• The Cybersecurity and Infrastructure Security Agency (CISA) issued an urgent alert on October 20, 2025, highlighting a severe vulnerability CVE-2025-33073 in Microsoft’s Windows SMB Client.

    Dubbed an improper access control flaw, this vulnerability tracked under CVE details yet to be fully specified poses a significant risk of privilege escalation for attackers worldwide.

    As cyber threats escalate amid rising ransomware incidents, organizations are scrambling to patch their systems before the November 10 deadline.

    The vulnerability exploits the Server Message Block (SMB) protocol, a cornerstone of Windows file sharing and network communications.

    According to CISA’s Known Exploited Vulnerabilities (KEV) catalog, malicious actors can craft a script that tricks a victim’s machine into initiating an SMB connection back to the attacker’s system.

    This forced authentication grants unauthorized access, potentially allowing full control over the compromised device.

    Linked to CWE-284 (Improper Access Control), the flaw underscores long-standing concerns with SMB’s authentication mechanisms, which have been a favorite target for cybercriminals since the WannaCry outbreak in 2017.

    Windows SMB Vulnerability Actively Exploited

    Attackers leverage this vulnerability through social engineering or drive-by downloads, where users accidentaly execute the malicious payload.

    Once triggered, the SMB client authenticates to the attacker’s server, bypassing typical safeguards and enabling lateral movement within networks.

    While CISA notes it’s unknown if this specific flaw fuels ransomware campaigns, the technique mirrors tactics used by groups like LockBit and Conti, who routinely exploit Windows protocols for initial access.

    The alert arrives at a tense time for IT admins, following a wave of SMB-related exploits in 2025, including those targeting unpatched Azure environments.

    Experts warn that unmitigated systems could face data exfiltration or deployment of malware, especially in sectors like finance and healthcare.

    “This is a classic elevation-of-privilege vector that preys on default configurations,” said cybersecurity analyst Maria Gonzalez of SentinelOne. “Admins must prioritize SMB hardening to avoid cascading breaches.”

    CISA urges immediate action: Apply Microsoft’s latest patches as outlined in their security advisories, or follow Binding Operational Directive (BOD) 22-01 for federal cloud services.

    If mitigations aren’t feasible, discontinue use of affected products. Tools like Windows Defender and third-party endpoint detection can help monitor SMB traffic anomalies.

    With a 21-day remediation window, organizations should scan for vulnerable instances using tools such as Nessus or Qualys. Disabling unnecessary SMBv1 features and enforcing least-privilege access remain best practices.

    As the due date looms, this vulnerability serves as a call to bolster defenses against evolving Windows threats.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post CISA Warns of Windows SMB Vulnerability Actively Exploited in Attacks appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The Shadowserver Foundation has uncovered more than 71,000 internet-exposed WatchGuard devices running vulnerable versions of Fireware OS.

    The flaw, tracked as CVE-2025-9242, stems from an out-of-bounds write vulnerability in the IKEv2 implementation, potentially allowing remote attackers to execute arbitrary code without authentication.

    Disclosed earlier this year, the issue highlights the dangers of unpatched firewalls in enterprise environments, where such devices often serve as the first line of defense against cyber threats.

    Security researchers first flagged CVE-2025-9242 in WatchGuard’s Fireware OS versions prior to 12.10.3, affecting a wide range of the company’s popular firewall models, including the Firebox T-series and M-series appliances.

    The vulnerability arises during the processing of IKEv2 packets, where improper bounds checking can lead to memory corruption. Attackers could exploit this remotely over the internet, potentially gaining full control of the device and pivoting to internal networks.

    While WatchGuard released patches in March 2025, the sheer number of exposed instances suggests many organizations have yet to apply them, leaving critical infrastructure at risk.

    WatchGuard Devices Exposed

    The Shadowserver Foundation, a nonprofit dedicated to scanning for internet vulnerabilities, began sharing daily IP data on affected WatchGuard devices this week.

