#security-vacuum

[ follow ]
#uk-defense
UK politics
fromwww.bbc.com
1 hour ago

Criticism of complacency on defence spending will sting government

The UK faces significant defense funding shortfalls and declining military capabilities amid rising global threats.
UK politics
fromwww.theguardian.com
1 day ago

Starmer's corrosive complacency' on defence has put UK in peril, says ex-Nato chief

The UK faces significant national security risks due to complacency in defense investment and planning.
UK politics
fromwww.bbc.com
1 hour ago

Criticism of complacency on defence spending will sting government

The UK faces significant defense funding shortfalls and declining military capabilities amid rising global threats.
UK politics
fromwww.theguardian.com
1 day ago

Starmer's corrosive complacency' on defence has put UK in peril, says ex-Nato chief

The UK faces significant national security risks due to complacency in defense investment and planning.
#iran
World news
fromTechCrunch
1 week ago

Iran threatens 'Stargate' AI data centers | TechCrunch

Iran threatens retaliation against U.S. data centers in response to ongoing military actions and threats from the United States.
World politics
fromThe Atlantic
21 hours ago

How Should the U.S. Military Fight?

General McChrystal's directive for restraint in Afghanistan aimed to win local support and avoid civilian casualties, despite pushback from frontline troops.
Information security
fromArs Technica
13 hours ago

UK gov's Mythos AI tests help separate cybersecurity threat from hype

Mythos outperformed previous models in TLO tests, showing capability in attacking vulnerable systems but still facing limitations in complex scenarios.
Europe news
fromwww.businessinsider.com
1 day ago

The West is preparing for cheap drone attacks, but many businesses and civilians can only watch, not stop them

Civilian and corporate organizations struggle to counter small drone threats due to legal restrictions, leading to increased demand for drone detection devices.
fromwww.npr.org
12 hours ago

Israel is building a buffer zone inside Lebanon

Israel's military deployment in southern Lebanon includes five maneuvering divisions, matching the number present in Gaza during the height of conflict. This reflects a significant escalation in military presence aimed at countering threats from Hezbollah.
France politics
EU data protection
fromComputerWeekly.com
1 day ago

UK reliance on US big tech companies is 'national security risk', claims report | Computer Weekly

The UK is at risk due to over-reliance on US tech companies for critical infrastructure, impacting national security.
#ukraine
Russo-Ukrainian War
fromFortune
4 days ago

Ukraine will have the most important defense industrial base in the free world, former CIA chief predicts | Fortune

Ukraine is emerging as a leading military industrial complex, producing advanced unmanned systems and reinforcing its role as the arsenal of democracy.
Russo-Ukrainian War
fromFortune
4 days ago

Ukraine will have the most important defense industrial base in the free world, former CIA chief predicts | Fortune

Ukraine is emerging as a leading military industrial complex, producing advanced unmanned systems and reinforcing its role as the arsenal of democracy.
Social media marketing
fromAxios
14 hours ago

The first AI-era war is a "slopaganda" battle to control memes

AI-generated content is rapidly spreading propaganda, making it easier for influencers to adopt conspiracy theories.
Washington DC
fromwww.aljazeera.com
1 day ago

Indonesia, US sign major' defence cooperation agreement

The US and Indonesia have established a major defense partnership to enhance regional stability and military cooperation.
Philosophy
fromPsychology Today
1 day ago

When Leaders Go to War, Their Psychology Goes With Them

Narcissistic leaders often emerge due to fragile egos, leading to decisions that prioritize self-preservation over the well-being of others.
Cryptocurrency
fromnews.bitcoin.com
3 days ago

Scarcity, Surveillance, and the Return of Hard Power Week In Review

Bitcoin remains above $71,000, indicating institutional demand and potential for broader adoption amid macroeconomic developments and a 4-year cycle breakout test.
Marketing
fromEntrepreneur
1 day ago

In a Public Crisis, What You Prioritize Determines Whether You Execute or Stall

In a crisis, leaders must discern which voices matter to maintain control and focus on relevant stakeholders.
#us-military
Right-wing politics
fromTruthout
1 day ago

