• The Pentagon wants to buy almost $1 billion—$994.1 million to be precise—worth of counterdrone tech in 2027, according to budget documents. 

    The request, under other Army procurement for counter-small unmanned aerial systems, is close to double the $596 million enacted for 2026, which includes atypical funding from budget reconciliation. 

    That funding spike extends to research and development too. The Army is asking for $26.5 million for counter-small unmanned aerial systems in applied research, which is more than double what is set aside for 2026. Plus, funding for c-UAS development could jump from $140 million in 2026 to $359.2 million proposed in 2027 if finalized by Congress, the documents show. 

    While some of the increases may reflect budget line consolidation, the proposal comes as U.S. military counterdrone tech spending is expected to grow. That could mean more contracts domestically and abroad as drone threats proliferate and militaries continue to look to the Russia-Ukraine war for best practices and tech

    The Pentagon’s counterdrone task force says it wants to buy $600 million in c-UAS tech to support the U.S.-Israel war on Iran, FIFA World Cup protection, and to protect critical infrastructure. 

    Drone threats and systems used to defeat them could be at an “inflection point,” Brett Velicovich, who co-founded the startup, Powerus, which helps deliver Ukrainian drone tech to the U.S. military, told Defense One. “The question is no longer detection, but kinetic, interception solutions at scale” and the proposed budget could be “a chance to prioritize affordable, deployable interceptor solutions…that can actually stop threats in real time.”

    It’s a numbers game.

    “The Ukrainians, as an order of magnitude, consider that they need to lose four drones for every one that they take down,” said Doug Abdiel, a Marine Corps reservist and global vice president at Advanced Navigation, which focuses on GPS alternatives and autonomous systems. 

    But being able to buy drones in large quantities is only part of the challenge. 

    “It's also a mindset shift around agility, and…how you use these assets,” he told Defense One, including “the notion that you would buy a drone to then do a kinetic kill on another drone. Or that you are going to have so much in your radar pattern that you're going to be unable to process all that information.” 

    Welcome

    You’ve reached the Defense Business Brief, where we focus on what the Pentagon buys, who they’re buying from, and why. Send along your tips, feedback, and streaming recommendations to lwilliams@defenseone.com. Check out the Defense Business Brief archive here, and tell your friends to subscribe!

    A new defense tech unicorn is born. Hypersonic aircraft maker Hermeus hit $1 billion valuation after a $350 million Series C funding round—and it plans to use that money to speed up production and make more prototypes. 

    • The In-Q-Tel backed firm is also moving its headquarters from Atlanta to El Segundo, Calif., where it plans to expand prototyping and research and development efforts. While some employees are already in the new space, full relocation is expected in early 2027. 
    • In the coming months, Hermeus’ Atlanta site will pivot to become the company’s manufacturing epicenter, producing its Quarterhorse aircraft.
    • “The team is now scaling to a fleet of three F-16 scale aircraft, accelerating our path to Mach 3 and starting customer payload integration,” a company spokesperson told Defense One.

    HII dives into physical AI through a new agreement with Gray Matter Robotics to explore how it can be integrated into shipbuilding for manned and unmanned vessels. 

    • The move is part of a larger strategy to increase productivity in shipbuilding, which involves complex, precise, and yet variable tasks like “grinding, blasting and finishing of metal structure,” Eric Chewning, HII’s head of strategy and maritime systems, told reporters. “There is a broader set of industrial use cases where we need a single robot to do 100,000 tasks just once. And that’s where physical AI is a game changer.”
    • Background: Navy Secretary John Phelan has pushed for more use of AI, automation, and robotics in shipbuilding—from back-office work to manufacturing and maintenance—to speed up deliveries and close workforce gaps. 
    • But while robots aren’t necessarily new to shipyards, it may take a while before the HII-Gray Matter Robotics partnership has hard data on how much the technology can improve throughput
    • “We've got to get the technology certified before we can put them in a production environment,” Chewning said, noting the paperwork process to get Gray Matter’s technology certified with the Navy is underway.
    • The emphasis now is on demonstrating how well the tech works. 
    • “Once we can begin to demonstrate these technologies are qualified, and that our hypothesis around their integration [and] the value stream works, then we can begin to get them deployed into the shipyard,” Chewning said, adding that HII plans to install a Gray Matter Robotics cell at Ingalls. “So as quickly as we're able to, we're going to get these things instituted to help drive throughput.” 
    ]]>