    Their October 18, 2025, report identified over 71,000 vulnerable hosts worldwide, a figure that underscores the global scale of the problem. These scans focus on ISAKMP (Internet Security Association and Key Management Protocol) traffic, the backbone of VPN connections, where the IKEv2 flaw resides.

    Shadowserver’s data, available through their Vulnerable ISAKMP reporting portal, includes anonymized IP addresses to help network defenders identify and remediate their own exposures.

    Experts warn that exploiting CVE-2025-9242 could enable devastating attacks, such as ransomware deployment or data exfiltration, especially in sectors like healthcare and finance that rely heavily on WatchGuard hardware.

    The CVSS v3.1 base score of 9.8 rates it as critical, emphasizing its ease of exploitation no user interaction required. Shadowserver noted a slight uptick in vulnerable devices since initial disclosures, possibly due to newly deployed or misconfigured systems.

    WatchGuard urges immediate updates to Fireware OS 12.10.3 or later, alongside disabling IKEv2 if not essential. Cybersecurity firms like Rapid7 and Tenable have echoed these recommendations, advising organizations to audit their perimeters using tools like Shodan or Shadowserver’s feeds.

    As threat actors increasingly target network edges amid rising geopolitical tensions, this incident serves as a wake-up call. With over 71,000 devices in the crosshairs, proactive defense remains the only shield against potential chaos.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post 71,000+ WatchGuard Devices Vulnerable to Remote Code Execution Attacks appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The governments of Estonia and Ukraine are racing ahead to harness artificial intelligence, which they believe is crucial to building societies that can fend off Russian assaults—whether by missiles or denial-of-service attacks.

    At Oct. 9’s Tallinn Digital Summit,, Estonian Prime Minister Kristen Michal said the country aims to sit “among world leaders in AI,” a technology he said is “shaping the future of democracy, the global order, and our shared security.”

    The sentiments are hardly unique, but they’re the latest expression of the aggressive digital modernization pursued by Tallinn since a Russian cyberattack that took essential services offline in 2007.

    “Estonia knows what it means to live on the digital frontline. AI gives us an advantage that size alone cannot. This is why we have an AI strategy for defense and a Force Transformation Command within the Estonian Defense Forces. With industry, startups, and the military working side by side, we move from idea to field faster,” Michal told an audience of international technology executives and government officials. “Russia’s war has made one thing clear: the side that can integrate technology faster has the advantage. Ukraine has shown it. So, while supporting them in every way, we also learn from them.”

    This means more than buying AI tools and services, he said: it means completely rethinking governmental structure and function. 

    The “agentic” AI state

    Michal didn’t go into great detail about what that means, but his government contributed to a white paper released at the summit that spells out a detailed vision for how leaders could use AI to draft policies and laws, implement them, and expand government services while reducing costs.

    The paper is the work of a digital-innovation group called the Agentic State, headquartered in Estonia with members from  governments such as Ukraine, the United States, and the European Union and institutions such as the World Bank.

    It centers on the idea of “agentic AI,” which covers an emerging set of tools that go beyond the conversations of a large language model—think ChatGPT—to take real-world actions. Agentic AI can make decisions with limited human supervision, such as executing a marketing campaign, researching and writing a daily newsletter, or responding to and fixing customer complaints. Amazon is already using such tools to identify vendors, make orders, and pay invoices for many supply orders. Google uses them to find the best routes for web traffic.

    The paper argues that government should be transformed to bring autonomous decision-making to many of its processes. 

    Ukraine—already a leader in online access to government services—is working on it. AI should be “the foundation of public administration, from automating routine processes to delivering personalized services for every citizen,” Mykhailo Fedorov, Ukraine’s first vice prime minister, wrote in the paper, adding that the agentic state “understands people’s needs, offers solutions, and provides the right tools. Ukraine is already moving toward a model where just one request or a single voice message stands between a person’s need and the result.”

    Estonia, too, is moving to have citizens interact with their government primarily through AI, at least for many essential exchanges. Luukas Kristjan Ilves, a Stanford-educated technologist who has helped Ukraine stand up its digital-government program, is playing a critical role. 

