The latest variant of the M88 Hercules has been canceled. Here, 3rd Infantry Division soldiers conduct a movement in an M88A2 Hercules recovery vehicle during Marne Focus 2025 at Fort Stewart, Georgia, on March 5. (Spc. Rebeca Soria/U.S. Army) The U.S. Army is shelving its plans to pursue a new variant of the M88 Hercules
Russian airline Aeroflot grounds dozens of flights after cyberattack
Aeroflot, Russia’s flag carrier, has suffered a cyberattack that resulted in the cancellation of more than 60 flights and severe delays on additional flights. Although official sources from Russia, like the General Prosecutor’s Office, did not attribute the attack to specific threat groups or even origin, responsibility was taken by Ukrainian and Belarusian hacktivist collectives ‘Silent
The U.S. shift towards drone warfare | Defense News Weekly Full Episode 7.26.25
The U.S. shift towards drone warfare | Defense News Weekly Full Episode 7.26.25 The often ponderously slow U.S. defense system tries to adapt to the rapidly advancing world of drone warfare. What are its latest moves to keep up? 6 hours ago
Microsoft: macOS Sploitlight flaw leaks Apple Intelligence data
Attackers could use a recently patched macOS vulnerability to bypass Transparency, Consent, and Control (TCC) security checks and steal sensitive user information, including Apple Intelligence cached data. TCC is a security technology and a privacy framework that blocks apps from accessing private user data by providing macOS control over how their data is accessed and
Updates from inside the VA | Defense News Weekly Full Episode 7.19.25
Updates from inside the VA | Defense News Weekly Full Episode 7.19.25 Defense News Weekly heads to the Veterans Affairs headquarters for updates on topics ranging from staffing cuts to the electronic health records initiative. 9 days ago
Scattered Spider is running a VMware ESXi hacking spree
Scattered Spider hackers have been aggressively targeting virtualized environments by attacking VMware ESXi hypervisors at U.S. companies in the retail, airline, transportation, and insurance sectors. According to the Google Threat Intelligence Group (GITG), the attackers keep employing their usual tactics that do not include vulnerability exploits but rely on perfectly executed social engineering “to bypass even
Airline pilot explains ‘aggressive maneuver’ to avoid B-52 bomber
Airline pilot explains ‘aggressive maneuver’ to avoid B-52 bomber A passenger on a recent flight recorded a pilot’s explanation of an ‘aggressive maneuver’ to avoid an Air Force bomber following a near-collision incident. 5 days ago
Post SMTP plugin flaw exposes 200K WordPress sites to hijacking attacks
More than 200,000 WordPress websites are using a vulnerable version of the Post SMTP plugin that allows hackers to take control of the administrator account. Post SMTP is a popular email delivery plugin for WordPress that counts more than 400,000 active installations. It’s marketed as a replacement of the default ‘wp_mail()’ function that is more
US Army envisions a common launcher to fit allies’ weapons
WIESBADEN, Germany − The U.S. Army is prioritizing a common launcher that could be used across the European alliance from which a wide variety of weapons could be fired, the service’s chief in charge of the European and African theaters, said last week. As part of a newly announced Eastern Flank Deterrence Line, a regional
The role of the cybersecurity PM in incident-driven development
Article written by cybersecurity expert Yuriy Tsibere. Gone are the days when cybersecurity meant stopping annoying viruses like the Love Bug. Today, it’s about battling a massive, financially motivated cybercrime industry. Attacks are smarter, faster, and more damaging—and that changes everything for product teams. For product managers (PMs), this means understanding that attackers are constantly