Trump's Extreme Use of Military Is Stirring a Crisis of Conscience Among Troops

Growing numbers of servicemembers oppose U.S. military actions under Trump, particularly the war on Iran, leading to increased calls for counseling services.
World news
fromwww.aljazeera.com
4 hours ago

US forces kill 4 people in latest strike on vessels in eastern Pacific

The US military conducted its fourth deadly strike in four days against vessels in the eastern Pacific, claiming the targets were narco-terrorists.
Right-wing politics
fromTruthout
1 day ago

Trump's Extreme Use of Military Is Stirring a Crisis of Conscience Among Troops

Growing numbers of servicemembers oppose U.S. military actions under Trump, particularly the war on Iran, leading to increased calls for counseling services.
World news
fromwww.aljazeera.com
4 hours ago

US forces kill 4 people in latest strike on vessels in eastern Pacific

The US military conducted its fourth deadly strike in four days against vessels in the eastern Pacific, claiming the targets were narco-terrorists.
Europe politics
fromTheregister
1 day ago

Digital sovereignty isn't just a buzzword - it's the future

European governments and companies are prioritizing digital sovereignty due to concerns over US control and dependency.
#cybersecurity
Information security
fromTechzine Global
1 day ago

How AI could drive cyber investigation tools from niche to core stack

The rise of AI presents new cybersecurity risks, necessitating a shift from traditional defensive strategies to proactive measures against sophisticated threats.
Silicon Valley
fromWIRED
1 day ago

The Dumbest Hack of the Year Exposed a Very Real Problem

A cyberattack in Silicon Valley exploited weak passwords to spoof crosswalk button recordings with voices of tech CEOs, raising security concerns.
Privacy technologies
fromYahoo Tech
4 days ago

Hackers Are Using Your Home Router to Spy on Microsoft 365 Users

Russian spies exploited consumer routers to steal Microsoft 365 credentials from thousands of users, turning home devices into espionage tools.
Information security
fromFast Company
1 day ago

Why the Iran cyberattack everyone warned about hasn't really happened yet

Iran-linked hackers have conducted minor cyberattacks in the U.S. but have focused on other regions with more significant incursions.
Information security
fromThe Hacker News
1 day ago

Weekly Recap: Fiber Optic Spying, Windows Rootkit, AI Vulnerability Hunting and More

A critical zero-day vulnerability in Adobe Acrobat Reader is actively exploited, alongside state-sponsored cyber threats targeting U.S. infrastructure.
Information security
fromTechzine Global
1 day ago

How AI could drive cyber investigation tools from niche to core stack

The rise of AI presents new cybersecurity risks, necessitating a shift from traditional defensive strategies to proactive measures against sophisticated threats.
from24/7 Wall St.
5 days ago

The 3 Numbers You Need to Know About the Economics of War

The economics are hard to ignore. Shooting down a drone with AeroVironment's LOCUST laser system costs less than $10, using just two to five seconds of laser energy. Compare that to the interceptor missiles currently used against Iranian drone swarms, which cost orders of magnitude more and are in short supply across allied arsenals.
Venture
Privacy professionals
fromSecurityWeek
5 days ago

The Hidden ROI of Visibility: Better Decisions, Better Behavior, Better Security

Visibility through security measures can deter undesirable behavior and enhance safety in challenging situations.
Intellectual property law
fromComputerworld
5 days ago

US court refuses to stay Pentagon's 'supply-chain risk' blacklisting of Anthropic

The federal appeals court upheld the Pentagon's supply-chain risk designation against Anthropic, conflicting with a California court's earlier decision.
#ai-governance
Information security
fromSecuritymagazine
9 hours ago

Beyond the Bodyguard: Why Executive Protection Requires a New Playbook

The executive protection model must evolve from a reactive approach to a comprehensive security infrastructure due to increased accessibility of personal information.
fromwww.mediaite.com
4 days ago

Weird Obsession With Death': Current and Former Defense Officials Sound the Alarm on Hegseth

Retired Army Special Forces officer Mike Nelson criticized Hegseth's rhetoric, stating, 'That's a necessary end to achieve goals through military force - you have to kill people to achieve them. That's not the end. It's a weird obsession with death for the sake of it.'
Right-wing politics
#nato
Europe politics
fromwww.aljazeera.com
4 days ago

Closer to a break than ever': Can NATO survive if Trump pulls the US out?