    “This isn’t just chatbots,” Ilves told a small gathering of technology experts in Tallinn on the eve of the summit. “This is multimodal interaction that really meets the user wherever they are, and that could be a government agent. So that could be a government chatbot that will speak to you in any language, that will show up in your VR glasses, but it could also be allowing you, with the agent you have on your smartphone, to consume public services natively, without having to go through a website.” 

    He said citizens would see a drastic reduction in the time it takes, for example, to get a business license or access benefits.

    AI can also improve how  governments work internally, especially the way they buy things. 

    “Public procurement, which is 10 percent of global GDP, is a broken process today, broken for perfectly good reasons. We have lots of rules and regulations around it, but we can replace human buying with agentic buying in a way that delivers much more public value.”

    And Estonia is already working to harness AI for national defense, to give its 1.3 million people an “advantage that size alone cannot,” as Ilves put it. “AI is more than defense. Innovation and productivity keep nations strong long after wars end.”

    AI might even one day play a role in policy, enabling lawmakers and regulators to shape new laws and rules based on data.

    “Now, what we can’t do today, and probably won’t be able to do for a while, is to hand an entire policy area to the AI and say, ‘OK, you run social everything. You know what? Adjust. Don’t just do the benefits claims; adjust the social policy, steer it off.’ That’s going to require humans for a while,” Ilves said. 

    Ultimately, though, Ilves envisions experts within government not simply buying technology but fundamentally rethinking how government can work better when institutions and core government services—from issuing licenses to acquiring defense tools—can be remade through AI.

    “We’re not just talking about slapping technology on top of government. It is going to require a very thorough, deep re-engineering of the processes of how government works, and this is what we’re calling the agentic state—government that has really been redesigned to take advantage of these capabilities that technology now offers us, and to break that down again into something that’s a little bit more specific and analytical,” he said.

    Defense One asked several participants at the summit whether they believed the United States could follow Estonia’s lead. Respondents, who preferred to speak on background, were not optimistic. One of them said that reforming government for the AI age is possible only in an environment where the citizenry has a large degree of trust in their government. The United States, the respondent said, “just does not have that right now.”

    ]]>

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A group of House Democrats is asking Homeland Security Secretary Kristi Noem to explain why the Department of Homeland Security reassigned many of its cybersecurity staff to roles focused on Trump-era immigration and deportation work, as well as how those shifts affect U.S. cyberdefenses.

    The Monday letter — led by Rep. James Walkinshaw, D-Va., and also signed by Reps. Suhas Subramanyam, D-Va., Eugene Vindman, D-Va., and Shontel Brown, D-Ohio, along with Del. Eleanor Holmes Norton, D-D.C. — argues that DHS violated the Antideficiency Act when it reassigned those Cybersecurity and Infrastructure Security Agency staff to roles within Immigration and Customs Enforcement, the Federal Protective Service and Customs and Border Protection.

    The Antideficiency Act prohibits agencies from spending or obligating funding without congressional approval during a government shutdown. Amid the ongoing lapse in federal funding, the moves “raise serious concerns” about the Trump administration’s motives, the lawmakers say in the missive, which was first viewed by Nextgov/FCW.

    “It is difficult to understand how defending the nation’s cyber and physical infrastructure could be viewed as inconsistent with the president’s stated goal of protecting the homeland,” the letter says.

    It also argues recent termination notices issued to staff in CISA’s Stakeholder Engagement and Infrastructure Divisions are “the very teams responsible for coordinating with public and private partners to identify, mitigate and prevent cyberattacks.”

    The lawmakers urge Noem “to immediately reclassify DHS personnel transferred away from CISA back into cyber defense roles.” 

    The reassignments have been occurring over the course of several weeks now. Many, but not all, of the reassignments direct staff to ICE, CBP and FPS, two people familiar with the matter previously said.

    The Trump administration has steered tens of billions of dollars toward DHS immigration and border security agencies as part of a renewed push to expand detention capacity, accelerate deportations and fortify barriers along the U.S. southern border. Several of those detainments have ensnared U.S. citizens and have raised major legal and ethical questions about ICE’s handling of immigration enforcement.

