#security-doctrine-failure

[ follow ]
#cybersecurity
Information security
fromZDNET
3 hours ago

Nearly half of cybersecurity pros want to quit - here's why

There's a significant mismatch between demand and rewards in cybersecurity, leading to dissatisfaction among professionals.
Careers
fromEntrepreneur
1 day ago

How to Know Where Your Security Threat Is Before It's Too Late

Organizations winning the security talent war operationalize key questions to prevent knowledge loss and enhance cybersecurity resilience.
DevOps
fromSecuritymagazine
5 days ago

The Security Metric That's Failing You

Measuring patch rates does not equate to a secure environment; real risks often lie in misconfigurations and outdated permissions.
Information security
fromThe Hacker News
1 day ago

CISA Adds 4 Exploited Flaws to KEV, Sets May 2026 Federal Deadline

CISA added four vulnerabilities to its KEV catalog, indicating active exploitation affecting SimpleHelp, Samsung MagicINFO 9 Server, and D-Link routers.
Information security
fromZDNET
3 hours ago

Nearly half of cybersecurity pros want to quit - here's why

There's a significant mismatch between demand and rewards in cybersecurity, leading to dissatisfaction among professionals.
Careers
fromEntrepreneur
1 day ago

How to Know Where Your Security Threat Is Before It's Too Late

Organizations winning the security talent war operationalize key questions to prevent knowledge loss and enhance cybersecurity resilience.
Privacy professionals
fromThe Hacker News
2 days ago

NASA Employees Duped in Chinese Phishing Scheme Targeting U.S. Defense Software

A Chinese national impersonated U.S. researchers to obtain sensitive information from NASA and other entities, violating export control laws.
DevOps
fromSecuritymagazine
5 days ago

The Security Metric That's Failing You

Measuring patch rates does not equate to a secure environment; real risks often lie in misconfigurations and outdated permissions.
Information security
fromThe Hacker News
1 day ago

CISA Adds 4 Exploited Flaws to KEV, Sets May 2026 Federal Deadline

CISA added four vulnerabilities to its KEV catalog, indicating active exploitation affecting SimpleHelp, Samsung MagicINFO 9 Server, and D-Link routers.
Washington DC
fromFortune
8 hours ago

The presidential line of succession was at the shooting that targeted the Trump administration. Amid security doubts, 'the system worked,' AG says | Fortune

The shooting at the White House correspondents' dinner posed a significant risk to President Trump and many top officials in the line of succession.
Europe news
fromSecuritymagazine
3 days ago

Netherlands Faces Greatest National Security Threat Since World War Two

The Netherlands faces its greatest national security threat since World War Two, primarily from Russia and China.
World politics
fromFortune
2 days ago

The U.S. military may have already used up half of its most expensive missiles, and it could take up to 4 years to rebuild its stockpiles | Fortune

The U.S. faces a near-term risk of depleting its missile stockpiles, impacting future military readiness for potential conflicts.
European startups
fromFortune
1 day ago

Trump's bellicose presidency is a 'golden opportunity' for defense firms, and business is booming | Fortune

U.S. defense companies are thriving due to increased military spending and demand for weapons amid ongoing conflicts.
#ai-security
fromAxios
3 days ago
Privacy professionals

U.S. accuses China of "industrial-scale" campaigns to steal AI secrets

fromFortune
3 days ago
Information security

Security experts head to D.C. to debate standards for securing AI systems as Mythos raises the stakes | Fortune

AI systems are becoming attractive targets for adversaries, with vulnerabilities discovered faster than developers can respond.
fromSecuritymagazine
5 days ago
Information security

Unauthorized Users Accessed Claude Mythos, New Reports Suggest

Unauthorized access to Anthropic's AI model, Claude Mythos Preview, raises security concerns among experts due to its ability to identify digital vulnerabilities.
Intellectual property law
fromTechRepublic
3 days ago

White House Says China-Linked Actors Tried to 'Steal American AI'

Foreign entities, particularly from China, are allegedly extracting American AI models through unauthorized methods, raising national security concerns.
Privacy professionals
fromAxios
3 days ago