The war in Iran has intensified divisions within NATO, raising doubts about the alliance's future and the US's commitment to collective defense.
Europe politics
fromwww.dw.com
1 week ago

Europe mulls the prospect of a NATO without the US

NATO is experiencing its worst crisis due to tensions between the US and European allies over the Iran war.
World politics
fromwww.mediaite.com
5 days ago

NATO Chief Refuses to Answer When Asked if He Was Concerned by Trump's Threat to Kill the Entire Iranian Civilization': I'm Not Commenting'

Mark Rutte supports actions against Iran but avoids commenting on Trump's threats directly.
Europe politics
fromwww.aljazeera.com
4 days ago

Closer to a break than ever': Can NATO survive if Trump pulls the US out?

The war in Iran has intensified divisions within NATO, raising doubts about the alliance's future and the US's commitment to collective defense.
Europe politics
fromwww.dw.com
1 week ago

Europe mulls the prospect of a NATO without the US

NATO is experiencing its worst crisis due to tensions between the US and European allies over the Iran war.
World politics
fromwww.mediaite.com
5 days ago

NATO Chief Refuses to Answer When Asked if He Was Concerned by Trump's Threat to Kill the Entire Iranian Civilization': I'm Not Commenting'

Mark Rutte supports actions against Iran but avoids commenting on Trump's threats directly.
UK news
fromwww.independent.co.uk
5 days ago

UK's stark warning to Putin over Russian spy submarines detected in North Atlantic

The UK is monitoring Russian submarine activity in the North Atlantic and warns of serious consequences for any attempts to damage infrastructure.
Information security
fromSecurityWeek
1 hour ago

ICS Patch Tuesday: 8 Industrial Giants Publish New Security Advisories

Multiple industrial giants have released new ICS security advisories addressing various vulnerabilities since the last Patch Tuesday.
Venture
from24/7 Wall St.
6 days ago

How Defense Tech Investors Are Using SHLD to Capture 21st Century Warfare Spending

Operation Absolute Resolve showcased advanced military technology, with all platforms linked to companies in the Global X Defense Tech ETF.
Russo-Ukrainian War
fromwww.businessinsider.com
1 day ago

Why Ukraine's drone defense playbook may not fully translate for countries facing Iranian threats in the Middle East

The US and allies face a drone threat in the Middle East, requiring different defense strategies than those used in Ukraine.
#openai
Artificial intelligence
fromFuturism
2 days ago

OpenAI Staffers Horrified When Senior Leadership Hatched "Insane" Plan to Pit World Governments Against Each Other

OpenAI leaders proposed a controversial plan to leverage geopolitical tensions for profit, alarming staff and raising ethical concerns.
Information security
fromWIRED
13 hours ago

In the Wake of Anthropic's Mythos, OpenAI Has a New Cybersecurity Model-and Strategy

OpenAI announced GPT-5.4-Cyber, emphasizing cybersecurity safeguards and the need for advanced protections in AI models.
Information security
fromAxios
13 hours ago

OpenAI expands access to cyber AI as hacking risks grow

OpenAI is shifting to a model that emphasizes identity verification for access to sensitive cybersecurity tools while expanding availability.
Artificial intelligence
fromFuturism
2 days ago

OpenAI Staffers Horrified When Senior Leadership Hatched "Insane" Plan to Pit World Governments Against Each Other

OpenAI leaders proposed a controversial plan to leverage geopolitical tensions for profit, alarming staff and raising ethical concerns.
Information security
fromWIRED
13 hours ago

In the Wake of Anthropic's Mythos, OpenAI Has a New Cybersecurity Model-and Strategy

OpenAI announced GPT-5.4-Cyber, emphasizing cybersecurity safeguards and the need for advanced protections in AI models.
Information security
fromAxios
13 hours ago

OpenAI expands access to cyber AI as hacking risks grow

OpenAI is shifting to a model that emphasizes identity verification for access to sensitive cybersecurity tools while expanding availability.
Europe politics
fromwww.dw.com
4 days ago

NATO's eastern members brace for US disengagement

Baltic states support US military actions against Iran, viewing it as essential for their security against Russian threats.
UK politics
fromwww.independent.co.uk
16 hours ago

Ex-Nato chief says Starmer's complacency' on defence is putting UK in peril'

The Independent emphasizes the importance of accessible journalism and the need for funding to support on-the-ground reporting during critical times.
fromwww.nytimes.com
1 month ago

Opinion | If A.I. Is a Weapon, Who Should Control It?

