Tag: warfare
-
AI-Based Threats Usher in ‘Dark Period’ for Cyber Defenders
NightDragon CEO Dave DeWalt on Perfect Storm of Risks, Attackers and Hybrid Warfare. Cybersecurity has entered a dark phase as AI-powered attackers outpace defense teams. Dave DeWalt of NightDragon outlines how hybrid warfare, critical infrastructure risks and rapid innovation are reshaping global security priorities. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/ai-based-threats-usher-in-dark-period-for-cyber-defenders-a-31184
-
AI-Based Threats Usher in ‘Dark Period’ for Cyber Defenders
NightDragon CEO Dave DeWalt on Perfect Storm of Risks, Attackers and Hybrid Warfare. Cybersecurity has entered a dark phase as AI-powered attackers outpace defense teams. Dave DeWalt of NightDragon outlines how hybrid warfare, critical infrastructure risks and rapid innovation are reshaping global security priorities. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/ai-based-threats-usher-in-dark-period-for-cyber-defenders-a-31184
-
AI-Based Threats Usher in ‘Dark Period’ for Cyber Defenders
NightDragon CEO Dave DeWalt on Perfect Storm of Risks, Attackers and Hybrid Warfare. Cybersecurity has entered a dark phase as AI-powered attackers outpace defense teams. Dave DeWalt of NightDragon outlines how hybrid warfare, critical infrastructure risks and rapid innovation are reshaping global security priorities. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/ai-based-threats-usher-in-dark-period-for-cyber-defenders-a-31184
-
Former Ukrainian Foreign Minister Dmytro Kuleba to Address the New Cyber Frontline at Infosecurity Europe
Geopolitics and cyber warfare take center stage at Infosecurity Europe as Dmytro Kuleba discusses Ukraine’s hybrid war experience First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/foreign-minister-kuleba/
-
Iran Cyber Ops Merge With PsyOps and EW Amid Escalating Conflict
A new phase of the Iran war is unfolding in which ballistic missiles, drones, electronic warfare, and cyber operations are being deployed in parallel, with cyber activity increasingly tied to kinetic targeting, damage assessment, and strategic messaging. Iran’s leadership has framed retaliation as a duty following the death of Ayatollah Ali Khamenei, while President Donald…
-
Iran War: Kinetic, Cyber, Electronic and Psychological Warfare Convergence
First seen on resecurity.com Jump to article: www.resecurity.com/blog/article/iran-war-kinetic-cyber-electronic-and-psychological-warfare-convergence
-
Surge in Nation State Attacks on UK Firms Amid Cyber Warfare Fears
Armis reveals that “mutually assured disruption” is no longer preventing state-backed attacks First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/nation-state-attacks-uk-firms/
-
ISMG Editors: Iran Conflict Expands Into Cyber Warfare
Also: the Pentagon-Anthropic AI Legal Showdown, the New Reality of Document Fraud. In this week’s panel, four ISMG editors discuss the cyber activity tied to the U.S.-Israel-Iran conflict, the Pentagon’s standoff with AI firm Anthropic and a new report that reveals how document fraud reflects deeper weaknesses in verification systems. First seen on govinfosecurity.com Jump…
-
The State of Cyber Warfare in 2026: Nation-State Attacks, AI Weapons, and the New Digital Battlefield
Cyber operations no longer occur only during wartime. Digital activity now runs continuously alongside diplomacy, sanctions, and military tensions. This has become particularly visible amid escalating hostilities involving Iran, Israel, and the United States, where intelligence agencies have warned of possible retaliatory cyber activity linked to the conflict. In this environment, cyber warfare 2026 is highlighted by persistent nation-state cyberattacks, covert intrusion…
-
CSO Awards 2026 celebrates world-class security strategies
4Wall Entertainment HMSA Aaron’s LLC Horizon BCBSNJ Accenture K&N Engineering Inc Adobe LyondellBasell Industries Aflac McDonald’s Ally Financial Medtronic PLC AmeriHealth Caritas Midcontinent Independent System Operator (MISO) Avangrid Moelis & Company Baptist Memorial Health Care Corporation Monster Energy California Housing Finance Agency MultiCare Health System Carvana National Cybersecurity Alliance Casey’s New Albany Floyd County Schools…
-
GPS Attacks Near Iran Are Wreaking Havoc on Delivery and Mapping Apps
Delivery apps are glitching and navigation routes are changing abruptly thanks to electronic warfare disrupting the satellite signals that power everything from missiles to your ride home. First seen on wired.com Jump to article: www.wired.com/story/gps-attacks-near-iran-are-wreaking-havoc-on-delivery-and-mapping-apps/
-
Anthropic Sues After US Government Cuts Off AI Contracts
Company Says Limits Triggered Federal Retaliation, Which Violate Free Speech Rights. AI developer Anthropic sued the U.S. government alleging retaliation after it refused to allow its Claude models to support lethal autonomous warfare or mass surveillance of Americans. The suit claims federal agencies unlawfully banned the firm’s technology and labeled it a national security risk.…
-
Securing Critical Infrastructure in a Time of War
A deep dive into Iranian cyber warfare and actionable defenses for network operators. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/03/securing-critical-infrastructure-in-a-time-of-war/
-
5 Actions Critical for Cybersecurity Leadership During International Conflicts
Tags: attack, backup, business, cloud, corporate, cyber, cybersecurity, data, exploit, government, incident response, infrastructure, international, iran, middle-east, military, network, resilience, risk, risk-assessment, russia, saas, service, supply-chain, technology, threat, ukraine, update, vulnerability, warfareThe recent military attacks involving Iran in the Middle East are a stark reminder that cybersecurity leadership must continually incorporate geopolitical risk into their enterprise cyber risk posture and preparedness. Every crisis that elevates to military engagements between cyber-active participants, changes the risk landscape of businesses, for people, operations, and data. This includes the…
