#stealth-strategy

[ follow ]
Information security
fromSecuritymagazine
6 hours ago

Beyond the Bodyguard: Why Executive Protection Requires a New Playbook

The executive protection model must evolve from a reactive approach to a comprehensive security infrastructure due to increased accessibility of personal information.
Social media marketing
fromAxios
12 hours ago

The first AI-era war is a "slopaganda" battle to control memes

AI-generated content is rapidly spreading propaganda, making it easier for influencers to adopt conspiracy theories.
#drone-warfare
Roam Research
fromwww.businessinsider.com
1 day ago

The US Army surged its largest counter-drone training deployment to the Middle East during the Iran war

The US Army has launched its largest counter-drone training mission in the Middle East amid the Iran war, utilizing the Merops system.
fromThe Cipher Brief
4 days ago

Why Australia Needs a National Spy Museum

Many of the foundations that have underpinned Australia's security, prosperity and democracy are being tested: social cohesion is eroding, trust in institutions is declining, intolerance is growing, even truth itself is being undermined by conspiracy, mis- and disinformation.
World politics
fromwww.mediaite.com
4 days ago

Weird Obsession With Death': Current and Former Defense Officials Sound the Alarm on Hegseth

Retired Army Special Forces officer Mike Nelson criticized Hegseth's rhetoric, stating, 'That's a necessary end to achieve goals through military force - you have to kill people to achieve them. That's not the end. It's a weird obsession with death for the sake of it.'
Right-wing politics
US news
fromSecuritymagazine
5 days ago

Top Secret Clearance Holder Charged With Leaking Classified National Defense Information

Courtney Williams was arrested for allegedly sharing classified national defense information with unauthorized individuals, including a journalist, from 2022 to 2025.
Apple
fromTheregister
5 days ago

Security reserchers tricked Apple Intelligence into cursing

Apple Intelligence can be hijacked through prompt injection, exposing millions of users to risk, but a fix was implemented in iOS 26.4 and macOS 26.4.
UK news
fromwww.aljazeera.com
5 days ago

UK says three Russian submarines tracked during covert' operation

British Defence Minister John Healey confirmed no damage to undersea infrastructure by Russian vessels after a month-long operation tracking submarines in UK waters.
Privacy professionals
fromWIRED
6 days ago

Men Are Buying Hacking Tools to Use Against Their Wives and Friends

Telegram groups facilitate the sale of hacking and surveillance services, promoting abusive content targeting women and girls.
#cia
#cybersecurity
fromSilicon Canals
6 days ago
Information security

How Russia's GRU turned $50 routers into a global intelligence platform spanning 120 countries - Silicon Canals

Information security
fromThe Hacker News
6 days ago

APT28 Deploys PRISMEX Malware in Campaign Targeting Ukraine and NATO Allies

A Russian threat actor is conducting a spear-phishing campaign targeting Ukraine using a new malware suite called PRISMEX, exploiting zero-day vulnerabilities.
Information security
fromSilicon Canals
1 week ago

Iranian hackers used Stryker's own security tools against it - and U.S. agencies say it's just the beginning - Silicon Canals

Iran-backed hackers are escalating cyberattacks against U.S. critical infrastructure, targeting water utilities and energy systems to cause operational disruption.
Information security
fromThe Hacker News
1 day ago

Weekly Recap: Fiber Optic Spying, Windows Rootkit, AI Vulnerability Hunting and More

A critical zero-day vulnerability in Adobe Acrobat Reader is actively exploited, alongside state-sponsored cyber threats targeting U.S. infrastructure.
Information security
fromNextgov.com
4 days ago

US push to counter hackers draws industry deeper into offensive cyber debate

The U.S. government seeks private sector involvement in cyber defense, but clarity on offensive roles remains uncertain.
Information security
fromSilicon Canals
6 days ago

How Russia's GRU turned $50 routers into a global intelligence platform spanning 120 countries - Silicon Canals

Russia's GRU hijacked consumer routers to create a global intelligence platform, compromising 18,000 devices for surveillance and credential harvesting.
Information security
fromThe Hacker News
6 days ago

