#pre-attack-planning

[ follow ]
Roam Research
fromwww.businessinsider.com
16 hours ago

The US Army surged its largest counter-drone training deployment to the Middle East during the Iran war

The US Army has launched its largest counter-drone training mission in the Middle East amid the Iran war, utilizing the Merops system.
Marketing
fromEntrepreneur
8 hours ago

In a Public Crisis, What You Prioritize Determines Whether You Execute or Stall

In a crisis, leaders must discern which voices matter to maintain control and focus on relevant stakeholders.
#us-military
World news
fromwww.aljazeera.com
2 hours ago

US military kills two men in new strike on vessel in eastern Pacific

US military strikes in the Pacific and Caribbean have resulted in at least 170 deaths since September, targeting vessels linked to drug trafficking.
Right-wing politics
fromTruthout
14 hours ago

Trump's Extreme Use of Military Is Stirring a Crisis of Conscience Among Troops

Growing numbers of servicemembers oppose U.S. military actions under Trump, particularly the war on Iran, leading to increased calls for counseling services.
US news
fromNextgov.com
5 days ago

As aircraft losses mount, Pentagon wants a software fix to see through the fog of war

U.S. planes in the Middle East lack a common operating picture, leading to communication errors and aircraft losses.
World news
fromwww.businessinsider.com
6 days ago

Why the US military risks so much to save downed airmen stuck behind enemy lines

US forces conducted high-risk missions in Iran to rescue a downed pilot, reaffirming the commitment to never leave an American behind.
World news
fromwww.aljazeera.com
2 hours ago

US military kills two men in new strike on vessel in eastern Pacific

US military strikes in the Pacific and Caribbean have resulted in at least 170 deaths since September, targeting vessels linked to drug trafficking.
Right-wing politics
fromTruthout
14 hours ago

Trump's Extreme Use of Military Is Stirring a Crisis of Conscience Among Troops

Growing numbers of servicemembers oppose U.S. military actions under Trump, particularly the war on Iran, leading to increased calls for counseling services.
US news
fromNextgov.com
5 days ago

As aircraft losses mount, Pentagon wants a software fix to see through the fog of war

U.S. planes in the Middle East lack a common operating picture, leading to communication errors and aircraft losses.
World news
fromwww.businessinsider.com
6 days ago

Why the US military risks so much to save downed airmen stuck behind enemy lines

US forces conducted high-risk missions in Iran to rescue a downed pilot, reaffirming the commitment to never leave an American behind.
Philosophy
fromPsychology Today
14 hours ago

When Leaders Go to War, Their Psychology Goes With Them

Narcissistic leaders often emerge due to fragile egos, leading to decisions that prioritize self-preservation over the well-being of others.
Books
fromwww.theguardian.com
1 day ago

Can you solve it? Are you smarter than a Navy admiral?

Tanya Khovanova's book features innovative puzzles and challenges in recreational mathematics.
#cybersecurity
Information security
fromTechzine Global
17 hours ago

How AI could drive cyber investigation tools from niche to core stack

The rise of AI presents new cybersecurity risks, necessitating a shift from traditional defensive strategies to proactive measures against sophisticated threats.
Information security
fromSecurityWeek
3 days ago

Industry Reactions to Iran Hacking ICS in Critical Infrastructure: Feedback Friday

Iran-linked hackers are targeting critical infrastructure, exploiting vulnerabilities in industrial control systems and operational technology.
Information security
fromThe Hacker News
16 hours ago

Weekly Recap: Fiber Optic Spying, Windows Rootkit, AI Vulnerability Hunting and More

A critical zero-day vulnerability in Adobe Acrobat Reader is actively exploited, alongside state-sponsored cyber threats targeting U.S. infrastructure.
Information security
fromTechzine Global
17 hours ago

How AI could drive cyber investigation tools from niche to core stack

The rise of AI presents new cybersecurity risks, necessitating a shift from traditional defensive strategies to proactive measures against sophisticated threats.
Information security
fromNextgov.com
3 days ago

US push to counter hackers draws industry deeper into offensive cyber debate

The U.S. government seeks private sector involvement in cyber defense, but clarity on offensive roles remains uncertain.
Information security
fromSecurityWeek
3 days ago

Industry Reactions to Iran Hacking ICS in Critical Infrastructure: Feedback Friday

Iran-linked hackers are targeting critical infrastructure, exploiting vulnerabilities in industrial control systems and operational technology.
Artificial intelligence
fromFortune
2 days ago

These niche AI startups are trying to protect the Pentagon's secrets | Fortune

AI companies face challenges in balancing technology use with government secrecy, highlighted by Anthropic's conflict with the Pentagon.
fromThe Cipher Brief
3 days ago

