Kenya’s 2027 general election security hinges on an independent National Police Service command, led by Inspector‑General Douglas Kanja. The 2010 Constitution insulates the police from political meddling, a safeguard born from the 2007 electoral violence. With a police‑to‑population ratio of roughly 1:531, the force faces high expectations and must maintain a clear 14‑rank hierarchy. Any political interference in transfers or directives could undermine preparation and jeopardize a peaceful transition.

Tom Vice, former Sierra Space chief executive, has been appointed CEO and executive chair of Huntsville‑based defense contractor Astrion. The company also named former Lockheed Martin Space vice president Eric Brown as president of space operations and ex‑RTX executive Conn...

U.S. military operations against Iran have exposed a critical dependence on tungsten, a metal essential for armor‑piercing rounds and rocket nozzles. Prices have surged more than 500% as existing stockpiles dwindle, and the United States imports the majority of its...

AI‑driven phishing, deepfake voice scams and ransomware are accelerating, pushing cyber risk to the forefront of boardrooms. A new Heimdal Security report shows 62% of companies now carry cyber‑insurance, up from 49% a year earlier, and the global market reached...

The United Kingdom convened virtual talks with over 40 nations to form a coalition aimed at reopening the Strait of Hormuz, which Iran has effectively blocked since its war began on Feb. 28. The United States was absent, with President Trump...

The USS Theodore Roosevelt (CVN‑71), the fourth Nimitz‑class supercarrier, departed Naval Base San Diego for routine operations as it finalizes pre‑deployment training. The carrier, fresh from a nine‑month tour that included Red Sea and Gulf of Aden missions, is expected to head...

On Oct. 15, Lockheed Martin launched 21 Space Development Agency Tracking Layer Tranche 1 satellites, each carrying three laser communication terminals (OCTs) instead of the planned four due to a supply shortfall. Tesat‑Spacecom delivered 42 terminals while CACI supplied only 21,...

Hackers are exploiting the critical CVE‑2025‑55182 flaw in Next.js to gain remote code execution and compromise at least 766 hosts across several cloud providers. The UAT‑10608 threat cluster deploys a multi‑phase dropper that harvests SSH keys, cloud IAM tokens, API...
Industry leaders at a SATShow Week panel warned that demand for in‑orbit inspection, repair, refueling and de‑orbit services will surge over the next five to ten years as Low‑Earth Orbit becomes increasingly congested. The Space Development Agency (SDA) highlighted a...

The Privacy and Civil Liberties Oversight Board (PCLOB) released a staff report, drafted under a sub‑quorum policy with only Republican Beth Williams remaining, that praises the intelligence value of Section 702 of the FISA and claims recent reforms have improved compliance. Section 702,...

Ukraine’s drone ecosystem has exploded from seven firms to roughly 500, producing about four million units last year and targeting seven million in 2026. The Pentagon is negotiating to buy Ukrainian interceptor drones after a Skycutter‑SkyFall model earned a 99.3‑out‑of‑100...
The White House’s Maritime Action Plan (MAP) offers a framework to introduce floating nuclear power plants and nuclear‑propelled vessels into the U.S. fleet, targeting strategic gaps in the Arctic and Indo‑Pacific. MAP’s focus on rebuilding the commercial fleet, modernizing regulations,...

The 17‑minute documentary “Drone Hunters of Kherson” reveals how cheap, off‑the‑shelf drones have supplanted artillery in Ukraine, with Russian FPV units targeting civilians and Ukrainian foot‑patrols countering them. It highlights the rapid, hour‑scale innovation cycle that produces $1,000 interceptor drones...

France must now fund the Rafale F5 fighter programme alone after the United Arab Emirates pulled out, citing refusal to share optronics technology. The UAE had pledged up to €3.5 billion ($3.8 billion) toward a €5 billion ($5.5 billion) development effort, leaving France to shoulder...

Gulf Cooperation Council Secretary‑General Jassim al‑Budaiwi appealed to the UN Security Council to halt Iran's daily missile and drone strikes across the Gulf and to safeguard uninterrupted navigation through strategic waterways. He warned that Iran's attacks have already disrupted the...

President Trump delivered a televised address framed as a "major" update on the U.S. confrontation with Iran, but the speech was widely criticized for incoherent rhetoric and confusing timelines. He compared the 32‑day operation to historic wars, then issued aggressive...

