LATEST DRONES NEWS
-
russia Prepares First Yak-130M Batch, Eyes Role Against Ukrainian Long-Range Drones - Defense Express
on April 12, 2026 at 2:02 am
russia Prepares First Yak-130M Batch, Eyes Role Against Ukrainian Long-Range Drones Defense Express
-
FAA, Pentagon OK lasers to shoot down drones along southern border - KABB
on April 12, 2026 at 1:15 am
FAA, Pentagon OK lasers to shoot down drones along southern border KABB
-
FAA, Pentagon OK lasers to shoot down drones along southern border - WOAI
on April 12, 2026 at 1:07 am
FAA, Pentagon OK lasers to shoot down drones along southern border WOAI
-
4Pcs Mini 720 Motors For Syma X5C & M68 RC Drones – Spare Parts With Brass Gear, CW & CCW Motors - ruhrkanal.news
on April 12, 2026 at 12:54 am
4Pcs Mini 720 Motors For Syma X5C & M68 RC Drones – Spare Parts With Brass Gear, CW & CCW Motors ruhrkanal.news
-
Italy Opts For Turkey’s Bayraktar TB3 For First Carrier Launched Drones – Analysis - Eurasia Review
on April 12, 2026 at 12:39 am
Italy Opts For Turkey’s Bayraktar TB3 For First Carrier Launched Drones – Analysis Eurasia Review
-
Pentagon Cites Classified Intelligence In Opposition To DJI’s FCC Petition, Raising The Stakes In Drone Ban Fight
by Haye Kesteloo on April 11, 2026 at 1:43 pm
The Department of Defense filed a memorandum with the Federal Communications Commission opposing DJI’s petition to be removed from the agency’s Covered List, as first reported by Broadband Breakfast on April 7. The filing’s most consequential detail is what it doesn’t fully reveal: according to the DoD’s memo, the national security determination that led to
-
NSU Trains Fort Polk Soldiers on Drone Operations
by Rafael Suárez on April 11, 2026 at 1:28 pm
Northwestern State University’s ARGO Lab just ran its first drone training program for soldiers at Fort Polk, Louisiana. The two-day course took troops from the 3rd Brigade Combat Team, 10th Mountain Division through the fundamentals of UAS operations, flight planning, sensor work, and field maintenance, as reported by National Today. What the Training Covered JD
-
FAA Clears Military to Use Anti-Drone Lasers in U.S. Airspace After Two-Month Standoff
by Haye Kesteloo on April 11, 2026 at 1:26 pm
The Federal Aviation Administration (FAA) gave the U.S. military formal clearance on Friday to use high-energy lasers against suspected drones in U.S. airspace, ending a two-month interagency dispute that twice shut down commercial flight operations over the Texas-Mexico border. FAA administrator Bryan Bedford said in a joint statement with the Defense Department that the agency
-
XDOWN’s STUD Drone Goes From Backpack to Airborne in 2 seconds Flat
by Rafael Suárez on April 10, 2026 at 5:08 pm
US defense startup XDOWN has unveiled the STUD (Small Tactical Unmanned Drone), a hand-launched UAV (Unmanned Aerial Vehicle) designed to reach active flight from a stowed position in two seconds. According to NextGen Defense, a single soldier can carry 8 to 12 units in a standard tactical backpack, launch them by hand, and let the
-
Colorado Springs Drones First on Scene 61% of Calls
by Rafael Suárez on April 10, 2026 at 4:11 pm
The Colorado Springs Police Department (CSPD) is telling the full story of what seven drones stationed across the city are actually doing, and the numbers are hard to argue with. In an interview with KKTV published April 6, 2026, CSPD Sgt. Jeff Edmonds said the drones, part of the department’s Real Time Crime Center Unit,
LATEST LOSS PREVENTION NEWS
-
‘Who do you think you talking to?’: Ross loss prevention worker quits on the spot. Then a customer defends him to his manager - The Mary Sue
on April 11, 2026 at 4:00 pm
‘Who do you think you talking to?’: Ross loss prevention worker quits on the spot. Then a customer defends him to his manager The Mary Sue
-
APAC retailers deploy AI to improve loss prevention Predictive tools shift strategy from reactive shrink control to real-time detection. Retailers across Asia Pacific are accelerating the use of generative AI and automation to improve efficiency and red - Retail Asia
on April 10, 2026 at 8:39 am
APAC retailers deploy AI to improve loss prevention Predictive tools shift strategy from reactive shrink control to real-time detection. Retailers across Asia Pacific are accelerating the use of generative AI and automation to improve efficiency and red Retail Asia
-
The Biggest News in Loss Prevention: April 4 – 10 - Loss Prevention Magazine
on April 10, 2026 at 5:20 am
The Biggest News in Loss Prevention: April 4 – 10 Loss Prevention Magazine
-
Global conflicts and their expanding impact on enterprise security risk - National Retail Federation
on April 8, 2026 at 8:51 pm
Global conflicts and their expanding impact on enterprise security risk National Retail Federation
-
Retailers are spending billions fighting shrink, but are they finally getting smarter about loss prevention? - Retail Gazette
on April 8, 2026 at 2:02 pm
Retailers are spending billions fighting shrink, but are they finally getting smarter about loss prevention? Retail Gazette
-
CONTROLTEK Expands Canadian Team with Appointment of Timothy Beckett as Key Account Manager
by Allie Falk on April 10, 2026 at 1:52 pm
CONTROLTEK has appointed Timothy Beckett as key account manager for Canada to help expand its EAS and RFID business and strengthen customer relationships across the region.
