NATO.COM

Defense & Security Intelligence

2026-01-18 20:09 UTC
Powered by US AI

cybersecurity

105 articles • Page 1 of 3

Pentagon Launches Global Mapping Program for 'Magnetic Navigation' Amid GPS Signal Threats
In response to threats of GPS signal interference, the Pentagon is initiating a global mapping project aimed at developing magnetic navigation as an alternative or back-up system. This strategic move ...
Chinese cyberattacks on Taiwan infrastructure averaged 2.6 million a day in 2025, report says
Taiwan reports experiencing an increasing number of cyberattacks from China, averaging approximately 2.6 million attacks per day in the year 2025. This ongoing issue is considered part of what Taiwan ...
12th blackout at Europe’s largest nuclear plant: Russia deliberately disrupts Zaporizhzhia Nuclear Plant to integrate it into its grid
Russia has carried out multiple attacks on Ukraine's energy infrastructure overnight. Among these incidents was the twelfth blackout suffered by Europe’s largest nuclear power plant, the Zaporizhzhia ...
Russian Official Threatens Zelenskyy Amid Putin Residence Attack Claim
A Russian official has issued a threat towards Ukrainian President Volodymyr Zelenskyy following claims of an attempted attack on President Vladimir Putin's residence in Sochi. The incident and subseq...
Russian Official Threatens Zelenskyy Amid Putin Residence Attack Claim
A Russian official has issued threats against Ukrainian President Volodymyr Zelenskyy after reports circulated that an attack on Russian President Vladimir Putin's residence in Sochi was planned. The ...
Russian Official Threatens Zelenskyy Amid Claims of Attack on Putin's Residence
A senior Russian official issued threats against Ukrainian President Volodymyr Zelenskyy following unconfirmed reports of an attempted attack near Russian President Vladimir Putin's residence. The thr...
Why Chinese Military Quantum Technology is at the Center of Pentagon Attention
The article discusses why China's advancements in quantum technology are receiving significant attention from the Pentagon. It highlights how China's research into quantum computing and communication ...
China and America must get serious about AI risk
The article discusses the potential misuse of advanced artificial intelligence (AI) technologies by China and the United States, including possible cyberattacks on critical infrastructure, creation of...
Air Force cyber resilience in focus
Cyber resilience has become a key mission for the U.S. military as outlined in Breaking Defense's new eBook covering the 2025 Alamo ACE conference. The publication details latest advancements and disc...
Elon Musk's Grok AI to Operate Inside Pentagon Network
Elon Musk's company Grok Artificial Intelligence (AI) has been selected for operation within the U.S. Department of Defense's cybersecurity infrastructure. This collaboration aims to enhance threat de...
Russian Involvement Suspected in Drone Incursion During Zelenskyy's Visit
Irish security sources are claiming that Russia was responsible for a recent drone incursion during President Zelenskyy of Ukraine's visit....
Pentagon Integrates Grok AI Chatbot into Pentagon Network
The Department of Defense has integrated the Grok AI chatbot into the Pentagon network, aiming to enhance communication efficiency and support decision-making processes within the military command str...
Elon Musk's Grok AI to Operate Inside Pentagon Network
NBC4 Washington reported that Elon Musk's artificial intelligence (AI) company, Grok, has secured access to operate within the Pentagon’s network. The integration of private sector technology into mil...
New law bans China-based IT engineers from Pentagon cloud access
US President Donald Trump has signed into law a measure prohibiting individuals based in China or other adversarial countries from accessing the Pentagon’s cloud computing systems as part of the $900 ...
Two Baltic cables hit in days—Russia’s sabotage war ramps up underwater
Latvian authorities have initiated a criminal investigation following the damage of another critical telecom cable near Liepāja. This incident occurred just days after similar sabotage was reported be...
Space cyber compliance: managing requirements for today and tomorrow
Space operators are dealing with an evolving cybersecurity regulatory landscape that lacks international standardization and long-term clarity. With new regimes emerging across multiple jurisdictions,...
Trump Rejects Kremlin Claims: No Ukraine Drone Attack on Putin Residence
US President Trump has denied Russian claims that there was an attack by Ukrainian drones on Russian President Putin's residence. According to the Russian foreign ministry statements, they allege that...
Trump Rejects Claim Ukraine Attacked Putin's Home
U.S. President Donald Trump has dismissed unverified claims that Russia's home address of President Vladimir Putin was attacked from within Ukraine. He expressed doubt about the authenticity and origi...
Sri Lanka probes curriculum error linking 11-year-olds to gay chat site: ‘show your kinky side’
Sri Lanka's Education Ministry has launched an investigation into a criminal case after including a link in the syllabus for 11- and 12-year-olds that directed them to a gay teen chat website. The min...
Russia Shares Evidence With US After Alleged Drone Attack On Putin's Novgorod Residence
Russian officials have shared evidence with the United States regarding an alleged drone attack that targeted President Vladimir Putin’s residence in Novgorod, Russia. The incident raised concerns abo...
Russian Defense Ministry Shares Evidence With USA After Alleged Drone Attack Near Putin's Residence
The Russian Defense Ministry has provided evidence to the United States regarding an alleged drone attack that occurred near President Vladimir Putin’s residence in Novgorod. The nature of the evidenc...
CIA Officially Disputes Putin's Claim of Drone Attack on His Residence
The Central Intelligence Agency (CIA) has officially disputed Russian President Vladimir Putin's claim that he was the target of a drone attack on his residence....
CIA: Ukrainian drones did not target Putin's residence! Prominent NYT: He started wars and now he’s scared of his own villa
According to the CIA, Ukrainian drones did not aim at Vladimir Putin's residence as previously speculated. The New York Times comments on Putin’s aggressive foreign policy actions and speculates on hi...
Over 600,000 Russians Left Without Power as Ukraine Drones Attack Moscow
Ukrainian drone attacks on Moscow have caused widespread power outages affecting more than 600,000 people in Russia's capital....