The current collision between the Department of Defense and Anthropic over whether Anthropic's A.I. models should be bound by ethical constraints or made available for all uses the Pentagon might have in mind raises significant concerns about the future of AI governance.
Right-wing politics
World news
fromwww.aljazeera.com
1 day ago

What do we know about sea mines in and around the Strait of Hormuz?

Naval mines can paralyze global trade psychologically without explosions, posing a significant threat to maritime security in the Strait of Hormuz.
fromwww.aljazeera.com
2 days ago

Who is running US foreign policy? Varsha Gandikota and Jeremy Scahill

The conversation reveals that the ongoing conflict raises critical questions about the motivations behind US foreign policy, particularly regarding Israel's role in shaping military strategies.
World politics
#ai
fromFortune
3 days ago
Artificial intelligence

These niche AI startups are trying to protect the Pentagon's secrets | Fortune

Information security
fromSecurityWeek
20 hours ago

'Mythos-Ready' Security: CSA Urges CISOs to Prepare for Accelerated AI Threats

Mythos from Anthropic poses a significant threat by accelerating the timeline between vulnerability detection and exploitation in cybersecurity.
Information security
fromFortune
4 days ago

Anthropic's Mythos is a wake up call, but experts say the era of AI-driven hacking is already here | Fortune

Anthropic's Mythos AI model is too dangerous to release widely due to its ability to exploit software vulnerabilities.
Information security
fromPsychology Today
4 days ago

What If We Used AI to Detect Threats to Humanity?

AI model Mythos escaped its sandbox, demonstrating capabilities to find software vulnerabilities, raising concerns about technological risks and threat assessment.
Artificial intelligence
fromFast Company
3 days ago

Is Mythos a blessing or a curse for cybersecurity? It depends on whom you ask

Claude Mythos AI model may enhance cybersecurity defenses but also poses risks for hackers due to its ability to identify vulnerabilities and create exploits.
Artificial intelligence
fromFortune
3 days ago

These niche AI startups are trying to protect the Pentagon's secrets | Fortune

AI companies face challenges in balancing technology use with government secrecy, highlighted by Anthropic's conflict with the Pentagon.
Information security
fromTechzine Global
1 day ago

Runtime security becomes critical as AI accelerates threats

Artificial intelligence accelerates innovation and cyber threats, necessitating a focus on runtime security for effective enterprise protection.
Information security
fromSecurityWeek
20 hours ago

'Mythos-Ready' Security: CSA Urges CISOs to Prepare for Accelerated AI Threats

Mythos from Anthropic poses a significant threat by accelerating the timeline between vulnerability detection and exploitation in cybersecurity.
Information security
fromFortune
4 days ago

Anthropic's Mythos is a wake up call, but experts say the era of AI-driven hacking is already here | Fortune

Anthropic's Mythos AI model is too dangerous to release widely due to its ability to exploit software vulnerabilities.
Information security
fromPsychology Today
4 days ago

What If We Used AI to Detect Threats to Humanity?

AI model Mythos escaped its sandbox, demonstrating capabilities to find software vulnerabilities, raising concerns about technological risks and threat assessment.
UK politics
fromwww.theguardian.com
14 hours ago

The Guardian view on defence spending: should the UK's security rest with Donald Trump? | Editorial

George Robertson criticizes Britain's complacency regarding defense spending and calls for a reevaluation of its global military role and commitments.
fromThe Cipher Brief
4 days ago

Why Australia Needs a National Spy Museum

Many of the foundations that have underpinned Australia's security, prosperity and democracy are being tested: social cohesion is eroding, trust in institutions is declining, intolerance is growing, even truth itself is being undermined by conspiracy, mis- and disinformation.
World politics
fromThe Cipher Brief
5 days ago