U.S. accuses China of "industrial-scale" campaigns to steal AI secrets

China-based actors are using proxy accounts to exploit U.S. AI models and extract proprietary information.
Information security
fromFortune
3 days ago

Security experts head to D.C. to debate standards for securing AI systems as Mythos raises the stakes | Fortune

AI systems are becoming attractive targets for adversaries, with vulnerabilities discovered faster than developers can respond.
Information security
fromSecuritymagazine
5 days ago

Unauthorized Users Accessed Claude Mythos, New Reports Suggest

Unauthorized access to Anthropic's AI model, Claude Mythos Preview, raises security concerns among experts due to its ability to identify digital vulnerabilities.
from24/7 Wall St.
2 days ago

1 ETF to Buy Before a $1.5 Trillion Defense Budget Hits

The U.S. and its allies have expended a great deal of their arsenal in the past few years. It simply does not matter if there's a peace deal tomorrow, because those weapons must be stockpiled again and then some.
Business
Left-wing politics
fromAbove the Law
2 days ago

FedSoc Event Meant To Sanewash DHS Abducting People Made Harder By Protesters Making A Big Fuss About Racial Profiling - Above the Law

Politeness in discourse is biased, favoring certain viewpoints while punishing others, as seen in recent campus protests against right-wing speakers.
DevOps
fromTechRepublic
2 years ago

What is Cloud Security? Fundamental Guide

Cloud security requires specialized processes and technologies to protect assets and data from evolving threats in a dynamic environment.
Media industry
fromAxios
2 days ago

Firing fears ripple through "Mean Girls" Pentagon

At least 15 defense officials have left their positions under Trump 2.0 due to political and personal conflicts.
fromNextgov.com
3 days ago

Autonomous weapons will be 'key and essential part' of warfare, Joint Chiefs chair says

Gen. Dan Caine stated that autonomous weapons are going to be a 'key and essential part of everything we do' in future warfare, indicating a significant shift in military strategy.
Artificial intelligence
Toronto startup
fromTESLARATI
2 days ago

SpaceX just got pulled into the biggest Weapons Program in U.S. history

SpaceX is developing core software for the Golden Dome missile defense system, focusing on satellite communications integration with other defense companies.
UK politics
fromwww.bbc.com
3 days ago

Proxy attacks in UK a real and growing concern, says PM

The UK government is increasingly concerned about hostile states using proxies for attacks, particularly against the Jewish community.
Germany news
fromwww.dw.com
3 days ago

Germany unveils first ever military strategy for Bundeswehr

Germany's Bundeswehr has adopted a military strategy to address increasing international threats, particularly from Russia.
US politics
fromTruthout
4 days ago

Pentagon Assessment Clashes With Trump's Claims on Iran as Public Opposes Continuing War

Seven in 10 Americans want the war in Iran to end quickly, contradicting President Trump's claims about Iran's military capabilities.
World news
fromSlate Magazine
5 days ago

The Surprisingly Anticlimactic End to America's War Against al-Qaida

Sayf al-Adl, an al-Qaida operative, remains elusive despite U.S. military actions, raising questions about the group's leadership and operational strength.
#pentagon
Washington DC
fromThe Atlantic
1 hour ago

Maybe the Most Senior Members of Government Shouldn't Be in the Same Room

The vulnerabilities of the presidential line of succession were starkly highlighted during events following JFK's assassination and a recent security breach at a public gathering.
Information security
fromSecurityWeek
2 days ago

Why Cybersecurity Must Rethink Defense in the Age of Autonomous Agents

Agentic AI is transforming cybersecurity, presenting both opportunities for defenders and risks for attackers, necessitating a strategic response from the industry.
#cisa
SF politics
fromTechCrunch
3 days ago

Trump's pick to run US cyber agency CISA asks to drop out | TechCrunch

Sean Plankey withdrew his nomination to lead CISA, leaving the agency without a permanent leader amid ongoing cybersecurity challenges.
SF politics
fromNextgov.com
4 days ago

Plankey withdraws nomination to lead CISA

Sean Plankey has withdrawn his nomination to lead the Cybersecurity and Infrastructure Security Agency after a year of waiting for Senate confirmation.
SF politics
fromNextgov.com
1 week ago