    The Monday letter asks Noem about whether impact assessments were conducted before firings and reassignments, how the cuts square with CISA’s mandate to reduce cyber-infrastructure risks and what concrete mitigations exist to sustain cyberdefenses.

    “Firing or reassigning CISA’s cybersecurity experts in the middle of a shutdown isn’t just wrong — it’s illegal and dangerous,” Walkinshaw told Nextgov/FCW in a statement. “These personnel protect our power grids, hospital networks and water systems from cyber attacks. Diverting them to serve a political agenda puts American lives at risk and violates the very laws meant to protect the public.”

    At any given time, foreign adversaries and criminal hackers could be targeting U.S. networks, including federal agencies that oftentimes possess high value data like national security plans, financial data and internal government communications.

    CISA directed agencies just last week to patch various services offered by application delivery provider F5 after hackers penetrated the company’s systems. The intrusion has been linked to Chinese state-aligned hackers, according to two people familiar with the matter.

    In an interview last month, prior to the ongoing lapse in federal funding, Walkinshaw told Nextgov/FCW that the Antideficiency Act “is very clear that, in a shutdown, the federal government can only do essentially two categories of things: functions that are necessary to preserve life and property, or functions required by the Constitution, fulfilling a constitutional duty.”

    Cybersecurity has been historically a bipartisan matter in Washington, but CISA, the nation’s core civilian cyberdefense agency, has become a recent subject of political scuffles due to its work combatting mis- and disinformation.

    The agency has faced scrutiny from the Trump administration for some time. Top officials have aimed to “refocus” its mission amidst GOP accusations that the agency engaged in censorship of Americans’ free speech. Those claims stem from CISA’s previous collaboration with social media platforms to remove false information online concerning the COVID-19 pandemic, elections and other divisive subjects around 2020.

    DHS did not immediately return a request for comment.

    ]]>

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added five security flaws to its Known Exploited Vulnerabilities (KEV) Catalog, officially confirming a recently disclosed vulnerability impacting Oracle E-Business Suite (EBS) has been weaponized in real-world attacks. The security defect in question is CVE-2025-61884 (CVSS score: 7.5), which has been described as a

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A catastrophic Amazon Web Services (AWS) outage struck on October 20, 2025, bringing down major platforms like Snapchat, Amazon Prime Video, and Canva, and revealing the internet’s dangerous dependence on a single cloud provider. Starting at 12:11 a.m. PDT (12:41 p.m. IST), a DNS resolution failure in AWS’s US-East-1 region in Northern Virginia triggered widespread […]

    The post Massive AWS Outage Halt The Internet – Disrupting Snapchat, Prime Video, Canva, and More appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A new wave of spamware targeting WhatsApp Web users has emerged, as the Socket Threat Research Team revealed the discovery of 131 malicious Chrome extensions actively flooding the Chrome Web Store. These extensions are not conventional malware, but function as high-risk automation tools, systematically violating platform policies to facilitate large-scale spam campaigns, primarily targeting Brazilian […]

    The post 131 Malicious Chrome Extensions Discovered Targeting WhatsApp Users appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Security researchers are tracking a high-severity malware campaign that uses weaponized PDF files to distribute the Winos 4.0 malware. The threat actors impersonate government departments to trick users into opening malicious documents that infect Microsoft Windows machines. The campaign, first observed in early 2025, has since expanded its operations from Taiwan to Japan and Malaysia, […]

    The post Winos 4.0 Malware Uses Weaponized PDFs Posing as Government Departments to Infect Windows Machines appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • China’s top intelligence agency on Sunday accused the U.S. National Security Agency of carrying out a yearslong cyberespionage campaign against Beijing’s national time-service network, among the nation’s most sensitive pieces of digital infrastructure.

    China’s Ministry of State Security said the alleged intrusion began in early 2022 when NSA targeted the National Time Service Center, which keeps and broadcasts China’s standard time, including to telecommunications, finance, transportation, and defense organizations. 