APT28 Deploys PRISMEX Malware in Campaign Targeting Ukraine and NATO Allies

A Russian threat actor is conducting a spear-phishing campaign targeting Ukraine using a new malware suite called PRISMEX, exploiting zero-day vulnerabilities.
Information security
fromSilicon Canals
1 week ago

Iranian hackers used Stryker's own security tools against it - and U.S. agencies say it's just the beginning - Silicon Canals

Iran-backed hackers are escalating cyberattacks against U.S. critical infrastructure, targeting water utilities and energy systems to cause operational disruption.
#us-military
US news
fromNextgov.com
6 days ago

As aircraft losses mount, Pentagon wants a software fix to see through the fog of war

U.S. planes in the Middle East lack a common operating picture, leading to communication errors and aircraft losses.
World news
fromFortune
1 week ago

CIA deception campaign in Iran helped the spy agency uncover the location of the downed F-15 airman, who was hiding in a mountain crevice | Fortune

The U.S. successfully rescued two aviators from Iran after their fighter jet was shot down, employing a complex extraction strategy.
World news
fromThe Walrus
1 week ago

A Daring US Rescue in Iran Highlights a War Going Sideways | The Walrus

The successful rescue of a downed US airman from Iran was crucial for military reputation and political standing amid an ongoing war.
US news
fromNextgov.com
6 days ago

As aircraft losses mount, Pentagon wants a software fix to see through the fog of war

U.S. planes in the Middle East lack a common operating picture, leading to communication errors and aircraft losses.
World news
fromFortune
1 week ago

CIA deception campaign in Iran helped the spy agency uncover the location of the downed F-15 airman, who was hiding in a mountain crevice | Fortune

The U.S. successfully rescued two aviators from Iran after their fighter jet was shot down, employing a complex extraction strategy.
World news
fromThe Walrus
1 week ago

A Daring US Rescue in Iran Highlights a War Going Sideways | The Walrus

The successful rescue of a downed US airman from Iran was crucial for military reputation and political standing amid an ongoing war.
Artificial intelligence
fromNextgov.com
1 week ago

Old-school spycraft could make a comeback as AI undermines trust

AI may enhance intelligence gathering but also revive traditional espionage methods due to reliability issues with digital communications.
fromThe Cipher Brief
5 days ago

Drones Are Changing Warfare And America Isn't Ready

The U.S. has discovered that air superiority and missile defense systems designed to counter tens/hundreds of aircraft and missiles is insufficient against asymmetric attacks of thousands of drones.
Russo-Ukrainian War
US politics
fromSilicon Canals
1 week ago

ICE confirms it deployed Paragon spyware inside the United States for drug trafficking cases - Silicon Canals

ICE is using commercial spyware domestically, raising constitutional concerns about warrantless surveillance and lack of oversight.
Psychology
fromwww.theguardian.com
2 weeks ago

They feel true': political deepfakes are growing in influence even if people know they aren't real

Online content creators are fabricating people and images for propaganda and profit, blurring the lines between reality and fiction.
#russian-intelligence
Python
fromAntocuni
3 weeks ago

Inside SPy, part 2: Language semantics

SPy aims to enhance Python's performance while integrating static typing, balancing between an interpreter and a compiler.
Fashion & style
fromWIRED
2 weeks ago

How American Camouflage Conquered the World

MultiCam, designed by Brooklyn creatives, has become a widely used camouflage pattern across various sectors, from military to civilian apparel.
fromenglish.elpais.com
3 weeks ago

Security forces arrest two suspected Russian spies in Germany and Spain

The German Federal Prosecutor's Office ordered the arrest of two individuals accused of spying on a businessman supplying drones to Ukraine for military use.
Germany news
Relationships
fromPsychology Today
3 weeks ago

5 Manipulation Tactics You Might Not See Until It's Too Late

Gaslighting, guilt-tripping, moving the goalposts, and triangulation are manipulative tactics that undermine reality and self-worth in relationships.
World news
fromThe Washington Post
1 week ago

