Tag: military
-
Amazon Says Drone Strikes Disrupted Middle East Data Centers
Iranian Cyberespionage Group MuddyWater Goes Dark. Physical effects rather than cyber strikes are triggering Middle Eastern connectivity problems during day four of a sustained U.S. and Israeli bombing campaign against Iran. Iran is responding with drone and missile attacks targeting U.S. military as well as British bases in Bahrain, Cyprus. First seen on govinfosecurity.com Jump…
-
Cyber-Kinetic Warfare Escalates as Iran, US, and Israel Clash Across Military and Digital Fronts
The Middle East has entered a critical tipping point, as tensions between Iran, the United States, and Israel escalated into a complex hybrid conflict that blends traditional military operations with cyber and information warfare. The offensive, identified as Operation Epic Fury by the US and Operation Roaring Lion by Israel, demonstrates how modern hostilities can no longer be understood…
-
As War Continues, Pro-Iranian Actors Launch Barrage of Cyberattacks
Iran and its supporters have taken to cyberspace to retaliate for US-Israeli military action, with an aim to cause economic and physical disruption. First seen on darkreading.com Jump to article: www.darkreading.com/threat-intelligence/war-pro-iranian-actors-cyberattacks
-
Epic Fury Cyber Shock: Iran’s Internet Down, Hacktivists Hit Back
On Feb. 28, 2026, the United States and Israel launched coordinated military operations against Iran, codenamed Operation Epic Fury by the U.S. and Operation Roaring Lion by Israel, opening a new phase where cyber operations are tightly coupled with kinetic strikes. In the hours that followed, Iran initiated a multi”‘vector retaliatory campaign that quickly expanded…
-
Iran Conflict Elevates Cyber Risk for Healthcare
Tags: attack, country, cyber, cyberattack, ddos, healthcare, Internet, iran, military, ransomware, riskExperts Warn of DDoS, Ransomware, Proxy And Other Attacks on Health Sector. The escalating conflict emerging from the U.S. and Israel military strikes this weekend on Iran, which killed the country’s top leadership and crippled its internet connectivity, could erupt into cyberattacks against the healthcare sector by Iranian sympathizers and proxies, experts warn. First seen…
-
Hybrid Middle East Conflict Triggers Surge in Global Cyber Activity
Military strikes in the Middle East escalate cyber ops, raising spillover risks globally for firms First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/middle-east-conflict-surge-global/
-
Pakistan’s Top News Channels Hacked and Hijacked With Anti-Military Messages
Major Pakistani TV channels, including Geo News and ARY News, were hit by a coordinated cyberattack on 1 March 2026. Hackers took control of live satellite feeds to display unauthorised messages. Read more about the breach, the regional impact, and the reported counter-cyber response. First seen on hackread.com Jump to article: hackread.com/pakistan-news-channels-hacked-anti-military-messages/
-
Prayer App Used by Millions Hacked to Broadcast Defection Messages Amid U.S.-Israel Strikes on Iran
A popular Iranian prayer timing application, BadeSaba Calendar, was hacked to deliver anti-government push notifications to millions of users. This cyber incident occurred early Saturday morning, coinciding with joint U.S. and Israeli military strikes on Iran. While the kinetic strikes targeted physical locations, this coordinated cyber operation sought to broadcast messages of defection directly to…
-
OpenAI Will Deploy AI in US Military Classified Networks
Announcement Comes Hours After Trump Blacklists Anthropic. OpenAI said late Friday night it reached an agreement with the U.S. Department of Defense to deploy its large language models onto military classified networks. The announcement came hours after President Donald Trump instructed federal agencies to cease using AI developed by OpenAI rival Anthropic. First seen on…
-
Pentagon Designates Anthropic Supply Chain Risk Over AI Military Dispute
Anthropic on Friday hit back after U.S. Secretary of Defense Pete Hegseth directed the Pentagon to designate the artificial intelligence (AI) upstart as a “supply chain risk.””This action follows months of negotiations that reached an impasse over two exceptions we requested to the lawful use of our AI model, Claude: the mass domestic surveillance of…
-
iPhone and iPad are the first consumer devices cleared for NATO ‘RESTRICTED’ classification
Apple’s iPhone and iPad are now NATO-approved for classified use, listed in the alliance’s Information Assurance Product Catalogue. Apple announced that its iPhone and iPad have received NATO approval to handle classified information. The devices are now officially listed in the NATO Information Assurance Product Catalogue (NIAPC), allowing military personnel to use them securely for…
-
Former Air Force officer arrested for conspiring with hacker to provide flight training to Chinese military
Gerald Eddie Brown, 65, was arrested in Jeffersonville, Indiana on Thursday after spending nearly three years living in China and allegedly providing combat aircraft training to pilots in the Chinese Air Force. First seen on therecord.media Jump to article: therecord.media/former-air-force-officer-arrested-for-working-with-hacker-flight-training-china
-
Is AI Good for Democracy?