RTX’s BBN research arm has released Maude‑HCS, a DARPA‑funded toolkit for modeling and validating hidden communication systems, under the Apache 2.0 license on GitHub. Built on the Maude language, the open‑source tool lets users specify protocol behavior, adversary observables, and environmental...

U.S. and Israeli airstrikes have targeted Iran’s Natanz, Ardakan and Khondab nuclear facilities, yet the International Atomic Energy Agency reports no radiation leaks so far. Modern reactors automatically shut down after impact, but the real danger lies in damage to...

India, serving as BRICS chair for 2026, was urged by Iran’s president to use the forum to broker a cease‑fire after U.S. and Israeli strikes on Iranian territory. Despite the war’s spread to Gulf Cooperation Council states, BRICS has remained...

Anthropic unintentionally published a JavaScript sourcemap for Claude Code v2.1.88, exposing roughly 512,000 lines of TypeScript. Within days, security firm Adversa AI uncovered a critical flaw in Claude Code’s permission system that lets deny‑rule checks be bypassed when more than 50 sub‑commands are generated....
ThayerMahan successfully completed an 18‑day anti‑IUU fishing demonstration with NOAA Fisheries in the Gulf of Maine, using its uncrewed Outpost floating platform. The system detected and classified vessels, including those with disabled AIS, and streamed data to the U.S. Naval...
Ginger Matchett warns that Gulf desalination plants—critical for millions—are increasingly vulnerable to kinetic and non‑kinetic attacks, including missiles, drones, cyber intrusions, oil pollution, pipeline sabotage, and power shortages. Such disruptions could precipitate widespread water scarcity, economic distress, and humanitarian crises....

Switzerland is weighing the cancellation of its $2 billion Patriot missile‑defence contract after the United States signaled further delivery delays and a potential 50% price increase, pushing the total to roughly $3.3 billion. The delays stem from U.S. reprioritisation of Patriot shipments...

Microsoft announced the availability of new Copilot agents for Analyst and Researcher roles across its Government Community Cloud, GCC‑High, and Department of Defense environments. The agents automate data gathering, synthesis, and visualization to speed decision‑making, while Agent Builder and Copilot...
Atlantic Council vice‑president Matthew Kroenig appeared on The Daily Wire to argue that the United States has already met its core objectives in the ongoing conflict with Iran. He claims Iran’s military capacity has been significantly weakened over the past...

On April 2, 2026, Mercury Systems won a contract from L3Harris Technologies to provide advanced solid‑state data recorders for the Space Development Agency’s Tranche 3 Tracking Layer. The SSDRs are the highest‑capacity, radiation‑tolerant units in a 3U VPX form factor, delivering...
Hamas told mediators it will not discuss disarmament without guarantees that Israel fully withdraws from Gaza, as outlined in President Trump’s Board of Peace plan. The group presented demands to Egyptian, Qatari and Turkish envoys, insisting on an end to...

Researchers have unveiled two GPU‑focused Rowhammer attacks, GDDRHammer and GeForge, that can flip bits in Nvidia Ampere‑generation GDDR memory and gain arbitrary read/write access to CPU RAM. By massaging GPU page‑table allocations, the exploits break isolation and open a root...

Albania has placed security forces on heightened alert after the U.S. Embassy in Tirana warned that Iran‑linked groups could target American citizens, U.S. interests and popular venues. The embassy urged U.S. travelers to stay vigilant, while Albanian officials said no...
China’s foreign minister Wang Yi urged the EU and Germany to push for an immediate cease‑fire in the Israel‑Hamas war and to secure safe passage through the Strait of Hormuz. He framed a cease‑fire as essential for maritime safety and...
General Dynamics Information Technology (GDIT) has installed 203 AI‑powered surveillance towers along the U.S.–Mexico border, including roughly two dozen in the San Diego sector. The towers, ranging from 120 to 180 feet tall, combine cameras, radar, 5G and Starlink links to autonomously...
The Akira ransomware group can move from initial access to full data encryption in under an hour, often within four hours. Active since 2023, it has extorted roughly $245 million in ransom payments through September 2025. Akira leverages zero‑day exploits, vulnerable VPNs,...
Oracle announced its Defense Industrial Base Isolated Cloud Environment (DICE), an air‑gapped OCI offering that meets U.S. Secret and future Top Secret classification requirements. The service, unveiled at the Oracle Federal Forum, is undergoing security assessments and aims for provisional...

