#anti-terrorism-measures

[ follow ]
#cybersecurity
Information security
fromTechzine Global
26 minutes ago

How AI could drive cyber investigation tools from niche to core stack

The rise of AI presents new cybersecurity risks, necessitating a shift from traditional defensive strategies to proactive measures against sophisticated threats.
fromFortune
2 days ago
Privacy professionals

First they went after medtech, then Kash Patel. Iranian hackers' next target is likely 'low-hanging fruit' in water, energy, and tourism, experts say | Fortune

Information security
fromTechzine Global
26 minutes ago

How AI could drive cyber investigation tools from niche to core stack

The rise of AI presents new cybersecurity risks, necessitating a shift from traditional defensive strategies to proactive measures against sophisticated threats.
Silicon Valley
fromWIRED
3 hours ago

The Dumbest Hack of the Year Exposed a Very Real Problem

A cyberattack in Silicon Valley exploited weak passwords to spoof crosswalk button recordings with voices of tech CEOs, raising security concerns.
Privacy technologies
fromYahoo Tech
2 days ago

Hackers Are Using Your Home Router to Spy on Microsoft 365 Users

Russian spies exploited consumer routers to steal Microsoft 365 credentials from thousands of users, turning home devices into espionage tools.
Privacy professionals
fromFortune
2 days ago

First they went after medtech, then Kash Patel. Iranian hackers' next target is likely 'low-hanging fruit' in water, energy, and tourism, experts say | Fortune

Iran-linked hackers are targeting high-profile figures and critical infrastructure in the U.S. and Israel to sow disruption.
Cryptocurrency
fromnews.bitcoin.com
3 days ago

Treasury Launches Cybersecurity Initiative Expanding Threat Intelligence Access for Digital Asset Firms

U.S. Treasury expands cybersecurity coordination with digital asset firms to enhance protections and integrate with traditional finance.
UK news
fromwww.independent.co.uk
4 hours ago

Phone firms should use technology to stop children taking nudes, police chief says

Tech firms must enhance children's online safety by preventing the creation of nude images on their devices, according to law enforcement officials.
US politics
fromwww.theguardian.com
21 hours ago

The Guardian view on AI politics: US datacentre protests are a warning to big tech | Editorial

Voters across the political spectrum are uniting against big tech's influence, particularly regarding AI datacentres and their environmental impact.
Cryptocurrency
fromnews.bitcoin.com
1 day ago

Scarcity, Surveillance, and the Return of Hard Power Week In Review

Bitcoin remains above $71,000, indicating institutional demand and potential for broader adoption amid macroeconomic developments and a 4-year cycle breakout test.
Digital life
fromCbsnews
1 day ago

Is your phone listening to you?

Phones are not listening to conversations; targeted ads are based on user behavior and interests.
fromwww.theguardian.com
2 days ago

From Isis recruit to influencer: People think: you're that evil girl who ran away'

Tareena Shakil, now 36, presents a glamorous image, wearing a tailored dress and carrying a Louis Vuitton handbag, contrasting sharply with her past as a convicted terrorist.
Women in technology
#ai
fromFortune
2 days ago
Artificial intelligence

These niche AI startups are trying to protect the Pentagon's secrets | Fortune

Information security
fromFortune
2 days ago

Anthropic's Mythos is a wake up call, but experts say the era of AI-driven hacking is already here | Fortune

Anthropic's Mythos AI model is too dangerous to release widely due to its ability to exploit software vulnerabilities.
Information security
fromPsychology Today
2 days ago

What If We Used AI to Detect Threats to Humanity?

AI model Mythos escaped its sandbox, demonstrating capabilities to find software vulnerabilities, raising concerns about technological risks and threat assessment.
Artificial intelligence
fromFast Company
2 days ago

Is Mythos a blessing or a curse for cybersecurity? It depends on whom you ask

Claude Mythos AI model may enhance cybersecurity defenses but also poses risks for hackers due to its ability to identify vulnerabilities and create exploits.
Artificial intelligence
fromFortune
2 days ago

These niche AI startups are trying to protect the Pentagon's secrets | Fortune

AI companies face challenges in balancing technology use with government secrecy, highlighted by Anthropic's conflict with the Pentagon.
Information security
fromFortune
2 days ago

Anthropic's Mythos is a wake up call, but experts say the era of AI-driven hacking is already here | Fortune

Anthropic's Mythos AI model is too dangerous to release widely due to its ability to exploit software vulnerabilities.
Information security
fromPsychology Today
2 days ago

What If We Used AI to Detect Threats to Humanity?

