• To President Trump and his defense secretary, the herculean rescue of two downed airmen in hostile territory was further proof that the U.S. military has full control of the skies over Iran. 

    But the actual situation remains complicated and dangerous, according to former military officials and defense experts who said painting a simple picture overlooks the weapons that downed the F-15E—and that still hold vast swaths of airspace at risk. 

    On Easter Sunday, Trump said in a social media post that the daring recovery underscored that U.S. forces had “achieved overwhelming Air Dominance and Superiority over the Iranian skies.” The next day, Defense Secretary Pete Hegseth said much the same.

    “We control the skies. You see we flew for seven hours in daylight over Iran to get the first pilot, and we flew seven hours in the middle of the night to get the second and Iran did nothing about it,” Hegseth said Monday at a White House press conference.

    But airpower experts, including Joint Chiefs Chairman Gen. Dan Caine, have been more measured. At press conferences, the former F-16 pilot has declared that air superiority exists over only certain areas of Iran; on Wednesday, he acknowledged the ongoing dangers that aviators face. 

    "I've laid out the statistics, but it does not truly capture the nature of combat. This is gritty and unforgiving business," Caine said. "It's chaotic, it's hot, it's dark, it's unpredictable and there's always unknowns."

    Air superiority is defined in Air Force doctrine as “the control of the air by one force that permits the conduct of its operations at a given time and place” without severe enemy action that would result in mission failure. A higher level of control, air supremacy, is established when the “opposing force is incapable of effective interference,” but this “may be difficult to achieve in a peer or near-peer conflict.” A state of air superiority or supremacy may be limited to a certain time, location, or altitude. 

    “Control of the skies” and “air dominance,” on the other hand, have no formal meaning. 

    “I understand why people use it, but, from a doctrinal perspective, to say you ‘control the sky’ doesn't really say anything, because control of the air is a spectrum,” said Kelly Greico, a senior fellow at the Stimson Center. “When President Trump and Secretary Hegseth are using these terms, they're not necessarily using them the doctrinal way, the way that you see Gen. Caine using them.”

    Trump’s use of “air dominance” really “doesn't mean anything,” Greico said, and added it’s not a term used in the Air Force’s doctrine.

    Gaining the ability to operate in hostile airspace is not just the Air Force’s responsibility, but “one of the first priorities of the joint force,” according to service doctrine. While heavy bombers have flown missions over parts of Iran and rescue helicopters can buzz in low and slow to the ground, other areas such as the Strait of Hormuz remain closed to ships due to air threats.

    “I think that it's worth emphasizing that Air Force doctrine is clear: that air superiority is for the joint force,” Grieco said. “So, by that definition, we do not have air superiority near the Strait of Hormuz, because it's predominantly drones and missiles that are keeping the strait closed, and they’re keeping it closed to naval escort vessels.”

    After the F-15E was shot down, an A-10 Thunderbolt II and multiple rescue helicopters and cargo planes were lost in the recovery mission, Caine said during the White House presser. Since the start of Operation Epic Fury in late February, Iran has destroyed or damaged multiple U.S. aircraft such as an F-35 which was forced to make an emergency landing after being hit during a combat mission.

    Those mounting losses stand in contrast to the administration’s claims of total control of the Iranian skies, some former military officials say.

    “I am somewhat surprised by the continued losses we were taking this deep into the conflict,” said Jack Shanahan, a retired Air Force three-star general, who thought the U.S. should have “more air supremacy” by this point.

    But others said a state of air superiority or supremacy can exist even with heavy aircraft losses. 

    “Air supremacy doesn't mean that you're completely without risk,” a former military official said. “There are plenty of examples of how even with air supremacy and air superiority, you can still be challenged. I don't think you ever get to an environment where you're not completely without risk.”

    This is particularly true at lower altitudes. 

    “When you're down below 5,000 feet, air supremacy and superiority feels a lot different than when you're up at 25,000 and 30,000 feet,” they said.

    On Wednesday, Caine told reporters that 80 percent of Iran’s air defenses had been destroyed, but that anti-aircraft threats still persisted at lower altitudes. Trump had claimed days earlier that Iranian anti-aircraft and radar had been destroyed; that the F-15E was shot down by a shoulder-mounted, heat-seeking missile; and that other aircraft took small-arms fire. 

    Shanahan said the administration’s sweeping claims about air control have a parallel in its occasional reports about the number of targets struck in Iran. (More than 13,000, Caine said on Wednesday.) Neither is a direct measure of success, and may even be a distraction.

     “We get caught up in the number of targets struck,” Shanahan said. “It’s back to almost Vietnam-era days when we started looking at body counts, number of tonnage of bombs dropped, but not understanding, maybe, the adversary has a different theory of victory in mind than you do. And if the regime survives, that may be their number-one criterion for success, whereas ours has seemed to be a little bit all over the map over the past 30 days.”

