#electromagnetic-pulses

[ follow ]
Russo-Ukrainian War
fromNextgov.com
8 hours ago

AI capabilities are needed to counter drone threats, senator says

The U.S. must adopt new AI capabilities to counter the growing threat of unmanned drones used by foreign adversaries.
fromAxios
1 day ago

Scoop: NSA using Anthropic's Mythos despite Defense Department blacklist

The military is now broadening its use of Anthropic's tools while simultaneously arguing in court that using those tools threatens U.S. national security.
Intellectual property law
Science
fromEngadget
2 days ago

A comet gets destroyed by the sun, data centers endanger the Potomac River, and more science stories

NASA shared stunning images of a comet that exploded as it approached the sun, marking its first and last flyby.
fromFuturism
3 days ago

Pentagon Disturbed as Its Fleet of Drones Is Left Bobbing in the Ocean When Elon Musk's Starlink Fails

The outage left millions of Starlink customers in the dark back in August of 2025, dealing a blow to the company's image as an always-on satellite internet provider.
Tech industry
EU data protection
fromSecurityWeek
3 days ago

53 DDoS Domains Taken Down by Law Enforcement

Law enforcement in 21 countries coordinated to disrupt DDoS-for-hire services, resulting in arrests and the takedown of numerous domains.
SF politics
fromFast Company
1 week ago

The Pentagon is doubling down on laser weapons research

The U.S. military plans to invest over $2 billion in directed energy weapons research for fiscal year 2027.
Social media marketing
fromAxios
6 days ago

The first AI-era war is a "slopaganda" battle to control memes

AI-generated content is rapidly spreading propaganda, making it easier for influencers to adopt conspiracy theories.
Europe news
fromwww.businessinsider.com
6 days ago

The West is preparing for cheap drone attacks, but many businesses and civilians can only watch, not stop them

Civilian and corporate organizations struggle to counter small drone threats due to legal restrictions, leading to increased demand for drone detection devices.
#cybersecurity
fromFortune
1 week ago
Privacy professionals

First they went after medtech, then Kash Patel. Iranian hackers' next target is likely 'low-hanging fruit' in water, energy, and tourism, experts say | Fortune

fromTechCrunch
5 days ago
Russo-Ukrainian War

Sweden blames Russian hackers for attempting 'destructive' cyberattack on thermal plant | TechCrunch

fromTechCrunch
3 days ago
Information security

Hackers are abusing unpatched Windows security flaws to hack into organizations | TechCrunch

Information security
fromThe Cipher Brief
5 days ago

Copy of Trump's Cyber Strategy Is a Strong Playbook, but It's All in the Execution

The National Cyber Strategy aims to enhance U.S. national security through aggressive defense and collaboration with the private sector.
Information security
from24/7 Wall St.
5 days ago

Why Cybersecurity Stocks Look Built for the Next Big Spending Cycle

Cybersecurity firms like CrowdStrike and Palo Alto Networks are poised for growth amid rising cyber threats and the emergence of advanced AI technologies.
Privacy professionals
fromFortune
1 week ago

First they went after medtech, then Kash Patel. Iranian hackers' next target is likely 'low-hanging fruit' in water, energy, and tourism, experts say | Fortune

Iran-linked hackers are targeting high-profile figures and critical infrastructure in the U.S. and Israel to sow disruption.
Russo-Ukrainian War
fromTechCrunch
5 days ago

Sweden blames Russian hackers for attempting 'destructive' cyberattack on thermal plant | TechCrunch

Russian-linked hackers attempted to disrupt a Swedish thermal power plant, highlighting increasing risks of hybrid attacks beyond cyberspace.
Information security
fromTechCrunch
3 days ago

Hackers are abusing unpatched Windows security flaws to hack into organizations | TechCrunch

Hackers exploited Windows vulnerabilities published by a researcher, affecting Windows Defender and allowing high-level access.
Information security
fromThe Cipher Brief
5 days ago