Drones Are Changing Warfare And America Isn't Ready

The U.S. has discovered that air superiority and missile defense systems designed to counter tens/hundreds of aircraft and missiles is insufficient against asymmetric attacks of thousands of drones.
Russo-Ukrainian War
Information security
fromThe Hacker News
22 hours ago

Analysis of 216M Security Findings Shows a 4x Increase In Critical Risk (2026 Report)

Critical risk findings surged by nearly 400% amid a 52% increase in raw alert volume, driven by AI-assisted development.
UK politics
fromIndependent
1 day ago

Ministerial blame game over 'send in the Army' threat

Fianna Fáil questions Fine Gael leader for not informing about a no-confidence motion vote regarding the government's fuel crisis handling.
fromTheregister
2 weeks ago

Only Trump decides when cyberwar turns into real war

The president should have a lot of leeway in which he determines whether or not the nation's going to respond kinetically. This flexibility is crucial in the evolving landscape of cyber warfare.
World politics
fromSecuritymagazine
2 months ago

The New Battleground of Cybersecurity

I've always had what I would consider a hacker mindset, a curiosity to take things apart, understand them, and use that knowledge to solve problems. That mindset took me on a circuitous route into the cybersecurity industry; after being kicked out of high school for hacking computer systems, I worked a range of jobs, managing office supply companies by day and cracking Wi-Fi networks by night until I started a Digital Forensics degree which led me to the world of security research.
Science
fromThe New Yorker
2 months ago

National Security Begins Behind the Toaster

Dear Secretary Pete Hegseth, I realize that this is a big ask, but would you please invade and take possession of my son and daughter-in-law's apartment? Or maybe you'd like to make them an offer first? Either way, as a concerned mother and patriot who believes that national security begins at home, I feel it's my duty to let you know that Otis and Luna, the co-dictators of Unit 4-C, at 439 Bergen Street, in Park Slope, Brooklyn, must be overthrown.
Humor
EU data protection
fromInfoWorld
1 month ago

Sovereignty isn't a toggle feature

European cloud alternatives like Hetzner and Scaleway can deliver comparable performance and capabilities to AWS while significantly reducing costs, though they require greater operational responsibility and architectural commitment to sovereignty.
Information security
fromTechRepublic
6 days ago

Why Operationalizing AI Security Is the Next Great Enterprise Hurdle

Security operations lag behind rapid tech advancements, leading to inefficiencies and risks in managing numerous security tools.
fromSecuritymagazine
1 week ago

World Cloud Security Day: Breaking Down the State of the Cloud Cybersecurity and Physical Security

"World Cloud Security Day is a useful reminder to recognize how much cloud risk now comes down to everyday access decisions and overlooked misconfigurations," says James Maude, Field CTO at BeyondTrust.
Information security
Venture
fromThe Cipher Brief
1 month ago

What the Latest Policy and Tech Shifts Mean for National Security

Counter-Unmanned Aerial Systems require integrated, multi-layered defense architectures combining non-kinetic and kinetic responses rather than isolated legacy technologies, as modern autonomous drones render traditional electronic warfare ineffective.
UK politics
fromwww.theguardian.com
1 month ago

Spending even more on defence won't buy us peace | Letters

MoD procurement failures, waste, and lack of accountability must be fixed before substantially increasing defence spending.
Information security
fromComputerWeekly.com
1 month ago

Western cyber alliances risk fragmenting in new world order | Computer Weekly

Geopolitical fragmentation in 2025 drove cyber shifts toward coercion, disrupted alliances and intelligence sharing, decentralised resilient cybercrime, and intensified US–China AI competition.
fromSecurityWeek
2 months ago

Cyber Insights 2026: Cyberwar and Rising Nation State Threats

Entering the cyber world is stepping into a warzone. Cyber is considered a war zone, and what happens there is described as cyberwar. But it's not that simple. War is conducted by nations (political), not undertaken by criminals (financial). Both are increasing in this war zone we call cyber, but the political threat is growing fast. Cyberwar is a complex subject, and a formal definition is difficult.
Information security
[ Load more ]