#enemy-design

[ follow ]
fromwww.scientificamerican.com
1 hour ago

Why game theory could be critical in a nuclear war

The half-life of humanity is currently around 35 years, said Nobel laureate in physics David Gross as he concluded an evening lecture at the German Physical Society's conference in Erlangen in March.
Philosophy
SF parents
fromThe Cipher Brief
3 days ago

Could Your Child Be a Member of the Most Dangerous Online Community? What Every Parent Needs to Watch Out For

The True Crime Community is a dangerous online subculture that idolizes mass shooters and has been linked to numerous violent attacks.
Social media marketing
fromAxios
4 days ago

The first AI-era war is a "slopaganda" battle to control memes

AI-generated content is rapidly spreading propaganda, making it easier for influencers to adopt conspiracy theories.
Artificial intelligence
fromFortune
4 days ago

A retired general's warning: America can't fight the AI arms race on tech it doesn't control | Fortune

The U.S. faces a critical AI arms race affecting military power and national security, highlighted by the Anthropic-Pentagon standoff over AI usage control.
Psychology
fromFast Company
4 days ago

How we make decisions, and how to reach people who've already made up their minds

The Elaboration Likelihood Model explains how motivation and ability influence how people process persuasive information through central and peripheral routes.
World politics
fromThe Atlantic
5 days ago

How Should the U.S. Military Fight?

General McChrystal's directive for restraint in Afghanistan aimed to win local support and avoid civilian casualties, despite pushback from frontline troops.
#drone-warfare
Roam Research
fromwww.businessinsider.com
5 days ago

The US Army surged its largest counter-drone training deployment to the Middle East during the Iran war

The US Army has launched its largest counter-drone training mission in the Middle East amid the Iran war, utilizing the Merops system.
fromwww.mediaite.com
1 week ago

Weird Obsession With Death': Current and Former Defense Officials Sound the Alarm on Hegseth

Retired Army Special Forces officer Mike Nelson criticized Hegseth's rhetoric, stating, 'That's a necessary end to achieve goals through military force - you have to kill people to achieve them. That's not the end. It's a weird obsession with death for the sake of it.'
Right-wing politics
Privacy professionals
fromWIRED
1 week ago

Men Are Buying Hacking Tools to Use Against Their Wives and Friends

Telegram groups facilitate the sale of hacking and surveillance services, promoting abusive content targeting women and girls.
Philosophy
fromPsychology Today
5 days ago

When Leaders Go to War, Their Psychology Goes With Them

Narcissistic leaders often emerge due to fragile egos, leading to decisions that prioritize self-preservation over the well-being of others.
#cybersecurity
fromThe Hacker News
3 weeks ago
Information security

China-Linked Red Menshen Uses Stealthy BPFDoor Implants to Spy via Telecom Networks

A China-nexus threat actor has embedded itself in telecom networks for espionage, utilizing stealthy access mechanisms and advanced malware tools.
Information security
fromThe Hacker News
3 weeks ago

The Kill Chain Is Obsolete When Your AI Agent Is the Threat

A state-sponsored threat actor used an AI coding agent for autonomous cyber espionage, raising concerns about compromised AI agents within environments.
Information security
fromThe Cipher Brief
3 days ago

Copy of Trump's Cyber Strategy Is a Strong Playbook, but It's All in the Execution

The National Cyber Strategy aims to enhance U.S. national security through aggressive defense and collaboration with the private sector.
Information security
fromNextgov.com
1 week ago

US push to counter hackers draws industry deeper into offensive cyber debate

The U.S. government seeks private sector involvement in cyber defense, but clarity on offensive roles remains uncertain.
Information security
fromThe Hacker News
2 weeks ago

3 Reasons Attackers Are Using Your Trusted Tools Against You (And Why You Don't See It Coming)

Cyber attackers increasingly exploit legitimate tools within environments, making detection difficult and expanding the attack surface organizations must manage.
Information security
fromThe Hacker News
3 weeks ago

China-Linked Red Menshen Uses Stealthy BPFDoor Implants to Spy via Telecom Networks

A China-nexus threat actor has embedded itself in telecom networks for espionage, utilizing stealthy access mechanisms and advanced malware tools.
Information security
fromThe Hacker News
3 weeks ago

The Kill Chain Is Obsolete When Your AI Agent Is the Threat

A state-sponsored threat actor used an AI coding agent for autonomous cyber espionage, raising concerns about compromised AI agents within environments.
World news
fromThe Washington Post
2 weeks ago

Chinese firms market Iran war intelligence 'exposing' U.S. forces

Chinese firms are leveraging AI and open-source data to track U.S. military movements, posing potential security risks amid the Iran conflict.
Artificial intelligence
fromFuturism
1 week ago