Chinese firms market Iran war intelligence 'exposing' U.S. forces

Chinese firms are leveraging AI and open-source data to track U.S. military movements, posing potential security risks amid the Iran conflict.
fromwww.theguardian.com
3 weeks ago

Iranian among two charged over alleged attempt to enter UK nuclear submarine base

A 34-year-old Iranian man and a 31-year-old Romanian woman have been arrested and charged in connection with the incident at HM Naval Base Clyde, known as Faslane.
UK news
History
from24/7 Wall St.
1 month ago

25 Weapons That Changed Warfare Over the Last Century

Technological breakthroughs over the last century transformed warfare by introducing tanks, missiles, stealth aircraft, and precision-guided weapons that forced armies to continuously adapt tactics and reshape military doctrine globally.
Artificial intelligence
fromEngadget
3 weeks ago

The Defense Department reportedly plans to train AI models on classified military data

The Pentagon plans to train AI models on classified information in secure facilities for exclusive military use to enhance warfighting capabilities.
Arts
fromFast Company
1 month ago

How camouflage became 'the original deception'

The International Spy Museum's camouflage exhibition explores deception techniques across nature and human applications, from animal coloration to military uniforms and espionage tactics.
Information security
fromTechzine Global
1 week ago

North Korea behind social engineering attack on Axios project

Attackers compromised the Axios maintainer's account through social engineering, publishing malicious versions that installed a Remote Access Trojan on victims' systems.
Privacy professionals
fromenglish.elpais.com
1 month ago

How the CIA used a former Spanish soldier to keep tabs on Julian Assange

A Spanish security company owner conducted illegal surveillance of Julian Assange at Ecuador's London embassy on behalf of the CIA, placing hidden microphones and monitoring his communications.
Privacy technologies
fromInfoWorld
1 month ago

What I learned as an undercover agent on Moltbook

OpenClaw AI agents on Moltbook social network pose severe cybersecurity risks through unauthorized access to sensitive user data and financial systems.
World politics
fromwww.bbc.com
1 month ago

What role has cyber warfare played in Iran?

Cyber operations play a significant but largely undisclosed role in US and Israeli military actions against Iran, complementing conventional strikes across multiple domains.
#iran-nuclear-program
fromAxios
1 month ago
World politics

U.S. weighs sending special forces to seize Iran's nuclear stockpile

fromAxios
1 month ago
World politics

U.S. weighs sending special forces to seize Iran's nuclear stockpile

Russo-Ukrainian War
fromBusiness Insider
1 month ago

US Marines are on the hunt for a cloak they can wear to hide themselves from thermal-imaging sensors

The Marine Corps is developing a multispectral camouflage overgarment to shield Marines from thermal-imaging detection used by drones and surveillance systems on modern battlefields.
World politics
fromThe Atlantic
1 month ago

An Air-Campaign Primer

Air campaigns offer unique advantages in concentration, speed, and flexibility, but differ fundamentally from ground operations in their goals, strengths, and inherent limitations.
fromwww.scientificamerican.com
1 month ago

How to win The Traitors, according to science

We watch people lying, and we know they're lying. And also, you watch people dealing with lying not very well and not enjoying it. The lying, backstabbing and manipulation the game inspires does indeed make for delightful TV viewing.
Television
from24/7 Wall St.
2 months ago

How Precision Sniper Technology Reduced the Need for Massed Infantry

Infantry once relied on numbers to solve uncertainty. When soldiers could not see or hit targets precisely, the answer was more troops and more fire. Sniper technologies quietly overturned that logic. By extending range, improving accuracy, and increasing awareness, they allowed small teams to dominate space once controlled only by massed formations. Precision replaced presence, and patience became a battlefield advantage. Here, 24/7 Wall St. is taking a look at the sniper technologies that totally changed the game.
Science
Information security
fromSecurityWeek
4 weeks ago

Security Firm Executive Targeted in Sophisticated Phishing Attack

A C-level executive at Outpost24 was targeted by a sophisticated phishing attack using the Kratos phishing-as-a-service kit that exploited legitimate services like Cisco and Nylas to bypass security defenses.
#navy-seals
Canada news
fromFuturism
2 months ago