CISA resources 'more limited than I would like' amid shutdown, top official says

CISA faces significant funding limitations impacting its ability to counter hacking threats and conduct essential activities.
Information security
fromThe Verge
4 days ago

Anthropic's Mythos rollout has missed America's cyberscurity agency

CISA lacks access to Anthropic's cybersecurity model, raising concerns about its prioritization and effectiveness in digital security.
SF politics
fromTechCrunch
3 days ago

Trump's pick to run US cyber agency CISA asks to drop out | TechCrunch

Sean Plankey withdrew his nomination to lead CISA, leaving the agency without a permanent leader amid ongoing cybersecurity challenges.
SF politics
fromNextgov.com
4 days ago

Plankey withdraws nomination to lead CISA

Sean Plankey has withdrawn his nomination to lead the Cybersecurity and Infrastructure Security Agency after a year of waiting for Senate confirmation.
SF politics
fromNextgov.com
1 week ago

CISA resources 'more limited than I would like' amid shutdown, top official says

CISA faces significant funding limitations impacting its ability to counter hacking threats and conduct essential activities.
Information security
fromThe Verge
4 days ago

Anthropic's Mythos rollout has missed America's cyberscurity agency

CISA lacks access to Anthropic's cybersecurity model, raising concerns about its prioritization and effectiveness in digital security.
Privacy professionals
fromArs Technica
2 days ago

Why are top university websites serving porn? It comes down to shoddy housekeeping.

Universities often neglect DNS record maintenance, leading to hijacked subdomains that can appear in search results.
fromwww.aljazeera.com
2 days ago

Japan builds up its southern shield' as faith in US security cover falters

Japan's southern island of Kyushu is ground zero for one of the greatest shifts in Japan's defence strategy since 1947, when it formally renounced the use of war to settle international disputes.
World politics
#artificial-intelligence
fromNextgov.com
4 days ago
Artificial intelligence

US needs to flesh out strategy to counter China's robotics advances, lawmakers say

fromFortune
3 days ago
Information security

Former national cyber director: Anthropic's 'Mythos' AI can hack nearly anything and we aren't ready | Fortune

Artificial intelligence
fromNextgov.com
4 days ago

US needs to flesh out strategy to counter China's robotics advances, lawmakers say

The U.S. needs a better strategy to counter China's growing dominance in robotics despite leading in AI development.
Information security
fromFortune
3 days ago

Former national cyber director: Anthropic's 'Mythos' AI can hack nearly anything and we aren't ready | Fortune

Mythos, Anthropic's advanced AI model, poses significant risks to critical infrastructure, necessitating urgent investment and collaboration to enhance cybersecurity.
fromwww.mediaite.com
2 weeks ago

Weird Obsession With Death': Current and Former Defense Officials Sound the Alarm on Hegseth

Retired Army Special Forces officer Mike Nelson criticized Hegseth's rhetoric, stating, 'That's a necessary end to achieve goals through military force - you have to kill people to achieve them. That's not the end. It's a weird obsession with death for the sake of it.'
Right-wing politics
Artificial intelligence
fromTNW | China
3 days ago

The US just told China to stop copying its AI. Enforcing that is the hard part.

The White House accused China of industrial-scale theft of American AI models and committed to sharing intelligence with US companies.
World politics
fromwww.aljazeera.com
3 days ago

Infiltration from Within: Israelis recruited to spy for enemy countries

Israel's intelligence is exposed as flawed, revealing vulnerabilities from internal betrayals and arrogance leading to security failures.
UK politics
fromwww.independent.co.uk
5 days ago

Iran, Russia and China behind most major cyberattacks on UK, security chief warns

The Independent provides critical journalism on key issues without paywalls, emphasizing the importance of accessible reporting.
#malware
Information security
fromTheregister
2 days ago

CISA, NCSC issue Firestarter backdoor warning

Firestarter malware targets a US federal agency, maintaining persistent access to compromised devices, posing risks to government and critical infrastructure.
Information security
fromThe Hacker News
1 day ago

Researchers Uncover Pre-Stuxnet 'fast16' Malware Targeting Engineering Software

A new Lua-based malware, fast16, predates Stuxnet and targets high-precision calculation software for cyber sabotage.
Information security
fromTheregister
2 days ago