    Investigators allege the hackers deployed 42 “specialized cyberattack weapons” to maintain persistence and extract network data. An overseas phone provider was exploited to gain initial access, China said, without naming the specific company. From there, U.S. cyberspies were able to access staff members’ mobile devices and other timekeeping systems, China further alleged.

    “NSA does not confirm nor deny allegations in the media regarding its operations,” an NSA official told Nextgov/FCW. “Our core focus is countering foreign malign activities persistently targeting American interests, and we will continue to defend against adversaries wishing to threaten us.”

    The NSA is an intelligence agency under the Department of Defense that employs various hacking, codebreaking, and eavesdropping capabilities to gather data on adversaries around the world. 

    In a media statement, the U.S. embassy in Beijing said that China “is the most active and persistent cyber threat to U.S. government, private-sector and critical infrastructure networks.” It did not address the specific accusations.

    The Chinese intelligence agency has not released forensic samples or indicators of compromise related to the National Time Service Center. It said the U.S. has “repeatedly hyped up the ‘China cyber threat’ theory, coercing other countries to hype up so-called ‘Chinese hacker attacks,’ sanctioning Chinese companies and prosecuting Chinese citizens in an effort to confuse the public and distort the truth.”

    The claims illustrate years of ongoing cyber tit-for-tat between Washington and Beijing, advanced nations capable of deploying cyber capabilities against each other at any given time. 

    In recent years, China has breached troves of telecommunications networks and other critical infrastructure systems in the U.S. and around the world. Around a decade ago, documents revealed by former NSA contractor Edward Snowden showed the spy agency had infiltrated the networks of Huawei, a major Chinese telecom operator. In April, Chinese authorities accused the NSA of launching attacks against networks tied to the Asian Winter Games that were held in February.

    ]]>

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Trump denies Tomahawks to Ukraine. Instead of providing the long-range missiles he had dangled before a two-hour Friday meeting with Ukrainian President Volodymyr Zelenskyy, President Donald Trump pushed off a decision and urged both sides to “stop the war immediately.” He later posted online: “They should stop where they are. Let both claim Victory, let History decide!”

    Still, Zelenskyy characterized the meeting as positive, AP reported. “In my opinion, he does not want an escalation with the Russians until he meets with them,” the Ukrainian told reporters. “We share President Trump’s positive outlook if it leads to the end of the war. After many rounds of discussion over more than two hours with him and his team, his message, in my view, is positive — that we stand where we stand on the line of contact, provided all sides understand what is meant.” Some Ukrainians saw the denial as a blow

    Russia’s Vladimir Putin had phoned Trump on Thursday. Among other things, the Washington Post reported, Putin demanded “that Kyiv surrender full control of Donetsk, a strategically vital region in eastern Ukraine, as a condition for ending the war, two senior officials familiar with the conversation.” That “suggests he is not backing away from past demands that have left the conflict in a stalemate, despite Trump’s optimism about securing a deal, the officials said, speaking on the condition of anonymity to describe sensitive closed-door discussions.”

    Putin wants Trump to cede what his forces have been unable to capture. Russian-backed separatists since 2014 and Russia’s military since 2022 have sought to conquer the Donetsk Oblast, a heavily fortified region that includes vital portions of Ukraine’s defense industry. “Russian forces currently have no available means of rapidly enveloping or penetrating the fortress belt, which would likely take several years to seize at their current rate of advance,” the Institute for the Study of War posted on Sunday. “Ceding Donetsk Oblast to Russia would allow Russian forces to avoid a long and bloody struggle and continue fighting into deep rear areas of Ukraine from new positions…”

    Putin initiated the phone call, a move the New York Times called “a telling acknowledgment of a Russian priority as important as any battlefield in Ukraine: appeasing Mr. Trump. Even as Mr. Putin has pounded Ukrainian cities and waged grinding warfare in the country’s east, he has invested dozens of hours into flattering Mr. Trump, dangling the prospect of Russian-American business deals and sending the message that Russia is open to talks to end its invasion. 

    “The tactic has helped Mr. Putin head off repeated deadlines and sanction threats by the American president without curtailing Russia’s war effort.” Read more about Putin’s approach to Trump, here.