Canadian Military Exploring Taliban-Like Insurgent Tactics to Repel American Invasion

Canada is pivoting away from the United States by forming a strategic partnership with China and drafting military plans to repel a potential US invasion.
fromInfoWorld
2 months ago

Stop treating force multiplication as a side gig. Make it intentional

Lead without authority. You may not have direct reports, yet you shape architecture, quality and the roadmap. Your leverage comes from artifacts, reviews and clear standards, not from title.I started by publishing a lightweight architecture template and a rollout checklist that the team could copy. That reduced ambiguity during design and cut review cycles by nearly 30 percent
DevOps
US news
fromwww.theguardian.com
1 month ago

The Russian honeytrap: alleged spy for Moscow faces five years in US prison

Nomma Zarubina, an FSB-recruited Russian intelligence operative, pleaded guilty to lying to the FBI about her contacts with Russian intelligence while posing as a legitimate activist to infiltrate American political and academic circles.
fromThe New Yorker
2 months ago

Russia Is Swarming Europe with Young Agents

Russian military intelligence is recruiting young people online to carry out arson and other acts of sabotage across Europe. In this week's issue, Joshua Yaffa reports on the Kremlin's secret campaign to undermine the West's support for Ukraine-and breaks down how "single-use agents" are being deployed across the Continent. Some of their missions are small-putting up posters, or picking up a package-while others involve physical attacks, for example setting off explosives and starting fires.
Business
fromWashingtonian - The website that Washington lives by.
2 months ago

The Spy Museum's New Exhibit Explores the Hidden World of Camouflage - Washingtonian

The International Spy Museum will unveil its newest special exhibit, " Camouflage: Designed to Deceive," on March 1. The museum has previously featured artifacts that used elements of camouflage, like the Aston Martin V12 Vanquish with "adaptive camouflage" that appeared in the 2024 exhibit "Bond in Motion." For the first time, however, the Spy Museum will dedicate an all-new exhibit to exploring the history of camouflage, in an installation that will be on display for the next three years.
History
World politics
fromBusiness Insider
1 month ago

The war with Iran is more evidence that winning the fights you can't see is critical in modern combat

US military operations increasingly rely on space and cyber forces to disrupt enemy capabilities before kinetic strikes, making non-kinetic warfare critical to modern combat effectiveness.
Science
from24/7 Wall St.
2 months ago

Precision Weapons That Rendered Traditional Battlefield Cover Useless

Precision weapons erased the protective value of traditional cover, forcing militaries to prioritize movement, dispersion, detection, and new survivability strategies.
US politics
fromMail Online
1 month ago

CIA memo reveals plot to turn citizens into political assassins

Project Artichoke was a classified CIA mind control program from 1951-1956 that attempted to create unwitting assassins through psychological manipulation and drug administration.
fromSecuritymagazine
2 months ago

Shadow AI: The Invisible Insider Threat

Shadow AI is the unsanctioned use of artificial intelligence tools outside of an organization's governance framework. In the healthcare field, clinicians and staff are increasingly using unvetted AI tools to improve efficiency, from transcription to summarization. Most of this activity is well-intentioned. But when AI adoption outpaces governance, sensitive data can quietly leave organizational control. Blocking AI outright isn't realistic. The more effective approach is to make safe, governed AI easier to use than unsafe alternatives.
Privacy professionals
Information security
fromThe Cipher Brief
1 month ago

The Drone War's Real Problem Isn't Technology - It's Speed

Defense acquisition reforms implement recommended changes but fail to address the fundamental cycle-time gap between rapidly evolving adversary capabilities and the military's ability to deploy countermeasures.
fromNextgov.com
2 months ago

Now accepting applications - for classified intel

Over the past year, waves of federal layoffs have left thousands of government employees and contractor clients suddenly out of work. For foreign intelligence services, that disruption has opened new opportunities. With more former U.S. officials seeking employment or freelance work - often in specialized national security fields - adversaries, namely China, have stepped in, posing as consulting firms, research groups and recruiters.
US news
Information security
fromTheregister
1 month ago