Researchers find sabotage malware that may predate Stuxnet

Malware named fast16 aims to sabotage engineering and physics simulation software, predating Stuxnet and targeting high-precision tools.
Information security
fromSecurityWeek
2 days ago

Pre-Stuxnet Sabotage Malware 'Fast16' Linked to US-Iran Cyber Tensions

Fast16 is a Lua-based malware discovered by SentinelOne, predating Stuxnet, designed to tamper with high-precision software.
Information security
fromTheregister
2 days ago

CISA, NCSC issue Firestarter backdoor warning

Firestarter malware targets a US federal agency, maintaining persistent access to compromised devices, posing risks to government and critical infrastructure.
Information security
fromThe Hacker News
1 day ago

Researchers Uncover Pre-Stuxnet 'fast16' Malware Targeting Engineering Software

A new Lua-based malware, fast16, predates Stuxnet and targets high-precision calculation software for cyber sabotage.
Information security
fromTheregister
2 days ago

Researchers find sabotage malware that may predate Stuxnet

Malware named fast16 aims to sabotage engineering and physics simulation software, predating Stuxnet and targeting high-precision tools.
Information security
fromSecurityWeek
2 days ago

Pre-Stuxnet Sabotage Malware 'Fast16' Linked to US-Iran Cyber Tensions

Fast16 is a Lua-based malware discovered by SentinelOne, predating Stuxnet, designed to tamper with high-precision software.
Information security
fromSecurityWeek
2 days ago

US Federal Agency's Cisco Firewall Infected With 'Firestarter' Backdoor

A US federal agency was infected with malware due to vulnerabilities in Cisco firewalls linked to a China-backed espionage campaign.
Artificial intelligence
fromTechCrunch
6 days ago

NSA spies are reportedly using Anthropic's Mythos, despite Pentagon feud | TechCrunch

The NSA is reportedly using Anthropic's Mythos model for cybersecurity despite previous tensions over access to AI capabilities.
fromSecuritymagazine
4 days ago

Operationally Ineffective: Putting CVEs in a Chokehold with Privilege Disruption

A Common Vulnerability Exposure (CVE) that cannot reach the privilege plane is operationally ineffective - even at a CVSS Score of 10. This should be a core philosophy that is embedded into the fabric of software engineering.
Information security
fromSecurityWeek
2 days ago

Vulnerabilities Patched in CrowdStrike, Tenable Products

CrowdStrike published an advisory for CVE-2026-40050, a critical unauthenticated path traversal vulnerability affecting its LogScale product. The flaw can allow a remote attacker to read arbitrary files from the server filesystem.
Information security
Information security
fromIT Brew
3 days ago

Asking around: When does ransomware threat intelligence become noise?

Effective threat intelligence requires filtering information relevant to specific market segments to avoid overwhelming alerts.
Information security
fromSecurityWeek
2 days ago

Locked Shields 2026: 41 Nations Strengthen Cyber Resilience in World's Biggest Exercise

Locked Shields 2026 tested cyber defense capabilities of 4,000 participants from 41 nations against simulated cyberattacks on critical infrastructure.
#ai
from24/7 Wall St.
4 days ago
Information security

5 Cybersecurity Stocks Most Likely to Benefit as AI Threats Drive Budget Increases in 2026

Information security
fromSecurityWeek
3 days ago

AI Can Autonomously Hack Cloud Systems With Minimal Oversight: Researchers

AI systems can autonomously hack cloud environments, demonstrating advanced capabilities in executing sophisticated attacks without specific instructions.
Information security
from24/7 Wall St.
4 days ago

5 Cybersecurity Stocks Most Likely to Benefit as AI Threats Drive Budget Increases in 2026

AI surpasses most humans in finding software flaws, prompting a defensive coalition to enhance cybersecurity.
Venture
fromThe Cipher Brief
1 month ago

What the Latest Policy and Tech Shifts Mean for National Security

Counter-Unmanned Aerial Systems require integrated, multi-layered defense architectures combining non-kinetic and kinetic responses rather than isolated legacy technologies, as modern autonomous drones render traditional electronic warfare ineffective.
Information security
fromNextgov.com
4 days ago