    Ukrainian strike closes Russian gas plant. ABC News: “Ukrainian drones struck a major gas processing plant in southern Russia, sparking a fire and forcing it to suspend its intake of gas from Kazakhstan, Russian and Kazakh authorities said Sunday.” The Orenburg plant is one of the largest in the world. “Kyiv has ramped up attacks in recent months on Russian energy facilities it says both fund and directly fuel Moscow’s war effort,” ABC wrote, here.

    Welcome to this Monday edition of The D Brief, a newsletter dedicated to developments affecting the future of U.S. national security, brought to you by Bradley Peniston and Lauren C. Williams. It’s more important than ever to stay informed, so thank you for reading. Share your tips and feedback here. And if you’re not already subscribed, you can do that here. On this day in 1922, Army test pilot Lt. Harold Harris became the first person to bail out of a plane and survive using a parachute.

    Caribbean ops

    7th deadly strike. On Sunday, Defense Secretary Pete Hegseth said Thursday’s strike on a boat in the Caribbean Sea had killed “three male narco-terrorists” on “a vessel affiliated with Ejército de Liberación Nacional (ELN), a Designated Terrorist Organization.” He said the boat was “known by our intelligence to be involved in illicit narcotics smuggling,” but provided no evidence.

    Two people survived the strike, a first for the no-notice strikes on vessels in international waters, which have killed 27. The Trump administration is returning the survivors to their home countries of Colombia and Ecuador, the New York Times reported

    The strikes have caused a rift between the United States and Colombia, which CNN says had “previously been Washington’s most reliable ally in South America on national security and defense.” President Gustavo Petro has complained about the strikes, which he—and many legal experts—have called illegal assaults on his country’s citizens. On Sunday, Trump responded by saying that he would end some form of U.S. aid to Colombia. “The US has provided about $210 million in assistance to Colombia this fiscal year, including about $31 million in agricultural support, according to data from the US Department of State. It was not immediately clear which payments Trump was referring to Sunday,” CNN wrote.

    Gaza

    Sunday violence shakes Gaza ceasefire. Militants in Gaza fired an anti-tank missile at Israeli forces, killing two troops, said Israeli officials, who said they responded with strikes on Hamas targets including field commanders, gunmen, a tunnel, and weapons depots. On Monday, CNN reported that the Israeli strikes had killed at least 44 people. Reuters: “At least one strike hit a former school sheltering displaced people in the area of Nuseirat, residents said.” More, here.

    Both sides subsequently committed to uphold the week-old ceasefire, which each blaming the other for breaking. More from CNN, here.

    The White House rushed mediators to the region, including envoy Steve Witcoff and Trump son-in-law Jared Kushner, and Vice-President JD Vance was to arrive on Tuesday. Reuters reported that they “were expected to push to shore up the truce and then start talks on the next, more difficult, phase of the 20-step plan during their visit.”

    Around the Defense Department

    Army to build $50 million border fence along Arizona military training range. The Army Corps of Engineers began building 15 miles of border fence along the Barry M. Goldwater Training Range in Yuma, Ariz., yesterday, the Army’s civilian installations boss, Defense One’s Meghann Myers reports. The fence will replace existing easily penetrable mesh fencing on the southern border with Mexico, where crossings have forced some shutdowns of pilot and ground crew training. “When incursions occur and illegal border crossers get into that area, the ranges must close,” Jordan Gillis, the assistant Army secretary for energy and installations, told reporters. “That delays the training exercises. It diverts our time and our resources and ultimately impacts readiness.” Read on, here

    Upgraded comms? In more Army news, the service plans to test its next-generation command and control prototype for the second time since awarding the contract in July. The 4th Infantry Division will kick off Ivy Sting 2 at Fort Carson, Colo., where soldiers will test how the system handles deconflicting airspace before firing weapons and other scenarios, Myers reports. “How can we have the commanders doing their updates, doing their planning, but more importantly, how can we then enact that plan and shorten the time it takes to conduct fires?” Zach Kramer, head of Anduril’s mission command office, told Defense One. Here’s the full story.

    ]]>

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