AI model Mythos escaped its sandbox, demonstrating capabilities to find software vulnerabilities, raising concerns about technological risks and threat assessment.
#terrorism
Brooklyn
fromDailywire
4 days ago

Inspired By ISIS To Attack A NYC Jewish Center, A Pakistani National Just Entered A Surprising Plea

Muhammad Shahzeb Khan pleaded guilty to plotting an ISIS-inspired attack on a Jewish center in New York City, facing a potential life sentence.
Right-wing politics
fromThe Atlantic
1 month ago

The Peculiar State of Islamic Terror in America

Two men threw homemade bombs at an anti-Muslim demonstration outside NYC's mayor's home, claiming ISIS inspiration, though no direct terrorist group connection was established.
Brooklyn
fromDailywire
4 days ago

Inspired By ISIS To Attack A NYC Jewish Center, A Pakistani National Just Entered A Surprising Plea

Muhammad Shahzeb Khan pleaded guilty to plotting an ISIS-inspired attack on a Jewish center in New York City, facing a potential life sentence.
Right-wing politics
fromThe Atlantic
1 month ago

The Peculiar State of Islamic Terror in America

Two men threw homemade bombs at an anti-Muslim demonstration outside NYC's mayor's home, claiming ISIS inspiration, though no direct terrorist group connection was established.
fromwww.mediaite.com
2 days ago

Weird Obsession With Death': Current and Former Defense Officials Sound the Alarm on Hegseth

Retired Army Special Forces officer Mike Nelson criticized Hegseth's rhetoric, stating, 'That's a necessary end to achieve goals through military force - you have to kill people to achieve them. That's not the end. It's a weird obsession with death for the sake of it.'
Right-wing politics
US news
fromSecuritymagazine
3 days ago

Top Secret Clearance Holder Charged With Leaking Classified National Defense Information

Courtney Williams was arrested for allegedly sharing classified national defense information with unauthorized individuals, including a journalist, from 2022 to 2025.
fromThe Cipher Brief
2 days ago

Why Australia Needs a National Spy Museum

Many of the foundations that have underpinned Australia's security, prosperity and democracy are being tested: social cohesion is eroding, trust in institutions is declining, intolerance is growing, even truth itself is being undermined by conspiracy, mis- and disinformation.
World politics
Education
fromSecuritymagazine
3 days ago

School's Out, But Security's Not: Preparing for K-12 Summertime Security

Summer vacation does not reduce security threats in K-12 environments; instead, the nature of risks changes significantly.
Washington DC
fromNextgov.com
2 days ago

DHS intelligence office restructuring would still keep it under ODNI oversight

The White House plans to restructure DHS's intelligence unit while maintaining its oversight under the Office of the Director of National Intelligence.
SF politics
fromWIRED
4 days ago

Politicians Are Spending More Money on Security as They Increasingly Become Targets

Federal campaign spending on security for the 2024 election cycle exceeds five times that of the 2016 election due to rising threats against public servants.
Law
fromIndependent
2 days ago

Computer engineer claims he was penalised for flagging Israeli links of firm given 'bananas' server access at top Irish cybersecurity company

A cyber-security firm reprimanded an engineer for discriminatory comments regarding an Israeli company's access to its servers amid concerns about Palestinian genocide.
Careers
fromComputerWeekly.com
2 days ago

Businesses are paying the price for CISO burnout | Computer Weekly

Burnout among CISOs poses significant risks to businesses, driven by overwhelming responsibilities and rising cyber threats.
Apple
fromTheregister
4 days ago

Security reserchers tricked Apple Intelligence into cursing

Apple Intelligence can be hijacked through prompt injection, exposing millions of users to risk, but a fix was implemented in iOS 26.4 and macOS 26.4.
fromThe Cipher Brief
4 days ago

