Normal view

Received before yesterday

Asked why we need Golden Dome, the man in charge points to a Hollywood film

9 December 2025 at 10:35

Near the end of the film A House of Dynamite, a fictional American president portrayed by Idris Elba sums up the theory of nuclear deterrence.

“Just being ready is the point, right?” Elba says. “It keeps people in check. Keeps the world straight. If they see how prepared we are, no one starts a nuclear war.”

There’s a lot that goes wrong in the film, namely the collapse of deterrence itself. For more than 60 years, the US military has used its vast arsenal of nuclear weapons, constantly deployed on Navy submarines, at Air Force bomber bases, and in Minuteman missile fields, as a way of saying, “Don’t mess with us.” In the event of a first strike against the United States, an adversary would be assured of an overwhelming nuclear response, giving rise to the concept of mutual assured destruction.

Read full article

Comments

© US Air Force/Senior Airman Clayton Wear

Inside RFK Jr.’s Methodical Quest to Shake Up America’s Vaccine System

The health secretary has walled himself off from government scientists and empowered fellow activists to pursue his vaccine agenda.

© Haiyun Jiang/The New York Times

Robert F. Kennedy Jr., the health secretary, conferring with Hannah Anderson, then one of his top advisers, during a hearing in May.

NSFOCUS Cloud DDoS Protection Service (Cloud DPS) Detected and Mitigated an 800G+ DDoS Attack towards a Critical Infrastructure Operator

16 November 2025 at 22:42

Incident Summary On October 21, 2025, NSFOCUS Cloud DDoS Protection Service (Cloud DPS) detected and mitigated an 800G+ DDoS attack towards a critical infrastructure operator. The target network sustained a multi-vector volumetric DDoS attack peaking at 843.4 Gbps and 73.6 Mpps. The assault combined UDP-based floods (dominant) with amplification and reflection techniques. NSFOCUS Cloud DPS […]

The post NSFOCUS Cloud DDoS Protection Service (Cloud DPS) Detected and Mitigated an 800G+ DDoS Attack towards a Critical Infrastructure Operator appeared first on NSFOCUS, Inc., a global network and cyber security leader, protects enterprises and carriers from advanced cyber attacks..

The post NSFOCUS Cloud DDoS Protection Service (Cloud DPS) Detected and Mitigated an 800G+ DDoS Attack towards a Critical Infrastructure Operator appeared first on Security Boulevard.

Metrics Every CISO Needs for Threat-Led Defense Success

13 November 2025 at 09:30

Security leaders are under increasing pressure to prove that their defenses actually work. Board members and stakeholders want to see measurable progress, yet most metrics available to CISOs today don’t quite fit that need. 

The post Metrics Every CISO Needs for Threat-Led Defense Success appeared first on Security Boulevard.

Operationalizing Threat Intelligence and AI-Powered Cyber Defense

12 November 2025 at 14:38

Sachin Jade, chief product officer at Cyware, discusses the evolving challenge of operationalizing threat intelligence and how AI is redefining the speed and scale of cyber defense. Jade explains that most organizations today struggle to turn intelligence into meaningful action. Despite the massive investment in feeds, dashboards, and frameworks, many security teams still rely on..

The post Operationalizing Threat Intelligence and AI-Powered Cyber Defense appeared first on Security Boulevard.

How Detection Engineers Can Turn Procedures into Actionable Coverage

11 November 2025 at 09:30

Detection engineers are at the core of modern security operations and their success depends on knowing what detections to prioritize and how to measure success. But high-level frameworks and disconnected data streams can leave them without critical guidance. While MITRE ATT&CK standardizes how TTPs are described, it can’t define detection priorities or success criteria without contextual mapping and validation.

The post How Detection Engineers Can Turn Procedures into Actionable Coverage appeared first on Security Boulevard.

Tidal Cyber Launches NARC: The First Automated AI Engine to Extract Adversary Procedures for Threat-Led Defense

3 November 2025 at 08:29

Tidal Cyber is proud to announce the release of NARC AI (Natural Attack Reading and Comprehension), the first AI engine purpose-built to automatically extract adversary procedures and MITRE ATT&CK-aligned threat intelligence from unstructured reporting.

The post Tidal Cyber Launches NARC: The First Automated AI Engine to Extract Adversary Procedures for Threat-Led Defense appeared first on Security Boulevard.

The ROI of Threat-Led Defense: Reducing Waste in the Security Stack

30 October 2025 at 09:00

Security gaps are not the only serious issue CISOs must address. Security overlaps can also cause problems of their own. These overlaps are commonly overlooked, yet they increase operating costs, contribute to alert fatigue, and generate false confidence in coverage.

The post The ROI of Threat-Led Defense: Reducing Waste in the Security Stack appeared first on Security Boulevard.

Daniel Miessler on the AI Attack/Defense Balance

2 October 2025 at 12:19

His conclusion:

Context wins

Basically whoever can see the most about the target, and can hold that picture in their mind the best, will be best at finding the vulnerabilities the fastest and taking advantage of them. Or, as the defender, applying patches or mitigations the fastest.

And if you’re on the inside you know what the applications do. You know what’s important and what isn’t. And you can use all that internal knowledge to fix things­—hopefully before the baddies take advantage.

Summary and prediction

  1. Attackers will have the advantage for 3-5 years. For less-advanced defender teams, this will take much longer.
  2. After that point, AI/SPQA will have the additional internal context to give Defenders the advantage.

LLM tech is nowhere near ready to handle the context of an entire company right now. That’s why this will take 3-5 years for true AI-enabled Blue to become a thing.

And in the meantime, Red will be able to use publicly-available context from OSINT, Recon, etc. to power their attacks.

I agree.

By the way, this is the SPQA architecture.

❌