• Pentagon officials report that the ground-launched Precision Strike Missile—PrSM for short—made a successful combat debut in the opening hours of the war on Iran. The new, now-proven ground-launched missile offers long-range strike capacity needed in the Middle East, to counter further Russian aggression in Eastern Europe, and to deter Chinese action in the Pacific. Washington should move quickly to replace expended PrSMs and expand the U.S. capacity to produce them.

    Like the older Army Tactical Missile Systems, or ATACMS, the Precision Strike Missile is a short-range ballistic missile fired from the M142 High Mobility Artillery Rocket Systems (HIMARS) or the M270 Multiple Launch Rocket System (MLRS). PrSM has a longer range than ATACMS—longer, indeed, than the 499 km limit of the now-lapsed Intermediate-Range Nuclear Forces Treaty. And its smaller size means each HIMARS and MLRS can load twice as many PrSMs.

    Ground-based systems have advantages in persistence and survivability when compared to ships in littoral waters and planes operating from well-known air bases. Tracking and targeting highly mobile vehicles on land, such as HIMARS and MLRS, is a difficult and resource-intensive task for any adversary.

    PrSM played an important role in the early hours of the operation, augmenting strikes from the air and sea and appearing in Epic Fury footage released by the Pentagon on Feb. 28. Gen. Dan Caine, Joint Chiefs chairman, alluded to its use during a March 2 press briefing: “On the ground, forces fired precision standoff weapons” that were “measured, deliberate, precise, and lethal.” The next day, CENTCOM Commander Adm. Brad Cooper confirmed PrSM strikes against Iran.

    PrSM is useful throughout a conflict, but is especially valuable at the onset, when it can be used to destroy adversary air defenses and command-and-control networks. That mission is typically conducted with air- or sea-launched long-range weapons to reduce the risk to U.S. assets and service members. Once those networks are degraded or destroyed, U.S. aircraft can more safely operate in adversary airspace, allowing them to strike targets with large numbers of low-cost stand-in weapons

    As the authors wrote in these pages in 2023, deploying PrSM to the Middle East makes a lot of sense. At the time, some suggested that Arab partners would not permit such strikes from their territory. The current conflict demonstrates that this is not always the case.

    PrSMs fired by U.S. forces in the Arabian Peninsula can strike important targets across southern and central Iran, including air bases, military headquarters, and air defenses. That can augment strikes by air and naval assets, potentially reducing the burden on them somewhat and freeing them up for other missions.

    That could prove useful as the U.S. military eyes the need to continue strikes in Iran while preparing for a potential U.S. Navy tanker escort mission in the Strait of Hormuz. PrSM’s short time between launch and impact, as well as the persistent nature of its launchers, could allow it to strike pop-up targets when air assets are not available.

    The range, persistence, mobility, and survivability of PrSM also make it well-suited for deployment in the Indo-Pacific to deter China. It will be even more effective in that theatre with the arrival of PrSM Increment 2, which adds a multimode seeker that can target naval vessels at sea. The first flight test of Increment 2 took place on March 12 and reportedly met its objectives. Increment 3 is intended to add payload options, and Increment 4 seeks to extend the range even farther.

    Given these growing capabilities, PrSM could also help deter further Russian aggression in Europe. Ukraine has already used ATACMS to destroy modern Russian S-400 air defense systems, and Russia has struggled to target the launchers. PrSM would present additional challenges for Russian military planners contemplating new aggression.

    Despite these advantages, PrSM has so far been procured in relatively small quantities: 98 in fiscal 2024, 230 in FY 2025, and 124 in FY 2026. 

    Given PrSM’s now combat-proven capabilities and the clear benefits of deploying the missile to the Middle East, the Pacific, and Europe, those numbers are wildly insufficient. Hopefully, the administration will act quickly to change course and push for a dramatic increase in procurement quantities and production capacity. If it does, Congress would be wise to quickly authorize and appropriate the necessary funds.

    The U.S. military faces munitions shortages because successive administrations of both parties failed to procure sufficient quantities over several decades. With current conflicts depleting American stocks and the PLA conducting a massive buildup in the Indo-Pacific, shortchanging PrSM would be penny-wise and pound-foolish.

    Ryan Brobst is the deputy director of the Center on Military and Political Power (CMPP) at the Foundation for Defense of Democracies (FDD), where Bradley Bowman is the CMPP senior director.