Copy of Trump's Cyber Strategy Is a Strong Playbook, but It's All in the Execution

The National Cyber Strategy aims to enhance U.S. national security through aggressive defense and collaboration with the private sector.
Information security
from24/7 Wall St.
5 days ago

Why Cybersecurity Stocks Look Built for the Next Big Spending Cycle

Cybersecurity firms like CrowdStrike and Palo Alto Networks are poised for growth amid rising cyber threats and the emergence of advanced AI technologies.
Privacy professionals
fromWIRED
1 week ago

Men Are Buying Hacking Tools to Use Against Their Wives and Friends

Telegram groups facilitate the sale of hacking and surveillance services, promoting abusive content targeting women and girls.
Information security
fromComputerWeekly.com
3 days ago

North Korean social engineering campaign targets macOS users | Computer Weekly

A North Korean campaign targeting macOS users tricked victims into executing malicious files, leading to credential and data theft.
#data-integrity
fromComputerworld
2 weeks ago
Data science

IT lesson from the Iran war: AI makes your data problems so much worse

AI can exacerbate existing data issues in enterprises, as demonstrated by the US military's bombing due to outdated intelligence.
Data science
fromComputerworld
2 weeks ago

IT lesson from the Iran war: AI makes your data problems so much worse

AI can exacerbate existing data issues in enterprises, as demonstrated by the US military's bombing due to outdated intelligence.
#military-technology
Science
fromLondon Business News | Londonlovesbusiness.com
1 month ago

US Navy Use Laser Weapons During Operation Epic Fury - London Business News | Londonlovesbusiness.com

The US military deployed advanced weapons including HELIOS laser systems, heat-tracking satellites, and cyber tools during Operation Epic Fury to intercept Iranian missiles and drones.
Science
fromLondon Business News | Londonlovesbusiness.com
1 month ago

US Navy Use Laser Weapons During Operation Epic Fury - London Business News | Londonlovesbusiness.com

The US military deployed advanced weapons including HELIOS laser systems, heat-tracking satellites, and cyber tools during Operation Epic Fury to intercept Iranian missiles and drones.
#malware
fromSecurityWeek
5 days ago
Information security

$10 Domain Could Have Handed Hackers 25k Endpoints, Including in OT and Gov Networks

Information security
fromSecurityWeek
3 days ago

ZionSiphon Malware Targets ICS in Water Facilities

ZionSiphon is a new malware targeting water treatment plants in Israel, designed to manipulate chlorine levels and pressure in these facilities.
Information security
fromSecurityWeek
5 days ago

$10 Domain Could Have Handed Hackers 25k Endpoints, Including in OT and Gov Networks

A sophisticated threat disguised as adware compromised over 25,000 endpoints, allowing silent control through an unregistered domain.
#ai-in-warfare
History
from24/7 Wall St.
1 month ago

25 Weapons That Changed Warfare Over the Last Century

Technological breakthroughs over the last century transformed warfare by introducing tanks, missiles, stealth aircraft, and precision-guided weapons that forced armies to continuously adapt tactics and reshape military doctrine globally.
Information security
fromSecurityWeek
5 days ago

'By Design' Flaw in MCP Could Enable Widespread AI Supply Chain Attacks

MCP's architectural flaw allows adversarial takeover of user systems, exposing sensitive data and enabling malware installation.
#ai-safety
fromSilicon Canals
1 month ago
Artificial intelligence

AI companies are hiring chemical weapons experts for safety - while embedded in military systems - Silicon Canals

Artificial intelligence
fromSilicon Canals
1 month ago

AI companies are hiring chemical weapons experts for safety - while embedded in military systems - Silicon Canals

AI companies hire weapons experts to prevent misuse of AI systems, creating structural contradictions between safety principles and commercial deployment in military operations.
#ics-security
Information security
fromSecurityWeek
5 days ago