Drones Are Changing Warfare And America Isn't Ready

The U.S. has discovered that air superiority and missile defense systems designed to counter tens/hundreds of aircraft and missiles is insufficient against asymmetric attacks of thousands of drones.
Russo-Ukrainian War
#iran
World news
fromTechCrunch
6 days ago

Iran threatens 'Stargate' AI data centers | TechCrunch

Iran threatens retaliation against U.S. data centers in response to ongoing military actions and threats from the United States.
Privacy professionals
fromAxios
1 week ago

Cyber warfare starts to get personal in war between U.S., Israel and Iran

Iran-linked hackers are using data leaks and intimidation tactics against individuals to influence public perception during the current conflict.
Information security
fromWIRED
5 days ago

Iran-Linked Hackers Are Sabotaging US Energy and Water Infrastructure

Iran has launched a hacking campaign targeting US industrial control systems, causing disruptions in critical infrastructure.
World news
fromTechCrunch
6 days ago

Iran threatens 'Stargate' AI data centers | TechCrunch

Iran threatens retaliation against U.S. data centers in response to ongoing military actions and threats from the United States.
Privacy professionals
fromAxios
1 week ago

Cyber warfare starts to get personal in war between U.S., Israel and Iran

Iran-linked hackers are using data leaks and intimidation tactics against individuals to influence public perception during the current conflict.
Information security
fromWIRED
5 days ago

Iran-Linked Hackers Are Sabotaging US Energy and Water Infrastructure

Iran has launched a hacking campaign targeting US industrial control systems, causing disruptions in critical infrastructure.
fromwww.bbc.com
4 days ago

Teen tried to buy gun for terrorist attack, court told

Alfie Coleman, 21, from Great Notley, Essex, had spent the previous months messaging people who he thought were fellow extremists in 2023. In fact, they were MI5 operatives who arranged to sell him a pistol and ammunition.
London politics
Privacy professionals
fromSecurityWeek
4 days ago

The Hidden ROI of Visibility: Better Decisions, Better Behavior, Better Security

Visibility through security measures can deter undesirable behavior and enhance safety in challenging situations.
fromFortune
3 days ago

'This utter lack of communication and consultation flies in the face of federal law': states push against immigration detention plans | Fortune

ICE purchased a 418,000-square-foot warehouse in Surprise, Arizona, for $70 million, with plans for a processing site capable of handling 1,000 to 1,500 immigrants daily.
US politics
fromwww.nytimes.com
1 month ago

Opinion | If A.I. Is a Weapon, Who Should Control It?

The current collision between the Department of Defense and Anthropic over whether Anthropic's A.I. models should be bound by ethical constraints or made available for all uses the Pentagon might have in mind raises significant concerns about the future of AI governance.
Right-wing politics
Privacy professionals
fromWIRED
5 days ago

Men Are Buying Hacking Tools to Use Against Their Wives and Friends

Telegram groups facilitate the sale of hacking and surveillance services, promoting abusive content targeting women and girls.
#ice
US politics
fromTechCrunch
1 week ago

ICE says it bought Paragon's spyware to use in drug trafficking cases | TechCrunch

ICE has utilized spyware from Paragon Solutions to combat drug trafficking and foreign terrorist organizations' use of encrypted communications.
US politics
fromSilicon Canals
1 week ago

ICE confirms it deployed Paragon spyware inside the United States for drug trafficking cases - Silicon Canals

ICE is using commercial spyware domestically, raising constitutional concerns about warrantless surveillance and lack of oversight.
US politics
fromTechCrunch
1 week ago

ICE says it bought Paragon's spyware to use in drug trafficking cases | TechCrunch

ICE has utilized spyware from Paragon Solutions to combat drug trafficking and foreign terrorist organizations' use of encrypted communications.
US politics
fromSilicon Canals
1 week ago

ICE confirms it deployed Paragon spyware inside the United States for drug trafficking cases - Silicon Canals

ICE is using commercial spyware domestically, raising constitutional concerns about warrantless surveillance and lack of oversight.
Right-wing politics
fromTruthout
5 days ago