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Cybersecurity researchers have lifted the curtain on a stealthy botnet that’s designed for distributed denial-of-service (DDoS) attacks. Called Masjesu, the botnet has been advertised via Telegram as a DDoS-for-hire service since it first surfaced in 2023. It’s capable of targeting a wide range of IoT devices, such as routers and gateways, spanning multiple architectures. “Built for

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Operation Masquerade: The FBI and DoJ disrupted a Russian GRU campaign that hijacked routers via DNS attacks to spy on users and steal credentials.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Microsoft researchers have uncovered a fast-moving group, Storm-1175, launching high-speed Medusa ransomware attacks against healthcare and education sectors in the UK, US, and Australia by exploiting security flaws in as little as 24 hours.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Defense Secretary Pete Hegseth declared the U.S.’s war against Iran a “decisive military victory” during a press briefing on Wednesday—day one of a two-week ceasefire that could lead to more strikes if the U.S. and Iran can’t reach a long-term deal.

    Hegseth said that “Iran begged for this ceasefire” and that “they’ve had enough,” though the 10-point plan Iran has proposed to end the war includes some propositions that have been non-starters for the U.S. in the past, including withdrawing U.S. troops from the Middle East and lifting all sanctions on Iran.

    “Yeah, we'll be hanging around. We're not going anywhere. We're going to make sure Iran complies with this ceasefire and then ultimately comes to the table and makes a deal,” Hegseth said. “Our troops are prepared to defend, prepared to go on offense, prepared to restart at a moment's notice with whatever target package would be needed in order to ensure that Iran complies.”

    The secretary boasted of 800 targets struck Tuesday night before the ceasefire began, “completely destroying” their defense industrial base. That followed his March 13 declaration that it had been “functionally defeated.”

    “What little they have left buried in bunkers is all they will have,” Hegseth said Wednesday. “They can still shoot. We know that their command and control is so decimated they can't really talk and coordinate.”

    Hegseth added that “Iran no longer has any sort of comprehensive air defense” capability.

    Still, Iran retains the ability to fire on ships in the Strait of Hormuz, which suggests that the country still has enough military power to be a threat beyond its borders. Eliminating Iran’s ability to do so is among the key military objectives repeatedly touted by the administration since strikes began in late February.

    Hegseth’s claims about the operation’s success may be overwrought, officials and analysts told the Washington Post, in light of the downing of an F-15 fighter jet on Friday and the subsequent downing of an A-10 aiding in the rescue of the fighter’s aircrew

    At the briefing, Air Force Gen. Dan Caine, chairman of the Joint Chiefs, estimated that the U.S. had taken out 80 percent of Iran’s air defense systems and sunk more than 90 percent of its navy over the course of striking more than 13,000 targets.

    “Over the course of 38 days of major combat operation, the Joint Force achieved the military objectives as defined by the president,” Caine said in prepared remarks. “We welcome the ongoing cease fire, and as the Secretary said, we hope that Iran chooses a lasting peace.”

