IT giant Ingram Micro is experiencing a global outage that is impacting its websites and internal systems, with customers concerned that it may be a cyberattack after the company remains silent on the cause of the issues. Ingram Micro is one of the largest business-to-business technology distributors and service providers in the world, offering hardware
Inside the US Army’s C2 upgrade – what industry can expect
Opinion By Joseph Welch Tuesday, Jun 3, 2025 U.S. Army Soldiers with the 2nd Cavalry Regiment are pictured during exercise Dragoon Ready 2023. (Sgt. Rebecca Call/U.S. Army) Within the Army Transformation Initiative, the Army’s Next Generation Command and Control (NGC2) effort represents a fundamental change in delivering data-driven C2 to our formations. From requirements to resourcing, acquisition
Grafana releases critical security update for Image Renderer plugin
Grafana Labs has addressed four Chromium vulnerabilities in critical security updates for the Grafana Image Renderer plugin and Synthetic Monitoring Agent. Although the issues impact Chromium and were fixed by the open-source project two weeks ago, Grafana received a bug bounty submission from security researcher Alex Chapman proving their exploitability in the Grafana components. Grafana
Setting the scene: Army to test new hub for stockpiling in Australia
Maj. Gen. Jered Helwig, the commanding general of the 8th Theater Sustainment Command, receives a tour of the Joint Theater Distribution Center in Australia on May 22, 2024. (Courtesy of the 8th Theater Sustainment Command) The U.S. Army will test a nascent capability to effectively preposition equipment and supplies forward in the Pacific theater in
NimDoor crypto-theft macOS malware revives itself when killed
North Korean state-backed hackers have been using a new family of macOS malware called NimDoor in a campaign that targets web3 and cryptocurrency organizations. Researchers analyzing the payloads discovered that the attacker relied on unusual techniques and a previously unseen signal-based persistence mechanism. The attack chain, which involves contacting victims via Telegram and luring them into running
Army to lead nuclear microreactor development to power bases
The Army is seeking to develop and field a mobile nuclear reactor to power forward-operating bases. (DOD) Some Army installations could be powered by nuclear microreactors under an executive order recently issued by President Donald Trump. The order, published May 23, calls for deploying advanced nuclear reactor technologies for national security and directs Army Secretary
Qantas discloses cyberattack amid Scattered Spider aviation breaches
Australian airline Qantas disclosed that it detected a cyberattack on Monday after threat actors gained access to a third-party platform containing customer data. Qantas is Australia’s largest airline, operating domestic and international flights across six continents and employing around 24,000 people. In a press release issued Monday night, the airline states that the attack has
Glossary | Cyber.gov.au
A AACA ASD-Approved Cryptographic Algorithm AACP ASD-Approved Cryptographic Protocol ACA Australasian Certification Authority Access control The process of granting or denying requests for access to systems. Can also refer to the process of granting or denying requests for access to facilities. Access Cross Domain Solution A system permitting access to multiple security domains from a
Back to basics: Army revamps flight school after deadly crashes
In the wake of a string of deadly military aviation accidents over the past several years, the U.S. Army is launching a major overhaul of how it trains new pilots that focuses on getting back to the basics. The overhaul includes rethinking the type of aircraft used for training, along with a likely shift to
U.S. warns of Iranian cyber threats on critical infrastructure
U.S. cyber agencies, the FBI, and NSA issued an urgent warning today about potential cyberattacks from Iranian-affiliated hackers targeting U.S. critical infrastructure. CISA says there are no indications of an ongoing campaign but urges critical infrastructure organizations and other potential targets to monitor their defense due to the current unrest in the Middle East and cyber