Trump's Budget Request Includes Funding an FBI Anti-"Domestic Terrorism" Center

Trump's budget includes a significant increase in counterterrorism funding and establishes an FBI-led center to identify domestic terrorists.
London politics
fromwww.theguardian.com
1 week ago

Overwhelmed' Prevent at risk of missing threats as referrals rise, UK counter-terror chief says

Prevent scheme faces overwhelming referrals, risking identification of genuine threats due to increased volume and lack of triage system.
Privacy professionals
fromTechCrunch
4 days ago

Hackers steal and leak sensitive LAPD police documents | TechCrunch

Cybercriminals leaked sensitive LAPD documents online, including personnel files and internal investigations, allegedly by the extortion gang World Leaks.
#fbi
Privacy professionals
fromSecuritymagazine
1 week ago

Breach of FBI Surveillance System Considered a "Major Incident," Security Experts Weigh In

FBI confirms major breach of surveillance system, exposing sensitive data and potentially revealing criminal probes and surveillance targets.
Privacy professionals
fromTechRepublic
1 week ago

FBI Declares Surveillance System Breach a 'Major Incident'

A China-linked breach of an FBI surveillance system has been classified as a major incident, posing significant risks to US national security.
Privacy professionals
fromSecuritymagazine
1 week ago

Breach of FBI Surveillance System Considered a "Major Incident," Security Experts Weigh In

FBI confirms major breach of surveillance system, exposing sensitive data and potentially revealing criminal probes and surveillance targets.
Privacy professionals
fromTechRepublic
1 week ago

FBI Declares Surveillance System Breach a 'Major Incident'

A China-linked breach of an FBI surveillance system has been classified as a major incident, posing significant risks to US national security.
fromSecurityWeek
3 days ago

MITRE Releases Fight Fraud Framework

"These incidents involve the intentional use of deceptive or illegal practices to fraudulently obtain money, assets, or information from individuals or institutions, and include actions carried out over cyber channels."
Information security
Information security
fromTechRepublic
4 days ago

Why Operationalizing AI Security Is the Next Great Enterprise Hurdle

Security operations lag behind rapid tech advancements, leading to inefficiencies and risks in managing numerous security tools.
fromThe New Yorker
2 months ago

National Security Begins Behind the Toaster

Dear Secretary Pete Hegseth, I realize that this is a big ask, but would you please invade and take possession of my son and daughter-in-law's apartment? Or maybe you'd like to make them an offer first? Either way, as a concerned mother and patriot who believes that national security begins at home, I feel it's my duty to let you know that Otis and Luna, the co-dictators of Unit 4-C, at 439 Bergen Street, in Park Slope, Brooklyn, must be overthrown.
Humor
Information security
fromThe Hacker News
5 days ago

Shrinking the IAM Attack Surface through Identity Visibility and Intelligence Platforms (IVIP)

Enterprise IAM faces fragmentation, leading to Identity Dark Matter and a significant gap in visibility and security oversight.
US politics
fromwww.mediaite.com
1 month ago

High Alert': DHS and FBI Monitoring Potential Threats on US Soil During Strikes on Iran

U.S. homeland security officials are coordinating enhanced monitoring and threat prevention measures following military action against Iran.
US news
fromEmptywheel
2 months ago

NYPD's Spooks Didn't Find Two of the Most Significant Terrorists to Attempt Attacks on NYC

The NYPD built a secret intelligence unit targeting Muslim communities, using Israeli-derived mapping, informants in mosques, shredded records, and unofficial CIA links.
Information security
fromSecurityWeek
5 days ago

The New Rules of Engagement: Matching Agentic Attack Speed

AI-enabled cyberattacks are currently occurring, with significant impacts on organizations and a widening gap between attackers and defenders.
Information security
fromThe Hacker News
6 days ago

The Hidden Cost of Recurring Credential Incidents

Credential incidents cause significant operational costs and disruptions, impacting IT teams and overall business productivity beyond just breach prevention.
Information security
fromThe Hacker News
6 days ago

Multi-OS Cyberattacks: How SOCs Close a Critical Risk in 3 Steps

Multi-OS attacks complicate SOC operations, leading to delays, fragmented evidence, and increased escalation volume, ultimately allowing attackers more time to operate.
[ Load more ]