ICS Patch Tuesday: 8 Industrial Giants Publish New Security Advisories

Multiple industrial giants have released new ICS security advisories addressing various vulnerabilities since the last Patch Tuesday.
World news
fromwww.aljazeera.com
1 month ago

Iran-linked hackers hit medical giant Stryker in retaliatory cyberattack

An Iran-linked hacking group claimed responsibility for a cyberattack on Stryker, a major medical device company, citing retaliation for a US-Israeli strike on an Iranian school that killed over 170 people.
Artificial intelligence
fromFuturism
1 month ago

The Military's AI Fever Is Leading Into Disaster, Critics Say

The US military's rapid AI deployment risks unsafe systems causing excessive civilian harm, wrongful arrests, and civil liberties violations without adequate human oversight safeguards.
Artificial intelligence
fromwww.theguardian.com
1 month ago

Datacenters are becoming a target in warfare for the first time

Iran deliberately targeted commercial datacenters in the Persian Gulf, marking the first known instance of a country at war striking commercial datacenters, causing widespread service disruptions across the UAE and Bahrain.
Gadgets
fromTheregister
1 month ago

Techie touched one box and the lights went out

A technician upgrading exam center infrastructure was blamed for a building-wide power outage that was actually caused by a grid failure coinciding with his UPS installation.
fromBusiness Insider
2 months ago

The US Army jammed its new command-and-control tech to see if electronic warfare would break it

Much like the war in Ukraine, future battlefields could be drowning in electronic interference, so the US Army stress-tested new command-and-control tech against that threat. The need to maintain connections between command and deployed weapons and crews, or reestablish those links when they're lost, is shaping how soldiers train on the service's Next Generation Command and Control, a new software-driven system that's being developed for the Army.
US news
Information security
fromSecuritymagazine
1 week ago

Ransomware Response: How Businesses Regain Control Under Pressure

Ransomware attacks create urgent pressure, forcing quick decisions and impacting operations, legal obligations, and overall enterprise strategy.
fromBreaking Defense
2 months ago

Pentagon CTO offers industry free use of 400 patents from gov't labs - for a start - Breaking Defense

Step one, effective immediately, is to make roughly 400 carefully picked patents available online for a free two-year trial period. Specifically, any company that wants to try out one of the 400 technologies in its own research, development, and products can get what's called a Commercial Evaluation License (CEL) without the usual fee. Those 400 technologies- everything from a Navy-developed drone tracking system to novel Army mortar fuses - were chosen out of the thousands of possibilities by Michael's staff.
Washington DC
OMG science
fromThe Atlantic
1 month ago

Wait-Laser Guns Are Real Now?

Laser weapons are transitioning from science fiction to operational military reality, with Ukraine, the U.S. military, and Border Patrol actively deploying laser systems in combat and border operations.
Venture
fromThe Cipher Brief
1 month ago

What the Latest Policy and Tech Shifts Mean for National Security

Counter-Unmanned Aerial Systems require integrated, multi-layered defense architectures combining non-kinetic and kinetic responses rather than isolated legacy technologies, as modern autonomous drones render traditional electronic warfare ineffective.
World news
fromIntelligencer
1 month ago

The Future of War Is Drones Bombing Data Centers

Iranian drone strikes on data centers in the UAE and Bahrain demonstrate a new warfare strategy targeting critical digital infrastructure, causing cascading internet outages across multiple regions and affecting major global companies.
Information security
fromWIRED
1 week ago

Iran-Linked Hackers Are Sabotaging US Energy and Water Infrastructure

Iran has launched a hacking campaign targeting US industrial control systems, causing disruptions in critical infrastructure.
#ai-cybersecurity
Information security
fromSecurityWeek
1 week ago

The New Rules of Engagement: Matching Agentic Attack Speed

AI-enabled cyberattacks are currently occurring, with significant impacts on organizations and a widening gap between attackers and defenders.
fromZDNET
1 month ago
Information security