    ]]>

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • An Adobe Reader zero-day vulnerability is being actively exploited via malicious PDFs, allowing hackers to steal data without user interaction, with no patch available.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A previously undocumented threat cluster dubbed UAT-10362 has been attributed to spear-phishing campaigns targeting Taiwanese non-governmental organizations (NGOs) and suspected universities to deploy a new Lua-based malware called LucidRook. “LucidRook is a sophisticated stager that embeds a Lua interpreter and Rust-compiled libraries within a dynamic-link library (DLL) to download and

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • LayerX researchers have discovered how to bypass Claude Code’s safety rules using the CLAUDE.md file. This exploit allows…

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Hackers are abusing ClickFix commands and booby-trapping DMG installers to deliver a new macOS stealer called notnullOSX, built to loot high-value crypto wallets from Mac users. The story starts with 0xFFF, a malware developer who abruptly quit a major Russian-speaking hacking forum in 2023 after claiming he was being investigated and accusing the forum of […]

    The post ClickFix, Malicious DMGs Push notnullOSX to macOS Users appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • This week in cybersecurity from the editors at Cybercrime Magazine

    Sausalito, Calif. – Apr. 9, 2026

    Read the full story in Illumio

    “Gartner says we are all going to spend $240 billion USD (on cybersecurity this year), but Cybersecurity Ventures says that cybercrime losses (were predicted to) hit 10.5 trillion USD (in 2025),” said Theresa Payton, on “The Segment“, a Zero-Trust Leadership Podcast produced by Illumio, a leader in breach containment.

    The episode with Payton, who made history as the first female White House CIO, was recorded at the RSAC Conference 2026 in San Francisco. Since her government post, Payton has advised Fortune 500 boards, CEOs, and technology leaders on how to navigate risk in an increasingly complex digital landscape. She is CEO of Fortalice Solutions and a leading voice on AI privacy and security.

    Cybercrime presents a cybersecurity math problem, and Payton takes a deep dive into how we might solve it. With AI here, she suggests that we need a sea change – it’s time to reimagine the bigger picture.

    Is it really possible for CISOs and security leaders to change their mindsets on cybersecurity, and to achieve a significantly better ROI? Listen to this Podcast episode and decide for yourself.

    Read the Full Story



    Cybercrime Magazine is Page ONE for Cybersecurity. Go to any of our sections to read the latest:

    • SCAM. The latest schemes, frauds, and social engineering attacks being launched on consumers globally.
    • NEWS. Breaking coverage on cyberattacks and data breaches, and the most recent privacy and security stories.
    • HACK. Another organization gets hacked every day. We tell you who, what, where, when, and why.
    • VC. Cybersecurity venture capital deal flow with the latest investment activity from various sources around the world.
    • M&A. Cybersecurity mergers and acquisitions including big tech, pure cyber, product vendors and professional services.
    • BLOG. What’s happening at Cybercrime Magazine. Plus the stories that don’t make headlines (but maybe they should).
    • PRESS. Cybersecurity industry news and press releases in real time from the editors at Business Wire.
    • PODCAST. New episodes daily on the Cybercrime Magazine Podcast feature victims, law enforcement, vendors, and cybersecurity experts.
    • RADIO. Tune into WCYB Digital Radio at Cybercrime.Radio, the first and only round-the-clock internet radio station devoted to cybersecurity.

    Contact us to send story tips, feedback and suggestions, and for sponsorship opportunities and custom media productions.

    The post Math Problem: Cybercrime Divided By Cybersecurity appeared first on Cybercrime Magazine.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Security researchers at Sansec uncovered a large-scale Magecart campaign targeting Magento e-commerce platforms. Nearly 100 online stores were infected with a sophisticated credit card skimmer. To evade security scanners and steal shopper payment data seamlessly, attackers concealed the malicious payload inside an invisible SVG image element. Threat intelligence suggests the attackers likely breached the sites […]

    The post Attackers Deploy Hidden Magecart Skimmer on Magento Using SVG onload Abuse appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Austin, Texas, United States, 9th April 2026, CyberNewswire

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Thursday. Another week, another batch of things that probably should’ve been caught sooner but weren’t. This one’s got some range — old vulnerabilities getting new life, a few “why was that even possible” moments, attackers leaning on platforms and tools you’d normally trust without thinking twice. Quiet escalations more than loud zero-days, but the kind that matter more in

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A recently observed phishing campaign is abusing Google Cloud Storage to deliver the Remcos remote access trojan (RAT), relying on trusted Google infrastructure and a signed Microsoft binary to evade traditional defenses. Attackers host a fake Google Drive login page on the legitimate domain storage.googleapis.com, making the URL appear trustworthy to both users and security […]

    The post New Phishing Campaign Exploits Google Storage to Deliver Remcos RAT appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