Cyber Command carried out over 8,000 missions in 2025, director says

U.S. Cyber Command conducted over 8,000 missions in 2025, marking a 25% increase from 2024, with expectations for further growth in 2026.
fromWIRED
2 months ago

ICE Pretends It's a Military Force. Its Tactics Would Get Real Soldiers Killed

As a veteran of the war on terror, I have spent the past year watching Immigration and Customs Enforcement officers expand their operations across the country on a heretofore unprecedented scale and with a new faux-military bearing. From equipment to weapons to tactics, ICE and other immigration enforcement bodies want to be seen as combat forces carrying out their missions.
US politics
#cyber-security
Information security
fromComputerWeekly.com
5 days ago

Nation states responsible for 'nationally significant' cyber attacks against UK, says NCSC chief | Computer Weekly

The UK faces increased cyber security threats from hostile states and AI advancements, with an average of four significant attacks weekly.
Information security
fromComputerWeekly.com
4 days ago

Interview: Critical local infrastructure is missing link in UK cyber resilience | Computer Weekly

Local infrastructure in the UK is vulnerable to cyber attacks, risking severe disruption to essential services and public safety.
Information security
fromComputerWeekly.com
5 days ago

Sans Institute preps live systems for Nato cyber exercise | Computer Weekly

The Sans Institute is providing a real operational cyber range for the NATO Locked Shields exercise to enhance cyber security training and readiness.
Information security
fromComputerWeekly.com
5 days ago

Nation states responsible for 'nationally significant' cyber attacks against UK, says NCSC chief | Computer Weekly

The UK faces increased cyber security threats from hostile states and AI advancements, with an average of four significant attacks weekly.
Information security
fromComputerWeekly.com
4 days ago

Interview: Critical local infrastructure is missing link in UK cyber resilience | Computer Weekly

Local infrastructure in the UK is vulnerable to cyber attacks, risking severe disruption to essential services and public safety.
Information security
fromComputerWeekly.com
5 days ago

Sans Institute preps live systems for Nato cyber exercise | Computer Weekly

The Sans Institute is providing a real operational cyber range for the NATO Locked Shields exercise to enhance cyber security training and readiness.
fromNextgov.com
2 months ago

US cyber responses will be 'linked to adversary actions' and involve industry coordination, official says

Future U.S. government responses in cyberspace will be "linked to adversary actions" and will involve coordination between the private sector and smaller governments, a top White House official said Thursday. The dynamic, which will be codified in a forthcoming national cyber strategy, is meant to make clear that foreign adversaries' actions that target U.S. networks have consequences, according to Alexandra Seymour, who serves as the principal deputy assistant national cyber director for policy in the Office of the National Cyber Director.
US politics
Information security
fromAxios
4 days ago

Exclusive: OpenAI briefs feds and Five Eyes on new cyber product

OpenAI demonstrated its GPT-5.4-Cyber model to federal cyber defense practitioners, emphasizing a dual-track access approach for government and commercial users.
fromEngadget
4 days ago

Anthropic is investigating 'unauthorized access' of its Mythos cybersecurity tool

We're investigating a report claiming unauthorized access to Claude Mythos Previous through one of our third-party vendor environments.
Information security
Information security
fromSecurityWeek
4 days ago

Are SBOMs Failing? Supply Chain Attacks Rise as Security Teams Struggle With SBOM Data

SBOMs and VEX statements fail to enhance software supply chain security due to poor decision-making and inconsistent interpretation of available data.
Information security
fromSecurityWeek
1 month ago

US Cyber Strategy Targets Adversaries, Critical Infrastructure, and Emerging Technologies

Trump administration releases comprehensive cyber strategy emphasizing government-private sector coordination, deterrence, regulatory reform, and investment in AI and quantum technologies to strengthen national cybersecurity.
Information security
fromThe Hacker News
1 month ago

Manual Processes Are Putting National Security at Risk

Over half of national security organizations rely on manual sensitive data transfers, creating critical security vulnerabilities that adversaries actively exploit in contested operational environments.
[ Load more ]