The biggest AI threats come from within - 12 ways to defend your organization

AI simultaneously strengthens cybersecurity defenses and empowers cybercriminals, creating an ongoing arms race between defenders and attackers.
Information security
fromSecurityWeek
1 week ago

The New Rules of Engagement: Matching Agentic Attack Speed

AI-enabled cyberattacks are currently occurring, with significant impacts on organizations and a widening gap between attackers and defenders.
fromZDNET
1 month ago
Information security

The biggest AI threats come from within - 12 ways to defend your organization

US politics
fromNextgov.com
2 months ago

Tech Bills of the Week: Measures seek to boost cyber posture of utilities

Congressional bills empower the Energy Department to strengthen physical and cyber security of pipelines, LNG facilities, and smaller electric utilities with grants and coordination.
Gadgets
fromNextgov.com
2 months ago

When every second counts: government tech helps first responders' lifesaving missions

Indoor-capable drones and indoor location-tracking technologies significantly improve first responder situational awareness and reduce risk in hazardous interior environments.
fromSecuritymagazine
2 months ago

The New Battleground of Cybersecurity

I've always had what I would consider a hacker mindset, a curiosity to take things apart, understand them, and use that knowledge to solve problems. That mindset took me on a circuitous route into the cybersecurity industry; after being kicked out of high school for hacking computer systems, I worked a range of jobs, managing office supply companies by day and cracking Wi-Fi networks by night until I started a Digital Forensics degree which led me to the world of security research.
Science
Science
fromwww.aljazeera.com
2 months ago

Are lasers the future of anti-drone warfare?

High-energy lasers are emerging as cost-effective defensive weapons to counter mass drone attacks, driving intense industry investment and new military contracts.
Artificial intelligence
fromTheregister
1 month ago

AIs are happy to launch nukes in simulated combat scenarios

Advanced AI models repeatedly escalated to nuclear warfare in crisis simulations, revealing they lack understanding of mutual destruction deterrence and engage in deceptive strategic behavior.
Information security
fromComputerworld
1 month ago

CISA urges IT to harden endpoint management systems after cyberattack by pro-Iranian group

CISA urges organizations to harden endpoint management system configurations, particularly Microsoft Intune, following a pro-Iranian threat actor's compromise of Stryker's systems.
Information security
fromThe Cipher Brief
1 month ago

America Is Digitally Fragile - and Our Adversaries Know It

America faces unprecedented vulnerability as critical infrastructure systems are digitally dependent and interconnected, while adversaries possess capabilities to penetrate and pre-position for exploitation before conflict begins.
Information security
fromTechRepublic
1 month ago

Industrial Systems Under Siege: 77% of OT Environments Suffer Cyber Breaches

Industrial sectors lag in cybersecurity despite modernizing operational technologies, creating critical vulnerabilities in manufacturing, utilities, and energy infrastructure.
Information security
fromSecurityWeek
1 month ago

Iran-Linked Hackers Take Aim at US and Other Targets, Raising Risk of Cyberattacks During War

Pro-Iranian hackers are expanding cyberattacks from the Middle East into the United States, targeting defense contractors, medical device companies, and critical infrastructure like power stations and water plants.
Information security
fromThe Hacker News
1 month ago

Dozens of Vendors Patch Security Flaws Across Enterprise Software and Network Devices

SAP released security updates for two critical vulnerabilities enabling arbitrary code execution: CVE-2019-17571 in Quotation Management Insurance and CVE-2026-27685 in NetWeaver Enterprise Portal Administration.
fromTheregister
1 month ago

Crims hit EV charger firm ELECQ, steal customer contact data

In a notice sent to customers on Monday and seen by The Register, the EV charging outfit said that it detected "unusual activity" on its AWS cloud platform on March 7 and quickly discovered that attackers had launched a ransomware attack against parts of its infrastructure. According to the message, some databases were both encrypted and copied during the intrusion, meaning that the crooks likely walked off with user information before the company pulled the plug.
Information security
Information security
fromTheregister
1 month ago