-
Iran’s Cyber-Kinetic War Doctrine Takes Shape
Iran has been hacking IP cameras to plan missile strikes against its enemies, and mounting other attacks on physical assets, showing how cyber and kinetic warfare are fast becoming one in the same. First seen on darkreading.com Jump to article: www.darkreading.com/threat-intelligence/iran-cyber-kinetic-war-doctrine
-
Interplay between Iranian Targeting of IP Cameras and Physical Warfare in the Middle East
ey Findings Introduction As highlighted in theCyber Security Report 2026, cyber operations have increasingly become an additional tool in interstate conflicts, used both to support military operations and to enable ongoing battle damage assessment (BDA). During the 12-day conflict between Israel and Iran in June 2025, the compromise of cameras was likely used to support…
-
Cyberwarriors elevated to big leagues in US war with Iran
No more hiding in the server closet: Cyber ops mentioned alongside kinetic warfare as critical to conflict First seen on theregister.com Jump to article: www.theregister.com/2026/03/03/cyberwarriors_us_iran_war/
-
Cyber-Kinetic Warfare Escalates as Iran, US, and Israel Clash Across Military and Digital Fronts
The Middle East has entered a critical tipping point, as tensions between Iran, the United States, and Israel escalated into a complex hybrid conflict that blends traditional military operations with cyber and information warfare. The offensive, identified as Operation Epic Fury by the US and Operation Roaring Lion by Israel, demonstrates how modern hostilities can no longer be understood…
-
Russia Set to Escalate to ‘New Generation Warfare’ Against NATO
The post Russia Set to Escalate to ‘New Generation Warfare’ Against NATO appeared first on Daily CyberSecurity. First seen on securityonline.info Jump to article: securityonline.info/russia-set-to-escalate-to-new-generation-warfare-against-nato/
-
The Law of Cyberwar is Pretty Discombobulated
This article explores the complexities of cyberwarfare, emphasizing the need to reconsider how we categorize cyber operations within the framework of the Law of Armed Conflict (LOAC). It discusses the challenges posed by AI in transforming traditional warfare notions and highlights the potential risks associated with the misuse of emerging technologies in conflicts. First seen…
-
When responsible disclosure becomes unpaid labor
Tags: ai, bug-bounty, ciso, cloud, compliance, control, credentials, cve, cvss, cybersecurity, data, email, exploit, finance, flaw, governance, healthcare, incident response, infrastructure, jobs, open-source, ransom, risk, security-incident, service, software, threat, tool, update, vulnerability, warfaresupposed to function and how it increasingly does in practice. Enter the gray zone of ethical disclosure: The result is a growing gray zone between ethical research and adversarial pressure. Based on years of reporting on disclosure disputes, that gray zone tends to emerge through a small set of recurring failure modes.Silent treatment and severity…
-
CISO’s predictions for 2026
Tags: access, ai, attack, authentication, automation, breach, business, ciso, cloud, control, credentials, cryptography, cyber, cyberattack, cybersecurity, data, data-breach, encryption, endpoint, extortion, finance, governance, government, healthcare, identity, infrastructure, malicious, mobile, mssp, network, password, penetration-testing, ransomware, risk, router, saas, soc, strategy, supply-chain, technology, threat, tool, vulnerability, warfareAI agents to reshape the threat landscape: But those same AI technologies are also changing the threat landscape. Toal points to a recent Anthropic report that documented the first large-scale AI-enabled cyberattack as an early warning sign. “I guarantee attackers will be more focused on using AI agents for what they want than a lot…
-
Chinese Hackers Launch Ongoing Attacks on Taiwan’s Critical Infrastructure
China’s state-sponsored cyber operations against Taiwan have intensified dramatically, with threat actors launching an average of 2.63 million intrusion attempts daily targeting critical infrastructure across nine primary sectors, according to a newly released report from Taiwan’s National Security Bureau (NSB). The NSB report documents a concerning pattern of synchronized cyber warfare operations that correlate directly…
-
NDSS 2025 ProbeNot: Protecting Pre-trained Encoders From Malicious Probing
Session 7D: ML Security Authors, Creators & Presenters: Ruyi Ding (Northeastern University), Tong Zhou (Northeastern University), Lili Su (Northeastern University), Aidong Adam Ding (Northeastern University), Xiaolin Xu (Northeastern University), Yunsi Fei (Northeastern University) PAPER Probe-Me-Not: Protecting Pre-Trained Encoders From Malicious Probing Adapting pre-trained deep learning models to customized tasks has become a popular choice for…
-
Finnish Authorities Arrest Two Sailors in Probe Into Undersea Cable Disruption
Finnish authorities have detained a cargo vessel suspected of damaging an undersea telecommunications cable connecting Helsinki to Estonia. The incident has raised fresh concerns about potential hybrid warfare targeting critical infrastructure in the Baltic Sea region. The vessel, named Fitburg, was sailing from St. Petersburg, Russia, to Haifa, Israel, flying the flag of St Vincent…
-
The US Must Stop Underestimating Drone Warfare
Tags: warfareThe future of conflict is cheap, rapidly manufactured, and tough to defend against. First seen on wired.com Jump to article: www.wired.com/story/the-us-must-stop-underestimating-drone-warfare/