OpenAI Staffers Horrified When Senior Leadership Hatched "Insane" Plan to Pit World Governments Against Each Other

OpenAI leaders proposed a controversial plan to leverage geopolitical tensions for profit, alarming staff and raising ethical concerns.
Information security
fromSecurityWeek
4 days ago

'By Design' Flaw in MCP Could Enable Widespread AI Supply Chain Attacks

MCP's architectural flaw allows adversarial takeover of user systems, exposing sensitive data and enabling malware installation.
#manipulation
fromPsychology Today
3 weeks ago
Relationships

5 Manipulation Tactics You Might Not See Until It's Too Late

Gaslighting, guilt-tripping, moving the goalposts, and triangulation are manipulative tactics that undermine reality and self-worth in relationships.
fromSilicon Canals
4 weeks ago
Psychology

Research suggests the most effective way to shut down a manipulator isn't arguing with their logic - it's refusing to participate in the emotional transaction they're trying to create - Silicon Canals

Manipulators seek to dominate rather than engage in genuine dialogue, using emotional reactions as a means to control the interaction.
Relationships
fromPsychology Today
3 weeks ago

5 Manipulation Tactics You Might Not See Until It's Too Late

Gaslighting, guilt-tripping, moving the goalposts, and triangulation are manipulative tactics that undermine reality and self-worth in relationships.
Psychology
fromSilicon Canals
4 weeks ago

Research suggests the most effective way to shut down a manipulator isn't arguing with their logic - it's refusing to participate in the emotional transaction they're trying to create - Silicon Canals

Manipulators seek to dominate rather than engage in genuine dialogue, using emotional reactions as a means to control the interaction.
Psychology
fromwww.theguardian.com
3 weeks ago

They feel true': political deepfakes are growing in influence even if people know they aren't real

Online content creators are fabricating people and images for propaganda and profit, blurring the lines between reality and fiction.
Artificial intelligence
fromNextgov.com
2 weeks ago

Old-school spycraft could make a comeback as AI undermines trust

AI may enhance intelligence gathering but also revive traditional espionage methods due to reliability issues with digital communications.
Information security
fromSecurityWeek
1 week ago

The New Rules of Engagement: Matching Agentic Attack Speed

AI-enabled cyberattacks are currently occurring, with significant impacts on organizations and a widening gap between attackers and defenders.
World politics
fromwww.businessinsider.com
3 weeks ago

Total air defense is effectively impossible. In a major war, the West may have to make hard choices.

The West must make difficult choices about air defense priorities in large-scale wars due to limitations in resources and technology.
Media industry
fromwww.mediaite.com
1 month ago

War Propaganda Is Now Made for the Algorithm. Journalism Can't Keep Up.

Foreign and domestic propaganda spreads through social media when users amplify content that aligns with their existing beliefs, regardless of its manipulative intent or source.
Information security
fromTechzine Global
2 weeks ago

North Korea behind social engineering attack on Axios project

Attackers compromised the Axios maintainer's account through social engineering, publishing malicious versions that installed a Remote Access Trojan on victims' systems.
#ai-ethics
World news
fromwww.npr.org
1 month ago

Old-school tricks and AI tech are weapons in the Iran war

Israel and the U.S. employed deception tactics, cyber operations, and AI technology in coordinated military operations against Iran, disrupting Iranian communications and sensor networks while using hacked surveillance to locate targets.
Psychology
fromPsychology Today
1 month ago

When Your Co-Worker Is a Backstabber

Address backstabbing colleagues by calmly confronting them about what was said, requesting specific details, and apologizing if your actions were at fault.
#ai-in-warfare
Intellectual property law
fromwww.theguardian.com
1 month ago

What does the US military's feud with Anthropic mean for AI used in war?

Anthropic's refusal to allow Claude AI for domestic mass surveillance and autonomous weapons has triggered a Pentagon supply chain risk designation, highlighting tensions between tech company safety values and military demands.
World politics
fromwww.aljazeera.com
1 month ago

The battle on the propaganda front intensifies

Iran employs asymmetric economic tactics against U.S.-Israeli military superiority while misinformation complicates public understanding of the conflict.
fromwww.scientificamerican.com
1 month ago

How to win The Traitors, according to science

We watch people lying, and we know they're lying. And also, you watch people dealing with lying not very well and not enjoying it. The lying, backstabbing and manipulation the game inspires does indeed make for delightful TV viewing.
Television
Miscellaneous
fromZDNET
1 month ago

AI threats will get worse: 6 ways to match the tenacity of your digital adversaries

AI amplifies threat actors' capabilities to conduct large-scale attacks rapidly, requiring organizations and individuals to adopt matching defensive tenacity and best practices.
Science
fromThe Cipher Brief
2 months ago