    ]]>

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A critical security flaw impacting Langflow has come under active exploitation within 20 hours of public disclosure, highlighting the speed at which threat actors weaponize newly published vulnerabilities. The security defect, tracked as CVE-2026-33017 (CVSS score: 9.3), is a case of missing authentication combined with code injection that could result in remote code execution. “The POST /api/v1

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • WebP boosts performance raises compatibility issues, making image format conversion to PNG essential for secure, flexible, and efficient web workflows today.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Cybersecurity researchers at Sublime Security have discovered a new scam that uses realistic, interactive JavaScript-based Zoom meeting invites to trick users into installing malware.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • This week in cybersecurity from the editors at Cybercrime Magazine

    Sausalito, Calif. – Mar. 20, 2026

    If you’re making the pilgrimage to RSAC 2026 in San Francisco next week, then we might see you there. For the past five years, Cybersecurity Ventures has been one of the RSAC media partners alongside Bloomberg, Fortune, The Wall Street Journal, and several other top technology, business and financial news agencies.

    Our media team is excited to visit the RSAC Early Stage Expo. It’s an innovation space dedicated to promoting up-and-comers in the industry, with nearly 80 kiosks for attendees to browse, and a venue to meet new entrants and startups who are coming out of stealth.

    As always, we’ll be in the main Expo where some of the industry’s leading companies will present cutting-edge products and also give hands-on demos. Over the years we’ve learned of so many breakthrough cybersecurity solutions here. According to RSAC’s exhibitor list, there will be more than 550 companies across the North and South Expo.

    We’ll be interviewing numerous chief information security officers at RSAC 2026. If you’re a CISO, and would like to schedule time with our media team, then Contact Us to schedule a meeting.

    If you’re just deciding now, at the last minute, to attend this year’s biggie, then Go Here to REGISTER for RSAC 2026.



    Cybercrime Magazine is Page ONE for Cybersecurity. Go to any of our sections to read the latest:

    • SCAM. The latest schemes, frauds, and social engineering attacks being launched on consumers globally.
    • NEWS. Breaking coverage on cyberattacks and data breaches, and the most recent privacy and security stories.
    • HACK. Another organization gets hacked every day. We tell you who, what, where, when, and why.
    • VC. Cybersecurity venture capital deal flow with the latest investment activity from various sources around the world.
    • M&A. Cybersecurity mergers and acquisitions including big tech, pure cyber, product vendors and professional services.
    • BLOG. What’s happening at Cybercrime Magazine. Plus the stories that don’t make headlines (but maybe they should).
    • PRESS. Cybersecurity industry news and press releases in real time from the editors at Business Wire.
    • PODCAST. New episodes daily on the Cybercrime Magazine Podcast feature victims, law enforcement, vendors, and cybersecurity experts.
    • RADIO. Tune into WCYB Digital Radio at Cybercrime.Radio, the first and only round-the-clock internet radio station devoted to cybersecurity.

    Contact us to send story tips, feedback and suggestions, and for sponsorship opportunities and custom media productions.

    The post Cybersecurity Ventures Will See You At RSAC Conference 2026 appeared first on Cybercrime Magazine.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Google has released a critical security update for its Chrome desktop web browser, addressing 26 distinct vulnerabilities that could enable attackers to execute malicious code remotely. The Stable channel update introduces versions 146.0.7680.153 and 146.0.7680.154 for Windows and macOS systems, while Linux environments will receive version 146.0.7680.153. This substantial patch cycle is actively rolling out […]

    The post Chrome Security Update Fixes 26 Vulnerabilities Enabling Remote Malicious Code Execution appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A severe security vulnerability has been uncovered in UNISOC modem firmware, allowing attackers to execute arbitrary code remotely over cellular networks. UNISOC is a major semiconductor manufacturer providing chipsets for prominent mobile brands such as Motorola, Samsung, Vivo, and Realme. This unpatched flaw leaves millions of devices potentially vulnerable to remote compromise. Vulnerability Overview The […]

    The post Critical UNISOC T612 Modem Flaw Enables Remote Code Execution via Cellular Calls appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Google on Thursday announced a new “advanced flow” for Android sideloading that requires a mandatory 24-hour wait period to install apps from unverified developers in an attempt to balance openness with safety. The new changes come against the backdrop of a developer verification mandate the tech giant announced last year that requires all Android apps to be registered by verified developers to

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Artificial Intelligence (AI) is changing how individuals and organizations conduct many activities, including how cybercriminals carry out phishing attacks and iterate on malware. Now, cybercriminals are using AI to generate personalized phishing emails, deepfakes and malware that evade traditional detection by impersonating normal user activity and bypassing legacy security models. As a result,

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Sansec is warning of a critical security flaw in Magento’s REST API that could allow unauthenticated attackers to upload arbitrary executables and achieve code execution and account takeover. The vulnerability has been codenamed PolyShell by Sansec owing to the fact that the attack hinges on disguising malicious code as an image. There is no evidence that the shortcoming has been exploited in

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