Manage attack infrastructure? AI agents can now help

AI agents enable cybercriminals and nation-state hackers to automate reconnaissance, infrastructure management, and attack planning, significantly increasing the speed and scale of cyberattacks.
fromThe Cipher Brief
2 months ago

The Kremlin Files: Russian Double Agents and Operational Games

A double agent, by contrast, is an intelligence asset who is knowingly and deliberately directed by one service to engage another in espionage. The controlling service uses that agent to feed information (called feed material) -true, false, or mixed-to the adversary. They do so to simultaneously study the adversary's tradecraft, collection priorities, and decision-making. In the Russian system, double agents also serve a bureaucratic function: they generate statistics, "success stories," and operational narratives that demonstrate effectiveness to political overseers and ultimately to Putin himself.
World news
US politics
fromEmptywheel
2 months ago

Drone War Secrecy and Kill or Capture

The NDAA and Obama-era drone program emphasize secrecy, legal resistance to declassification, and reliance on presidential authority for targeted killings.
fromwww.theguardian.com
1 month ago

North Korean agents using AI to trick western firms into hiring them, Microsoft says

The scam typically involves state-backed fraudsters applying for remote IT work in the west, using fake identities and the help of facilitators in the country where the company targeted is based. Once hired, they send their wages back to Kim Jong-un's state and have even been known to threaten to release sensitive company data after being fired.
Information security
US politics
fromEmptywheel
2 months ago

Massive Obama Administration Leaks on Covert CIA Program Training Syrian Rebels

Numerous anonymous U.S. officials disclosed detailed information about a covert CIA program to train Syrian rebels while the CIA declined to comment.
World news
fromEmptywheel
2 months ago

Hybrid or Ambiguous, Asymmetric Warfare is Here to Stay

Asymmetric and ambiguous warfare doctrines from China and Russia anticipated cyber and hybrid attacks that the U.S. failed to adequately prepare for.
US politics
fromFortune
1 month ago

CIA's social media guide to evading Iranian internet restrictions racks up millions of views as Trump considers military action | Fortune

The CIA publicly recruited Iranian informants via social media in Farsi during escalating U.S.-Iran tensions and nuclear negotiations.
US politics
fromThe Cipher Brief
2 months ago

The Country's First 'Cognitive Advantage' Chief: Influence Is the New Battlefield

Integrates information, perception, culture, and behavior operations to provide nonkinetic strategic options and counter adversary cognitive campaigns.
Information security
fromNextgov.com
1 month ago

Intelligence firms watch for uptick in Iran cyber activity after US, Israel strikes

Tehran-linked hackers are escalating digital reconnaissance and preparing potentially disruptive cyber operations following recent U.S. and Israeli strikes on Iran.
US politics
fromThe Cipher Brief
1 month ago

Defending the Homeland: Pentagon Shifts Strategy on Drone Threats

DoD policy empowers commanders to use defensive measures, extend perimeters beyond installation fences, and counter UAS threats after an uncoordinated CBP laser incident.
Information security
fromAxios
2 months ago

Exclusive: Suspected Chinese hackers impersonate U.S. briefings in phishing lure

China-linked Mustang Panda used file-based phishing to infect diplomatic and election officials with data-stealing persistent malware, detected by an AI agent at Dream.
fromZDNET
2 months ago

This new 'sleeperware' doesn't set off alarms or crash your system - it sneaks in and waits

In its annual Red Report, a body of research that analyzes real-world attacker techniques using large-scale attack simulation data, Picus Labs warns cybersecurity professionals that threat actors are rapidly shifting away from ransomware encryption to parasitic "sleeperware" extortion as their means to loot organizations for millions of dollars per attack. Released today and now in its sixth year, the 278-page Red Report gets its name from Picus-organized cybersecurity exercises that take the perspective of the attacker's team, otherwise known as the "red team."
Information security
[ Load more ]