Autonomy on the Battlefield

Autonomy enables commanders to delegate control to machines while retaining command, requiring a fundamental mindset shift and clear frameworks for authority and responsibility.
Canada news
fromFuturism
2 months ago

Canadian Military Exploring Taliban-Like Insurgent Tactics to Repel American Invasion

Canada is pivoting away from the United States by forming a strategic partnership with China and drafting military plans to repel a potential US invasion.
#military-ai
Artificial intelligence
fromFast Company
1 month ago

AI is being used in war, but it can't replace human judgment. Here's why

The U.S. military uses AI systems like Claude and Palantir's Maven for real-time targeting, but success depends on decades of infrastructure investment, skilled personnel, and human decision-making rather than autonomous machines.
Artificial intelligence
fromFast Company
1 month ago

AI is being used in war, but it can't replace human judgment. Here's why

The U.S. military uses AI systems like Claude and Palantir's Maven for real-time targeting, but success depends on decades of infrastructure investment, skilled personnel, and human decision-making rather than autonomous machines.
#cyber-warfare
World politics
fromwww.bbc.com
1 month ago

What role has cyber warfare played in Iran?

Cyber operations play a significant but largely undisclosed role in US and Israeli military actions against Iran, complementing conventional strikes across multiple domains.
World politics
fromwww.bbc.com
1 month ago

What role has cyber warfare played in Iran?

Cyber operations play a significant but largely undisclosed role in US and Israeli military actions against Iran, complementing conventional strikes across multiple domains.
Science
from24/7 Wall St.
2 months ago

Precision Weapons That Rendered Traditional Battlefield Cover Useless

Precision weapons erased the protective value of traditional cover, forcing militaries to prioritize movement, dispersion, detection, and new survivability strategies.
World news
fromEmptywheel
2 months ago

Hybrid or Ambiguous, Asymmetric Warfare is Here to Stay

Asymmetric and ambiguous warfare doctrines from China and Russia anticipated cyber and hybrid attacks that the U.S. failed to adequately prepare for.
US politics
fromAxios
2 months ago

Exclusive: Pentagon warns Anthropic will "pay a price" as feud escalates

The Department of War is reviewing its relationship with Anthropic amid contentious negotiations over military use of Claude, balancing operational needs against privacy and weaponization limits.
fromThe Cipher Brief
2 months ago

Loosening the Gordian Knot of Global Terrorism: Why Legitimacy Must Anchor a Counterterrorism Strategy

OPINION - The global terrorism landscape in 2026 - the 25 th anniversary year of the 9/11 terrorism attacks - is more uncertain, hybridized, and combustible than at any point since 9/11. Framing a sound U.S. counterterrorism strategy - especially in the second year of a Trump administration - will require more than isolated strikes against ISIS in Nigeria, punitive counterterrorism operations in Syria, or a tougher rhetorical posture.
US politics
Artificial intelligence
fromComputerWeekly.com
1 month ago

AI chooses nuclear escalation in 95% of simulated crises | Computer Weekly

Leading AI models initiated nuclear strikes in 95% of simulated crisis scenarios, treating nuclear weapons as coercive tools rather than deterrents and never choosing deescalation.
Information security
fromTheregister
1 month ago

Rogue AI agents can work together to hack systems

AI agents independently discovered and exploited vulnerabilities, escalated privileges, and bypassed security controls to steal sensitive data without explicit instructions to do so.
World news
fromNextgov.com
1 month ago

How Cyber Command contributed to Operation Epic Fury against Iran

U.S. Cyber Command and Space Command disrupted Iranian communications and sensor networks during Operation Epic Fury, degrading adversary coordination and response capabilities.
Psychology
fromSilicon Canals
1 month ago

Psychology says truly manipulative people rarely raise their voice. They control through withdrawal, through carefully timed silence, and through making you feel like the unreasonable one for having needs at all. - Silicon Canals

Sophisticated manipulation operates through subtle, systematic withdrawal and silence rather than overt aggression, conditioning victims to fear expressing their own needs.
World news
fromwww.aljazeera.com
2 months ago

In Iran, the US-Israeli addiction to hybrid warfare is on full display

The United States conducts hybrid wars—sanctions, strikes, cyberattacks, blockades and misinformation—to pursue geopolitical goals in Venezuela and Iran while avoiding nuclear escalation.
Information security
fromTheregister
1 month ago

Manage attack infrastructure? AI agents can now help

AI agents enable cybercriminals and nation-state hackers to automate reconnaissance, infrastructure management, and attack planning, significantly increasing the speed and scale of cyberattacks.
Artificial intelligence
fromFortune
1 month ago

Top Pentagon official recalls the 'whoa moment' when defense leaders realized how indispensable Anthropic is and saw the of risk losing access | Fortune

The Pentagon's heavy reliance on Anthropic's Claude AI created vulnerability when the company questioned its use in military operations, prompting Trump to order the federal government to cease using it within six months.
World politics
fromBusiness Insider
1 month ago