Lawmakers introduced the bipartisan Cyber Ready Workforce Act, directing the Department of Labor to launch a grant program that expands registered cybersecurity apprenticeship programs. The legislation adds House co‑sponsors to revive a previously stalled Senate effort and targets the estimated...
Austria announced it will deny any U.S. military aircraft linked to the Iran‑Israel conflict permission to use its airspace, invoking its 1955 constitutional neutrality law. Vice‑Chancellor Andi Babler publicly condemned President Trump’s “policy of chaos” and warned of a looming...
A new study reveals that 32 Title 32 authorities could let National Guard cyber teams support Department of Defense missions without major policy changes. While Guard units traditionally operate under Title 32 for drills, they can already surge under Title 10, but the...

Air National Guard and Air Force Reserve leaders warned that more than 80% of their fighter inventory consists of aging legacy jets with limited service life, and over half of Guard squadrons lack a clear modernization roadmap. They argue that...

A new CrowdStrike report shows cyber threats in Ireland and Europe spiralling, with AI‑enabled attacks up 89% and cloud intrusions up 266% year‑over‑year. A five‑year CybSafe study reveals employee security habits are eroding: MFA usage dropped from 94% in 2022...

Iran‑linked hacker group Handala claimed responsibility for a March 11, 2026 cyberattack on Michigan‑based medical‑device maker Stryker Corp., disrupting its internal Microsoft systems and halting order processing, manufacturing, and shipping. The incident underscores how regional geopolitical tensions can quickly spill...

The RSAC 2026 conference placed artificial intelligence at the forefront of cybersecurity discussions, while its official theme emphasized the "Power of Community." Notably, the U.S. federal government was absent, leaving a void in public‑private collaboration and prompting concerns about AI governance....

ArmorPoint has teamed up with Scudo360 to embed a 24/7 managed SOC and SIEM capability into Scudo360’s service portfolio. The co‑delivery model gives Scudo360’s mid‑market clients continuous threat monitoring and real‑time response without building their own security operations center. By...
_7.jpg)
Austria has denied the United States permission to use its airspace for military operations against Iran, invoking its 1955 neutrality law. The defence ministry said each request will be assessed individually, but no blanket overflight ban exists. Austria joins Spain,...
A U.S. drone strike in Baghdad on March 13 targeted Kataib Hizballah leader Abu Hussein al‑Hamidawi, injuring him but missing his primary objective. Since the attack, Iran‑backed militias have intensified drone and rocket assaults on U.S., French, Kurdish and Iraqi facilities, tallying over...

SpaceX now controls launch services, Starlink broadband, crew transport to the ISS, and key defense contracts, making it a de‑facto infrastructure provider across multiple space layers. The company earned this dominance through rapid iteration, vertical integration and aggressive pricing, not...

U.S. Immigration and Customs Enforcement (ICE) confirmed it has purchased and deployed Paragon Solutions’ Graphite spyware in drug‑trafficking investigations. The agency’s acting director said the tool complies with constitutional requirements and poses no significant security or counter‑intelligence risks. After a...
Polish prosecutors have opened a criminal investigation into a March 29 improvised‑explosive‑device attack that wounded a Polish soldier serving with the United Nations Interim Force in Lebanon (UNIFIL). The blast hit the convoy in Bint Jubayl, injuring the soldier’s face and head,...
The Atlantic Council podcast hosted by Matthew Kroenig features Rebecca Lissner discussing President Biden’s overarching foreign‑policy blueprint. Lissner outlines a strategy built on reinforcing alliances, promoting democratic norms, and countering China’s rising influence. The conversation also probes whether former President...

A Fortune journalist was nearly compromised by a North Korean phishing scheme that masqueraded as a Zoom update, exposing a credential‑stealing script. The attackers leveraged a hijacked Telegram account to arrange a fake video call, a tactic the DPRK has...

theCUBE Research announced that Krista Case has joined as principal analyst and practice lead for cyber resilience and security. Case will head research on data governance, AI‑driven identity security, and next‑generation security operations centers. She will work alongside veteran analyst...

The RSA Conference (RSAC) highlighted a surge in post‑quantum cryptography initiatives, with several vendors unveiling prototype algorithms and migration roadmaps. Former NSA cyber experts presented new threat‑intel platforms that blend AI with traditional analytics, aiming to shorten detection cycles. Cloud‑native...