The sun rises above an M2A3 Bradley infantry fighting vehicle at a range in Qatar on Nov. 11, 2018. (Spc. Jovi Prevot/U.S. Army National Guard) The U.S. Army has signed off on the advancement of two industry teams into a technology development phase to build prototypes of a Bradley Infantry Fighting Vehicle replacement. American Rheinmetall
Let’s Encrypt ends certificate expiry emails to cut costs, boost privacy
Let’s Encrypt has announced it will no longer notify users about imminent certificate expirations via email due to high costs, privacy concerns, and unnecessary complexities. The decision to end the expiration notification email service was implemented as of June 4, 2025, but Let’s Encrypt has now communicated it via a blog post to raise awareness
Scattered Spider hackers shift focus to aviation, transportation firms
Hackers associated with “Scattered Spider” tactics have expanded their targeting to the aviation and transportation industries after previously attacking insurance and retail sectors These threat actors have employed a sector-by-sector approach, initially targeting retail companies, such as M&S and Co-op, in the United Kingdom and the United States and subsequently shifting their focus to insurance companies.
Army seeks $197 billion FY26 budget with transformation plan at center
U.S. Army Staff Sgt. Stetson Manuel assembles the Ghost-X drone during the human-machine integration experiment for Project Convergence in Fort Irwin, California, on March 11, 2024. (Staff Sgt. LaShic Patterson/U.S. Army) As the U.S. Army attempts one of the biggest reorganizations in recent decades, it will have to do it within the confines of a
Brother printer bug in 689 models exposes default admin passwords
A total of 689 printer models from Brother, along with 53 other models from Fujifilm, Toshiba, and Konica Minolta, come with a default administrator password that remote attackers can generate. Even worse, there is no way to fix the flaw via firmware in existing printers. The flaw, tracked under CVE-2024-51978, is part of a set
British hacker ‘IntelBroker’ charged with $25M in cybercrime damages
A British national known online as “IntelBroker” has been charged by the U.S. for stealing and selling sensitive data from victims worldwide, causing an estimated $25 million in damages. The indictment, revealed today by the U.S. Attorney’s Office for the Southern District of New York, accuses Kai West, a 25-year-old British man, of using the handle
Army expanding ‘Transformation in Contact’ initiative to Army Guard
Spc. Anton Lane, a combat medic with specialized drone training, assigned to 5-7 Cavalry 3rd Infantry Division, puts away a Skydio X10E4TT drone as part of a Transformation in Contact exercise. (Sgt. Samantha Hill/Army) The Army’s ongoing brigade modernization program is headed to the Guard. Army Chief of Staff Gen. Randy George told members of
SonicWall warns of trojanized NetExtender stealing VPN logins
SonicWall is warning customers that threat actors are distributing a trojanized version of its NetExtender SSL VPN client used to steal VPN credentials. The fake software, which was discovered by SonicWall’s and Microsoft Threat Intelligence (MSTIC) researchers, mimics the legitimate NetExtender v10.3.2.27, the latest available version. The malicious installer file is hosted on a spoofed website
US Homeland Security warns of escalating Iranian cyberattack risks
The U.S. Department of Homeland Security (DHS) warned over the weekend of escalating cyberattack risks by Iran-backed hacking groups and pro-Iranian hacktivists. This warning was issued as a National Terrorism Advisory System bulletin on Sunday and cautions that the Iranian conflict is causing a “heightened threat environment” in the United States, with “low-level” cyberattacks targeting
Malware on Google Play, Apple App Store stole your photos—and crypto
A new mobile crypto-stealing malware called SparkKitty was found in apps on Google Play and the Apple App Store, targeting Android and iOS devices. The malware is a possible evolution of SparkCat, which Kaspersky discovered in January. SparkCat used optical character recognition (OCR) to steal cryptocurrency wallet recovery phrases from images saved on infected devices.