Politicians fixate on the global race for technological supremacy between US and China. They debate geopolitical implications of chip exports, latest model releases from each country, and military applications of AI. Someday, they believe, we might see advancements in AI tip the scales in a superpower conflict. But the most important arms race of the…
-
North Korean state hackers seen using Medusa ransomware in attacks on US, Middle East
Tags: attack, country, cybersecurity, hacker, hacking, healthcare, lazarus, middle-east, military, north-korea, ransomwareCybersecurity researchers said they saw Medusa attacks launched by members of Lazarus, a well-known North Korean hacking operation housed within the country’s military, against a company in the Middle East and a healthcare organization in the U.S. First seen on therecord.media Jump to article: therecord.media/north-korean-hackers-using-medusa-ransomware
-
Poland restricts Chinese-made cars at protected military sites
Poland’s military leadership has decided that cars manufactured in the People’s Republic of China will no longer cross the gates of sensitive military bases. The decision … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/02/19/poland-military-chinese-car-ban/
-
Poland bans camera-packing cars made in China from military bases
Dell, however, is welcome to help build a local-language LLM First seen on theregister.com Jump to article: www.theregister.com/2026/02/19/poland_china_car_ban/
-
Poland bans camera-packing cars made in China cars from military bases
Dell, however, is welcome to help build a local-language LLM First seen on theregister.com Jump to article: www.theregister.com/2026/02/19/poland_china_car_ban/
-
Poland bans camera-packing cars made in China cars from military bases
Dell, however, is welcome to help build a local-language LLM First seen on theregister.com Jump to article: www.theregister.com/2026/02/19/poland_china_car_ban/
-
Poland bans Chinese-made cars from entering military sites
The instruction to commanders to keep affected cars outside of secured perimeters comes amid growing concerns over motor vehicle network equipment and supply chains that routinely record location and other data. First seen on therecord.media Jump to article: therecord.media/poland-bans-chinese-made-cars-from-military-sites
-
CISO Julie Chatman offers insights for you to take control of your security leadership role
Tags: access, ai, attack, awareness, breach, business, ciso, control, crowdstrike, cyber, cybersecurity, deep-fake, email, finance, firewall, government, healthcare, infrastructure, law, military, office, phishing, risk, service, skills, supply-chain, technology, threat, training, updateFirst, the hopes-and-dreams budget: What would it take to close all the known gaps and operate proactively?Second, the could-live-with-this budget: What’s realistic and gets you to acceptable risk levels?Third, the I-think-I’m-going-to-resign budget: Because you can see a breach coming and you don’t want your name attached to it.You probably won’t end up at that last…
-
CISO Julie Chatman offers insights for you to take control of your security leadership role
Tags: access, ai, attack, awareness, breach, business, ciso, control, crowdstrike, cyber, cybersecurity, deep-fake, email, finance, firewall, government, healthcare, infrastructure, law, military, office, phishing, risk, service, skills, supply-chain, technology, threat, training, updateFirst, the hopes-and-dreams budget: What would it take to close all the known gaps and operate proactively?Second, the could-live-with-this budget: What’s realistic and gets you to acceptable risk levels?Third, the I-think-I’m-going-to-resign budget: Because you can see a breach coming and you don’t want your name attached to it.You probably won’t end up at that last…
-
CISO Julie Chatman wants to help you take control of your security leadership role
