. Cyber is considered a war zone, and what happens there is described as cyberwar. But it's not that simple. War is conducted by nations (political), not undertaken by criminals (financial). Both are increasing in this war zone we call cyber, but the political threat is growing fast. Cyberwar is a complex subject, and a formal definition is difficult.
Information security
Information security
fromSecurityWeek
1 month ago

Hacktivists, State Actors, Cybercriminals Target Global Defense Industry, Google Warns

Hacktivists, state-sponsored actors, and cybercriminals are intensifying attacks on the global defense industrial base using espionage, ransomware, and LLM-assisted techniques.
Information security
fromTheregister
2 months ago

Crims hit the easy button for IT helpdesk scams

Custom voice-phishing kits sold on dark-web channels enable attackers to spoof authentication flows, intercept credentials and MFA codes, and orchestrate live helpdesk social-engineering.
Information security
fromThe Hacker News
2 months ago

FBI Warns North Korean Hackers Using Malicious QR Codes in Spear-Phishing

North Korean-affiliated Kimsuky uses malicious QR codes (quishing) in targeted spear-phishing to move victims to less-secure mobile devices and bypass defenses.
[ Load more ]