Why Australia Needs a National Spy Museum

Many of the foundations that have underpinned Australia's security, prosperity and democracy are being tested: social cohesion is eroding, trust in institutions is declining, intolerance is growing, even truth itself is being undermined by conspiracy, mis- and disinformation.
World politics
US news
fromwww.mediaite.com
4 days ago

It Was Chaos': US Troops Who Survived Deadly Iranian Attack Dispute Pentagon's Version of Events

Survivors of the Iranian drone attack in Kuwait claim the Pentagon misrepresented the preparedness and safety of their position.
from24/7 Wall St.
4 days ago

The 3 Numbers You Need to Know About the Economics of War

The economics are hard to ignore. Shooting down a drone with AeroVironment's LOCUST laser system costs less than $10, using just two to five seconds of laser energy. Compare that to the interceptor missiles currently used against Iranian drone swarms, which cost orders of magnitude more and are in short supply across allied arsenals.
Venture
Privacy professionals
fromSecurityWeek
4 days ago

The Hidden ROI of Visibility: Better Decisions, Better Behavior, Better Security

Visibility through security measures can deter undesirable behavior and enhance safety in challenging situations.
Science
fromThe Cipher Brief
6 days ago

A Wartime Budget Without an Innovation Strategy

Collaboration between the NSF and defense sectors is essential for national security and innovation, despite proposed budget cuts to NSF funding.
Russo-Ukrainian War
fromwww.businessinsider.com
12 hours ago

Why Ukraine's drone defense playbook may not fully translate for countries facing Iranian threats in the Middle East

The US and allies face a drone threat in the Middle East, requiring different defense strategies than those used in Ukraine.
SF politics
fromwww.businessinsider.com
6 days ago

'Sandy' A-10s the Air Force says it no longer needs flew 'close-in gunfights' in high-risk Iran rescues

A-10 Warthogs participated in risky rescue missions in Iran despite plans for retirement, showcasing their continued operational relevance.
fromwww.mediaite.com
3 days ago

Weird Obsession With Death': Current and Former Defense Officials Sound the Alarm on Hegseth

Retired Army Special Forces officer Mike Nelson criticized Hegseth's rhetoric, stating, 'That's a necessary end to achieve goals through military force - you have to kill people to achieve them. That's not the end. It's a weird obsession with death for the sake of it.'
Right-wing politics
#defense-technology
World politics
fromThe Cipher Brief
4 days ago

America's Drone Strategy Has a Supply Chain Problem

The U.S. defense technology ecosystem is shifting towards a model prioritizing rapid adaptation and drone technology in response to modern warfare challenges.
Venture
from24/7 Wall St.
5 days ago

How Defense Tech Investors Are Using SHLD to Capture 21st Century Warfare Spending

Operation Absolute Resolve showcased advanced military technology, with all platforms linked to companies in the Global X Defense Tech ETF.
World politics
fromThe Cipher Brief
4 days ago

America's Drone Strategy Has a Supply Chain Problem

The U.S. defense technology ecosystem is shifting towards a model prioritizing rapid adaptation and drone technology in response to modern warfare challenges.
Venture
from24/7 Wall St.
5 days ago

How Defense Tech Investors Are Using SHLD to Capture 21st Century Warfare Spending

Operation Absolute Resolve showcased advanced military technology, with all platforms linked to companies in the Global X Defense Tech ETF.
London politics
fromwww.theguardian.com
1 week ago

Overwhelmed' Prevent at risk of missing threats as referrals rise, UK counter-terror chief says

Prevent scheme faces overwhelming referrals, risking identification of genuine threats due to increased volume and lack of triage system.
Privacy professionals
fromWIRED
5 days ago

Men Are Buying Hacking Tools to Use Against Their Wives and Friends

Telegram groups facilitate the sale of hacking and surveillance services, promoting abusive content targeting women and girls.
World news
fromTheregister
6 days ago

Microsoft hints at bit bunkers for war zones

Microsoft is redesigning datacenters in conflict-prone regions due to Iranian attacks targeting Middle Eastern facilities linked to US military operations.
Russo-Ukrainian War
fromFortune
3 days ago

Ukraine will have the most important defense industrial base in the free world, former CIA chief predicts | Fortune

Ukraine is emerging as a leading military industrial complex, producing advanced unmanned systems and reinforcing its role as the arsenal of democracy.
Podcast
fromSecuritymagazine
2 weeks ago

What Does It Take to Be an Outstanding CSO or CISO?