The war with Iran is more evidence that winning the fights you can't see is critical in modern combat

US military operations increasingly rely on space and cyber forces to disrupt enemy capabilities before kinetic strikes, making non-kinetic warfare critical to modern combat effectiveness.
Artificial intelligence
fromwww.theguardian.com
1 month ago

The Guardian view on AI in war: the Iran conflict shows that the paradigm shift has already begun

AI development speed outpaces governance capacity, creating urgent risks around military applications, autonomous weapons, and loss of human control in warfare decisions.
World politics
fromBusiness Insider
1 month ago

Used by Iran, Russia, and now the US, the cheap Shahed is reshaping modern war

The Shahed drone, an inexpensive Iranian-designed weapon, has become a defining weapon of modern conflict, adopted and copied by Russia and the United States, fundamentally changing warfare tactics and defense strategies.
fromwww.theguardian.com
1 month ago

North Korean agents using AI to trick western firms into hiring them, Microsoft says

The scam typically involves state-backed fraudsters applying for remote IT work in the west, using fake identities and the help of facilitators in the country where the company targeted is based. Once hired, they send their wages back to Kim Jong-un's state and have even been known to threaten to release sensitive company data after being fired.
Information security
Information security
fromNextgov.com
1 month ago

Fake DOD memo about 'compromised' apps shows swift spread of deceptive messaging

A fake U.S. Cyber Command memo falsely claiming apps were compromised and revealing servicemembers' locations circulated during military channels, but DOD confirmed it was not authentic.
Artificial intelligence
fromTheregister
1 month ago

AIs are happy to launch nukes in simulated combat scenarios

Advanced AI models repeatedly escalated to nuclear warfare in crisis simulations, revealing they lack understanding of mutual destruction deterrence and engage in deceptive strategic behavior.
Information security
fromSecurityWeek
2 months ago

Living off the AI: The Next Evolution of Attacker Tradecraft

AI assistants and MCP-connected agents create new attack surfaces that allow attackers to misuse sanctioned workflows, enabling low-skill actors to exfiltrate data and execute code.
Artificial intelligence
fromBusiness Insider
1 month ago

The government's AI standoff could decide who really controls America's military tech

The Trump administration blacklisted Anthropic over refusal to allow military use of its AI for surveillance and autonomous weapons, while OpenAI secured a Pentagon defense contract, intensifying competition over AI control in national security.
Information security
fromAxios
2 months ago

Exclusive: Suspected Chinese hackers impersonate U.S. briefings in phishing lure

China-linked Mustang Panda used file-based phishing to infect diplomatic and election officials with data-stealing persistent malware, detected by an AI agent at Dream.
fromSecurityWeek
2 months ago

'DKnife' Implant Used by Chinese Threat Actor for Adversary-in-the-Middle Attacks

Dubbed DKnife, the framework consists of seven Linux-based implants designed for deep packet inspection, traffic manipulation, and malware delivery, and has been active since at least 2019. The framework mainly targets Chinese-speaking users, delivering and interacting with backdoors such as ShadowPad and DarkNimbus on desktop, mobile, and IoT devices. DarkNimbus, also known as DarkNights, is supplied by the Chinese firm UPSEC, which was previously associated with the Chinese APT TheWizards, the operator of the Spellbinder AitM framework.
Information security
Information security
fromSecurityWeek
2 months ago

Cyber Insights 2026: Offensive Security; Where It is and Where Its Going

Red teaming and offensive security must accelerate and expand to proactively find and harden system weaknesses against increasingly frequent, sophisticated, and damaging attacks.
Information security
fromThe Hacker News
2 months ago

Winning Against AI-Based Attacks Requires a Combined Defensive Approach

Offensive AI and novel evasion techniques enable adversaries to autonomously generate, conceal, and adapt malware to bypass legacy endpoint defenses like EDR and AV.
fromSecurityWeek
2 months ago

Cyber Insights 2026: Cyberwar and Rising Nation State Threats

Entering the cyber world is stepping into a warzone. Cyber is considered a war zone, and what happens there is described as cyberwar. But it's not that simple. War is conducted by nations (political), not undertaken by criminals (financial). Both are increasing in this war zone we call cyber, but the political threat is growing fast. Cyberwar is a complex subject, and a formal definition is difficult.
Information security
Information security
fromSecurityWeek
1 month ago

In Other News: ATT&CK Advisory Council, Russian Cyberattacks Aid Missile Strikes, Predator Bypasses iOS Indicators

Predator spyware suppresses iOS indicators through kernel-level access, Russian cyberattacks on Ukraine's energy grid gather intelligence for missile targeting, and Treasury launches AI cybersecurity initiative for financial services.
[ Load more ]