Tags: access, ai, attack, awareness, breach, business, ciso, control, crowdstrike, cyber, cybersecurity, deep-fake, email, finance, firewall, government, healthcare, infrastructure, law, military, office, phishing, risk, service, skills, supply-chain, technology, threat, training, updateFirst, the hopes-and-dreams budget: What would it take to close all the known gaps and operate proactively?Second, the could-live-with-this budget: What’s realistic and gets you to acceptable risk levels?Third, the I-think-I’m-going-to-resign budget: Because you can see a breach coming and you don’t want your name attached to it.You probably won’t end up at that last…
-
Suspected Russian hackers deploy CANFAIL malware against Ukraine
A new alleged Russia-linked APT group targeted Ukrainian defense, government, and energy groups, with CANFAIL malware. Google Threat Intelligence Group identified a previously undocumented threat actor behind attacks on Ukrainian organizations using CANFAIL malware. The group is possibly linked to Russian intelligence services and has targeted defense, military, government, and energy entities at both regional…
-
Google Ties Suspected Russian Actor to CANFAIL Malware Attacks on Ukrainian Orgs
A previously undocumented threat actor has been attributed to attacks targeting Ukrainian organizations with malware known as CANFAIL.Google Threat Intelligence Group (GTIG) described the hack group as possibly affiliated with Russian intelligence services. The threat actor is assessed to have targeted defense, military, government, and energy organizations within the Ukrainian regional and First seen on…
-
NDSS 2025 Density Boosts Everything
Tags: ai, attack, conference, cybersecurity, detection, Internet, malware, military, network, resilience, strategy, trainingSession 12B: Malware Authors, Creators & Presenters: Jianwen Tian (Academy of Military Sciences), Wei Kong (Zhejiang Sci-Tech University), Debin Gao (Singapore Management University), Tong Wang (Academy of Military Sciences), Taotao Gu (Academy of Military Sciences), Kefan Qiu (Beijing Institute of Technology), Zhi Wang (Nankai University), Xiaohui Kuang (Academy of Military Sciences) PAPER Density Boosts Everything:…
-
Hackers Use Signal QR Codes to Spy on Military and Political Leaders
Hackers are using Signal QR codes and fake support scams to spy on military and political leaders, German security agencies warn. First seen on hackread.com Jump to article: hackread.com/hackers-signal-qr-codes-spy-on-military-political-leaders/
-
Behörden warnen vor Hackerangriffen auf Politik und Militär
Tags: access, cyberattack, germany, hacker, infrastructure, military, qr, verfassungsschutz, vulnerabilityCyberkriminelle haben es auf Signal-Konten von deutschen Politikern, Soldaten, Diplomaten und Journalisten abgesehen.Mit gefälschten Chatnachrichten vor allem im Messengerdienst Signal nehmen Hacker zurzeit hochrangige deutsche Politiker, Soldaten, Diplomaten und auch Journalisten ins Visier davor warnen die Bundesämter für Verfassungsschutz und für Sicherheit in der Informationstechnik. Ziel des “wahrscheinlich staatlich gesteuerten” Angriffs sei es, unbemerkt Zugriff…
-
State-Backed Hackers Target Military Officials, Journalists via Signal
A suspected state-sponsored hacking group is actively targeting high-profile individuals across Europe. The Federal Office for the Protection of the Constitution (BfV) and the Federal Office for Information Security (BSI) have identified a coordinated espionage campaign aimed at military officials, diplomats, politicians, and investigative journalists.”‹ Instead, they are using >>social engineering<< to weaponize the legitimate…
-
APT28 Weaponizes Office Flaw to Spy on NATO Military
The post APT28 Weaponizes Office Flaw to Spy on NATO Military appeared first on Daily CyberSecurity. First seen on securityonline.info Jump to article: securityonline.info/apt28-weaponizes-office-flaw-to-spy-on-nato-military/