Outstanding security leaders often come from non-traditional backgrounds, with 40% of recent CSO-CISO Hall of Fame honorees starting in the private sector.
fromThe Cipher Brief
4 days ago

Drones Are Changing Warfare And America Isn't Ready

The U.S. has discovered that air superiority and missile defense systems designed to counter tens/hundreds of aircraft and missiles is insufficient against asymmetric attacks of thousands of drones.
Russo-Ukrainian War
#ai-cybersecurity
Information security
fromSecurityWeek
6 days ago

The New Rules of Engagement: Matching Agentic Attack Speed

AI-enabled cyberattacks are currently occurring, with significant impacts on organizations and a widening gap between attackers and defenders.
Information security
fromZDNET
3 weeks ago

1 in 2 security leaders say they're not ready for AI attacks - 4 actions to take now

AI-powered cybercrime is a significant and growing threat to businesses, with many feeling unprotected.
Information security
fromSecurityWeek
6 days ago

The New Rules of Engagement: Matching Agentic Attack Speed

AI-enabled cyberattacks are currently occurring, with significant impacts on organizations and a widening gap between attackers and defenders.
Information security
fromZDNET
3 weeks ago

1 in 2 security leaders say they're not ready for AI attacks - 4 actions to take now

AI-powered cybercrime is a significant and growing threat to businesses, with many feeling unprotected.
History
from24/7 Wall St.
4 weeks ago

25 Weapons That Changed Warfare Over the Last Century

Technological breakthroughs over the last century transformed warfare by introducing tanks, missiles, stealth aircraft, and precision-guided weapons that forced armies to continuously adapt tactics and reshape military doctrine globally.
Information security
fromTechRepublic
5 days ago

Why Operationalizing AI Security Is the Next Great Enterprise Hurdle

Security operations lag behind rapid tech advancements, leading to inefficiencies and risks in managing numerous security tools.
World politics
fromwww.businessinsider.com
2 weeks ago

Total air defense is effectively impossible. In a major war, the West may have to make hard choices.

The West must make difficult choices about air defense priorities in large-scale wars due to limitations in resources and technology.
fromemptywheel
1 month ago

Great Tactics Mean Nothing if You Have No Strategy - emptywheel

The conduct of War is, therefore, the formation and conduct of the fighting. If this fighting was a single act, there would be no necessity for any further subdivision, but the fight is composed of a greater or less number of single acts, complete in themselves, which we call combats, as we have shown in the first chapter of the first book, and which form new units.
US politics
Artificial intelligence
fromEngadget
3 weeks ago

The Defense Department reportedly plans to train AI models on classified military data

The Pentagon plans to train AI models on classified information in secure facilities for exclusive military use to enhance warfighting capabilities.
Information security
fromSecuritymagazine
6 days ago

Ransomware Response: How Businesses Regain Control Under Pressure

Ransomware attacks create urgent pressure, forcing quick decisions and impacting operations, legal obligations, and overall enterprise strategy.
fromWIRED
1 month ago

Palantir Demos Show How the Military Could Use AI Chatbots to Generate War Plans

When the user asks "What enemy military unit is in the region?" the AIP Assistant guesses that it's "likely an armor attack battalion based on the pattern of the equipment." This prompts the analyst to request a MQ-9 Reaper drone to survey the scene. They then ask the AIP Assistant to "generate 3 courses of action to target this enemy equipment," and within moments, the assistant suggests attacking the unit with either an "air asset," a "long range artillery," or a "tactical team."
Artificial intelligence
US politics
fromFortune
1 month ago

Pentagon officially defines Anthropic as 'supply chain risk' | Fortune

The Trump administration designated Anthropic as a supply chain risk, forcing government contractors to stop using Claude AI due to national security concerns over surveillance and autonomous weapons capabilities.
World politics
fromThe Atlantic
1 month ago

An Air-Campaign Primer

Air campaigns offer unique advantages in concentration, speed, and flexibility, but differ fundamentally from ground operations in their goals, strengths, and inherent limitations.
Information security
fromThe Hacker News
5 days ago

Shrinking the IAM Attack Surface through Identity Visibility and Intelligence Platforms (IVIP)

Enterprise IAM faces fragmentation, leading to Identity Dark Matter and a significant gap in visibility and security oversight.
US politics
fromwww.mediaite.com
1 month ago

High Alert': DHS and FBI Monitoring Potential Threats on US Soil During Strikes on Iran

U.S. homeland security officials are coordinating enhanced monitoring and threat prevention measures following military action against Iran.
fromThe New Yorker
2 months ago

National Security Begins Behind the Toaster

Dear Secretary Pete Hegseth, I realize that this is a big ask, but would you please invade and take possession of my son and daughter-in-law's apartment? Or maybe you'd like to make them an offer first? Either way, as a concerned mother and patriot who believes that national security begins at home, I feel it's my duty to let you know that Otis and Luna, the co-dictators of Unit 4-C, at 439 Bergen Street, in Park Slope, Brooklyn, must be overthrown.
Humor
Information security
fromThe Hacker News
6 days ago

The Hidden Cost of Recurring Credential Incidents

Credential incidents cause significant operational costs and disruptions, impacting IT teams and overall business productivity beyond just breach prevention.
Canada news
fromFuturism
2 months ago