    ]]>

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The Russian threat actor known as APT28 (aka Forest Blizzard and Pawn Storm) has been linked to a fresh spear-phishing campaign targeting Ukraine and its allies to deploy a previously undocumented malware suite codenamed PRISMEX. “PRISMEX combines advanced steganography, component object model (COM) hijacking, and legitimate cloud service abuse for command-and-control,” Trend Micro

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • This week in cybersecurity from the editors at Cybercrime Magazine

    Sausalito, Calif. – Apr. 8, 2026

    Watch the YouTube video

    Why did Cybercrime Magazine meet up with Charlie Thomas, CEO at Mitiga, at RSAC Conference 2026? Because attackers will get in. Cloud, SaaS, AI, and identity sprawl make it easy. The real measure is eliminating the impact.

    Founded by cloud incident responders, Mitiga saw prevention alone wasn’t enough. Legacy, prevention-based tools missed what mattered: investigating and stopping active cloud-based cyberattacks.

    Mitiga closes that gap with automation, AI-driven detection, and a forensic data lake holding over 1,000 days of activity. What started as response has grown into what the New York City-based company calls the most complete solution for eliminating the impact of cloud attacks.

    “If I could leave security leaders with one takeaway about the future of cybersecurity, it’s to accept and recognize that yesterday’s cybersecurity program won’t work for today’s modern attacks,” says Thomas.

    Chief information security officers globally are listening to what Thomas and his team has to say. In 2025, Mitiga, with additional offices in London and Tel Aviv, Launched a 25-member CISO advisory board.

    Watch the Video



    Cybercrime Magazine is Page ONE for Cybersecurity. Go to any of our sections to read the latest:

    • SCAM. The latest schemes, frauds, and social engineering attacks being launched on consumers globally.
    • NEWS. Breaking coverage on cyberattacks and data breaches, and the most recent privacy and security stories.
    • HACK. Another organization gets hacked every day. We tell you who, what, where, when, and why.
    • VC. Cybersecurity venture capital deal flow with the latest investment activity from various sources around the world.
    • M&A. Cybersecurity mergers and acquisitions including big tech, pure cyber, product vendors and professional services.
    • BLOG. What’s happening at Cybercrime Magazine. Plus the stories that don’t make headlines (but maybe they should).
    • PRESS. Cybersecurity industry news and press releases in real time from the editors at Business Wire.
    • PODCAST. New episodes daily on the Cybercrime Magazine Podcast feature victims, law enforcement, vendors, and cybersecurity experts.
    • RADIO. Tune into WCYB Digital Radio at Cybercrime.Radio, the first and only round-the-clock internet radio station devoted to cybersecurity.

    Contact us to send story tips, feedback and suggestions, and for sponsorship opportunities and custom media productions.

    The post Yesterday’s Cybersecurity Won’t Work For Next Generation Cloud Attacks appeared first on Cybercrime Magazine.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Anthropic recently unveiled Claude Mythos Preview, a groundbreaking general-purpose language model demonstrating an unprecedented, emergent ability to autonomously discover and exploit zero-day vulnerabilities. In response to these powerful capabilities, the company introduced Project Glasswing, a coordinated defensive initiative aimed at securing critical software infrastructure before cyberattackers can leverage similar tools. This release marks a watershed […]

    The post Anthropic Launches Claude Mythos Preview Focused on Zero-Day Vulnerability Discovery appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Security researchers at EXPMON have uncovered a highly sophisticated, unpatched zero-day vulnerability actively targeting Adobe Reader users. The exploit, first detected in the wild late last month, allows threat actors to silently steal local files, gather sensitive system information, and potentially deploy remote code execution (RCE) attacks against compromised machines. According to the threat intelligence […]

    The post Hackers Target Adobe Reader Users With Sophisticated Zero-Day Exploit appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • EvilTokens is a new Phishing-as-a-Service (PhaaS) platform that turns stolen Microsoft 365 tokens and AI into an end‑to‑end factory for Business Email Compromise (BEC) at scale. By combining device-code phishing, custom tooling, and large language models, it enables low- to mid-skill threat actors to run highly tailored BEC operations in minutes rather than days. First […]

    The post EvilTokens Uses Stolen Microsoft 365 Tokens, AI to Supercharge BEC appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