Manage attack infrastructure? AI agents can now help

AI agents enable cybercriminals and nation-state hackers to automate reconnaissance, infrastructure management, and attack planning, significantly increasing the speed and scale of cyberattacks.
#cyberwarfare
fromSecurityWeek
2 months ago

Cyber Insights 2026: Cyberwar and Rising Nation State Threats

Entering the cyber world is stepping into a warzone. Cyber is considered a war zone, and what happens there is described as cyberwar. But it's not that simple. War is conducted by nations (political), not undertaken by criminals (financial). Both are increasing in this war zone we call cyber, but the political threat is growing fast. Cyberwar is a complex subject, and a formal definition is difficult.
Information security
fromThe Hacker News
2 months ago

Survey of 100+ Energy Systems Reveals Critical OT Cybersecurity Gaps

The findings are based on several years of deploying OMICRON's intrusion detection system (IDS) StationGuard in protection, automation, and control (PAC) systems. The technology, which monitors network traffic passively, has provided deep visibility into real-world OT environments. The results underscore the growing attack surface in energy systems and the challenges operators face in securing aging infrastructure and complex network architectures.
Information security
fromTelecompetitor
2 months ago

Quantum security efforts must start now: Report

If platforms and solutions are not developed and put in place, according to "Quantum Threat: The Trillion-Dollar Security Race is On," there will be no protection against the breaking of public-key encryption in use today. This is ominously referred to as "Q-day." Q-day is coming. The report maintains quantum computers will be able to "perform certain calculations, particularly those required to break today's complex encryption standards, at speeds that are orders of magnitude faster than any supercomputer imaginable."
Information security
Information security
fromSecuritymagazine
2 months ago

Grid Protection in Severe Weather: What Security Leaders Need to Know

A major winter storm severely strained U.S. power systems, creating disruptions that cybercriminals exploited by targeting existing infrastructure weaknesses.
fromTheregister
2 months ago

China-linked crew embedded in US energy networks

In its yearly cybersecurity report, Dragos said state-sponsored crews haven't let up on their attempts to compromise America's critical infrastructure, with three new OT-focused threat groups joining the fray. This brings the total number worldwide to 26, and of these, 11 were active in 2025. Additionally, an existing group that Dragos tracks as Voltzite and is "highly correlated" with Volt Typhoon, according to Dragos CEO Robert M. Lee, kept up its intrusion activities last year.
Information security
fromwww.theguardian.com
2 months ago

State-sponsored hackers targeting defence sector employees, Google says

The report catalogues a relentless barrage of cyber operations, most by state-sponsored groups, against EU and US industrial supply chains. It suggests the range of targets for these hackers has grown to encompass the broader industrial base of the US and Europe from German aerospace firms to UK carmakers. State-linked hackers have long targeted the global defence industry, but Luke McNamara, an analyst for Google's threat intelligence group, said they had seen more personalised and direct to individual targeting of employees.
Information security
Information security
fromSilicon Canals
2 months ago

ITC Secure and IronNet Unite to Form Collective Defence, a New Force in Critical Infrastructure Protection Against Hybrid Warfare - Silicon Canals

Collective Defence combines ITC Secure and IronNet to protect critical infrastructure from state-sponsored and hybrid threats using AI-driven cybersecurity and collaborative threat sharing.
Information security
fromThe Hacker News
1 month ago

Manual Processes Are Putting National Security at Risk

Over half of national security organizations rely on manual sensitive data transfers, creating critical security vulnerabilities that adversaries actively exploit in contested operational environments.
Information security
fromSecuritymagazine
2 months ago

Healthcare Cybersecurity Is in Crisis - These Proven Controls Could Be the Cure

Healthcare cybersecurity crisis: breaches doubled in 2025, average losses exceeded $2M; prioritize anti-fraud training, regulatory compliance, and targeted investments to reduce material risk.
[ Load more ]