Canadian Military Exploring Taliban-Like Insurgent Tactics to Repel American Invasion

Canada is pivoting away from the United States by forming a strategic partnership with China and drafting military plans to repel a potential US invasion.
Information security
fromSecuritymagazine
1 week ago

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Companies are increasingly investing in executive protection due to rising threats, making it a strategic necessity for business continuity and resilience.
Information security
fromSecurityWeek
2 weeks ago

CISA Flags Critical PTC Vulnerability That Had German Police Mobilized

CISA warns of a critical vulnerability in PTC's Windchill software, with potential for exploitation despite no current evidence of attacks.
US politics
fromwww.dw.com
2 months ago

US defense plan focuses on homeland, limits help to allies

The US will prioritize homeland defense and counter Chinese influence in the Indo-Pacific while expecting allies to assume greater defense responsibilities with reduced US support.
US politics
fromThe Cipher Brief
1 month ago

Defending the Homeland: Pentagon Shifts Strategy on Drone Threats

DoD policy empowers commanders to use defensive measures, extend perimeters beyond installation fences, and counter UAS threats after an uncoordinated CBP laser incident.
Information security
fromComputerworld
3 weeks ago

CISA urges IT to harden endpoint management systems after cyberattack by pro-Iranian group

CISA urges organizations to harden endpoint management system configurations, particularly Microsoft Intune, following a pro-Iranian threat actor's compromise of Stryker's systems.
Information security
fromThe Cipher Brief
3 weeks ago

America Is Digitally Fragile - and Our Adversaries Know It

America faces unprecedented vulnerability as critical infrastructure systems are digitally dependent and interconnected, while adversaries possess capabilities to penetrate and pre-position for exploitation before conflict begins.
Information security
fromThe Hacker News
1 month ago

The Zero-Day Scramble is Avoidable: A Guide to Attack Surface Reduction

Teams must reduce unnecessary internet-facing exposure to minimize vulnerability exploitation risk, as time-to-exploit windows are shrinking to hours or minutes.
Information security
fromTheregister
1 month ago

Manage attack infrastructure? AI agents can now help

AI agents enable cybercriminals and nation-state hackers to automate reconnaissance, infrastructure management, and attack planning, significantly increasing the speed and scale of cyberattacks.
Information security
fromSecuritymagazine
1 month ago

The Great Security Culture Shift: Building a Proactive Defense in an Era of Advanced Threats and Social Engineering

Hackers exploit DLL side-loading on trusted platforms like LinkedIn to deliver malware through seemingly legitimate file attachments, bypassing traditional security defenses and compromising entire corporate networks.
Information security
fromNextgov.com
1 month ago

Intelligence firms watch for uptick in Iran cyber activity after US, Israel strikes

Tehran-linked hackers are escalating digital reconnaissance and preparing potentially disruptive cyber operations following recent U.S. and Israeli strikes on Iran.
Information security
fromSecurityWeek
1 month ago

In Other News: ATT&CK Advisory Council, Russian Cyberattacks Aid Missile Strikes, Predator Bypasses iOS Indicators

Predator spyware suppresses iOS indicators through kernel-level access, Russian cyberattacks on Ukraine's energy grid gather intelligence for missile targeting, and Treasury launches AI cybersecurity initiative for financial services.
Information security
fromThe Hacker News
1 month ago

Manual Processes Are Putting National Security at Risk

Over half of national security organizations rely on manual sensitive data transfers, creating critical security vulnerabilities that adversaries actively exploit in contested operational environments.
Information security
fromThe Hacker News
2 months ago

The First 90 Seconds: How Early Decisions Shape Incident Response Investigations

Early decisions immediately after detection determine incident investigation outcomes; establishing direction before assumptions harden preserves options and shapes the entire response.
Information security
fromTheregister
1 month ago

Threat intelligence supply chain is full of weak links

China's ban on foreign security software threatens the global threat intelligence ecosystem by risking data fragmentation and weakening international cybersecurity collaboration.
fromSecurityWeek
2 months ago

Cyber Insights 2026: Cyberwar and Rising Nation State Threats

Entering the cyber world is stepping into a warzone. Cyber is considered a war zone, and what happens there is described as cyberwar. But it's not that simple. War is conducted by nations (political), not undertaken by criminals (financial). Both are increasing in this war zone we call cyber, but the political threat is growing fast. Cyberwar is a complex subject, and a formal definition is difficult.
Information security
Information security
fromSecurityWeek
2 months ago

Cyber Insights 2026: Offensive Security; Where It is and Where Its Going

Red teaming and offensive security must accelerate and expand to proactively find and harden system weaknesses against increasingly frequent, sophisticated, and damaging attacks.
[ Load more ]