Russian Official Threatens Zelenskyy Amid Putin Residence Attack Claim
A Russian official has issued a threatening statement towards President Volodymyr Zelenskyy of Ukraine following claims that an attempt was made to attack Russian President Vladimir Putin's residence....
Hacking space: Europe ramps up security of satellites
European space infrastructure faces growing threats from cyberattacks amid intensifying global hybrid warfare strategies. This context highlights the increasing vulnerability of satellite systems and ...
Poliannykh Reveals Unexpected Purpose of Starlink
Pavel Poliannykh revealed that SpaceX's Starlink satellite internet service could potentially be used for military surveillance purposes beyond its advertised civilian use....
Russia Claims Ukraine Attacked Putin's Residence
Russian state media reported that unidentified drones attempted to attack President Vladimir Putin’s residence, presenting these claims as evidence of escalating Ukrainian aggression against Russian t...
Russian Media Claims Ukrainian Attack on Putin's Residence
According to Russian media reports, there are claims that Ukraine initiated an attack targeting President Putin's residence. These allegations have not been independently verified or confirmed by offi...
Russia Claims Ukraine Attacked Putin's Residence
The Russian government has alleged that Ukraine launched an attack on President Putin's residence as part of escalating tensions between the two countries....
2025 in review: tech
The article provides an overview of technological advancements and trends from 2025, focusing on areas such as artificial intelligence, cybersecurity, robotics, space exploration, renewable energy tec...
Artifical intelligence is everywhere: 2025 review
In 2025, artificial intelligence became ubiquitous across military applications. From supporting operations over Ukraine and defending against Chinese cyberattacks to streamlining internal Pentagon pr...
How North Koreans use ‘laptop farms’ in US to land tech jobs abroad
Amazon has blocked over 1,800 North Koreans from joining the company amid concerns about North Korean IT workers earning and laundering funds abroad. The company's Chief Security Officer noted a signi...
CYBERCOM celebrated its 15th anniversary with no commander: 2025 review
In 2025, CYBERCOM reached two significant milestones and was tasked with creating a roadmap for the possible formation of a dedicated cyber force....
North Korea’s record-breaking year for crypto theft
In 2025, North Korea (DPRK) continued its prominence as a leading threat actor in the realm of cryptocurrency theft, according to Chainalysis's analysis. The report highlights four main developments: ...
China’s AI use for cyber espionage shifts cyber focus from detection to trust
The article discusses how security experts must now focus on their organization's trust architecture and identity systems as China increasingly deploys artificial intelligence in cyber espionage activ...
Chinese-Backed Cyberattacks Target New Zealand, U.K., U.S.
Recent cyberattacks targeting New Zealand, the United Kingdom, and the United States are suspected to have originated with backing from China. The attacks highlight escalating tensions between democra...
Kyivstar starts 5G pilot as Ukraine hardens networks for war and recovery
Ukrainian telecommunications giant Kyivstar has initiated a pilot project for the launch of 5G services in the country. This move is part of broader efforts by Ukraine to strengthen its communications...
EU finances Ukrainian and European security
The article discusses European Union financial support for Ukraine's military budget and broader efforts towards bolstering European defense initiatives. The EU aims to strengthen its eastern flank by...
Malaysia tightens grip on major social media platforms – will it make the internet safer?
Malaysia has mandated that major social media and messaging platforms, those with over eight million users, must now comply with local licensing under the Malaysian Communications and Multimedia Commi...
NSA and CIA Find No Evidence of Ukraine Attack on Putin's Residence
The National Security Agency (NSA) and Central Intelligence Agency (CIA) have conducted investigations but found no evidence supporting claims that Ukraine was behind an attack on Russian President Vl...
Hegseth Announces Grok Access to Classified Pentagon Networks
A recent announcement by Hegseth reveals that the company Grok has been granted access to classified networks within the Pentagon, marking a significant advancement in military technology and cybersec...
Cyberdefense Enters a Dangerous New Phase
NATO allies are expressing concern over what they perceive as America's diminishing leadership role in cyber defense at a critical juncture. This apprehension underscores the growing importance of dig...
ESA confirms data breach
The European Space Agency (ESA) has confirmed a security breach of unclassified data from its science servers following social media reports. A threat actor claimed to have compromised ESA systems and...
Safeguarding American Transportation and Infrastructure Networks
In 2018, Andrew Grotto argued for prioritizing cybersecurity measures as the US modernizes its infrastructure and transportation networks to protect against digital threats. A recent revisit of this a...
Needed: massive computing power in the Northern Territory
Australia faces a shortage of secure onshore computing resources for defense purposes such as algorithm training and classified simulations under the AUKUS partnership. The government and industry mus...
The future of Zero Trust
Randy Resnick, a leading figure in Zero Trust security strategies, provides an update on current status and outlines new initiatives in this evolving cybersecurity approach....
India mulls forcing smartphone makers to give source code in security overhaul
Prime Minister Narendra Modi is considering mandating smartphone manufacturers to share source code as part of an initiative to enhance user data security in response to the growing incidence of onlin...
The New Arteries of Power
Lynn Kuok argues in Foreign Affairs that undersea cables are becoming a critical element in international disputes and national security issues. The article highlights how these communication lines ha...
Trump dismisses Kremlin claim of drone attack on Putin residence
President Donald Trump has dismissed Russian claims that an attempted drone attack took place at President Vladimir Putin's residence outside Moscow. The Kremlin reported the incident but provided no ...
1 2 3 Next →