-
Guarding Glamour: Security as Strategy in the World of High Jewelry
by Hank Siemers on April 10, 2026 at 8:58 am
Hank Siemers explains how high jewelry security has evolved into a strategic, intelligence-driven operation that protects people, assets, and brand prestige before, during, and after elite global events.
-
The Biggest News in Loss Prevention: April 4 – 10
by Allie Falk on April 10, 2026 at 5:20 am
Governor Bob Ferguson Vetoes $500K Meant to Fight Retail Theft | Deputies Recover $1M in LEGO Products From Stolen Trailers in Southern CA | Man Accused in Nationwide $350K Home Depot Theft Scheme Arrested
-
Axon Tackles Public Safety’s Data Overload with 3 New AI Tools
by Allie Falk on April 9, 2026 at 1:39 pm
Axon unveils new AI-powered tools to streamline real-time public safety operations, enhance situational awareness, and improve response coordination across video, 911, and reporting workflows.
-
Connecting Sensors, Sources, and Stakeholders: The Rise of Real-Time Fusion Platforms in Loss Prevention Part 1
by Cory Lowe, PhD on April 9, 2026 at 9:12 am
According to the DIKI Model of Intelligence, intelligence is actionable—this is, ultimately, what distinguishes it from other types of knowledge, information, or data.
CYBERSECURITY NEWS
-
‘Who do you think you talking to?’: Ross loss prevention worker quits on the spot. Then a customer defends him to his manager - The Mary Sue
‘Who do you think you talking to?’: Ross loss prevention worker quits on the spot. Then a customer defends him to his manager The Mary Sue
-
APAC retailers deploy AI to improve loss prevention Predictive tools shift strategy from reactive shrink control to real-time detection. Retailers across Asia Pacific are accelerating the use of generative AI and automation to improve efficiency and red - Retail Asia
APAC retailers deploy AI to improve loss prevention Predictive tools shift strategy from reactive shrink control to real-time detection. Retailers across Asia Pacific are accelerating the use of generative AI and automation to improve efficiency and red Retail Asia
-
The Biggest News in Loss Prevention: April 4 – 10 - Loss Prevention Magazine
The Biggest News in Loss Prevention: April 4 – 10 Loss Prevention Magazine
-
Global conflicts and their expanding impact on enterprise security risk - National Retail Federation
Global conflicts and their expanding impact on enterprise security risk National Retail Federation
-
Retailers are spending billions fighting shrink, but are they finally getting smarter about loss prevention? - Retail Gazette
Retailers are spending billions fighting shrink, but are they finally getting smarter about loss prevention? Retail Gazette
-
The Biggest News in Loss Prevention: March 28 – April 3 - Loss Prevention Magazine
The Biggest News in Loss Prevention: March 28 – April 3 Loss Prevention Magazine
-
Computer Vision Is Transforming Retail Loss Prevention - BizTech Magazine
Computer Vision Is Transforming Retail Loss Prevention BizTech Magazine
-
Fighting retail shrink: How smart POS systems turn data into loss prevention - The Community News
Fighting retail shrink: How smart POS systems turn data into loss prevention The Community News
-
WEBINAR Available On-Demand Now: Loss Prevention Around the World - Loss Prevention Magazine
WEBINAR Available On-Demand Now: Loss Prevention Around the World Loss Prevention Magazine
-
8 Retail Anti-Theft Devices: A Loss Prevention Guide (2026) - Shopify
8 Retail Anti-Theft Devices: A Loss Prevention Guide (2026) Shopify
-
The Biggest News in Loss Prevention: March 14 – 20 - Loss Prevention Magazine
The Biggest News in Loss Prevention: March 14 – 20 Loss Prevention Magazine
-
Suppressors and the hidden cost of hearing loss in policing - Police1
Suppressors and the hidden cost of hearing loss in policing Police1
-
Trends to Watch at ISC West for Loss Prevention Leaders - Loss Prevention Magazine
Trends to Watch at ISC West for Loss Prevention Leaders Loss Prevention Magazine
-
Former loss prevention worker serving probation in Nordstrom heist case, records show - WPLG Local 10
Former loss prevention worker serving probation in Nordstrom heist case, records show WPLG Local 10
-
Assessing Home Depot (HD) Valuation After Loss Prevention Headlines And Softer Home Improvement Demand - Yahoo Finance
Assessing Home Depot (HD) Valuation After Loss Prevention Headlines And Softer Home Improvement Demand Yahoo Finance
-
Russia Hacked Routers to Steal Microsoft Office Tokens
by BrianKrebs on April 7, 2026 at 5:02 pm
Hackers linked to Russia's military intelligence units are using known flaws in older Internet routers to mass harvest authentication tokens from Microsoft Office users, security experts warned today. The spying campaign allowed state-backed Russian hackers to quietly siphon authentication tokens from users on more than 18,000 networks without deploying any malicious software or code.
-
Germany Doxes “UNKN,” Head of RU Ransomware Gangs REvil, GandCrab
by BrianKrebs on April 6, 2026 at 2:07 am
An elusive hacker who went by the handle "UNKN" and ran the early Russian ransomware groups GandCrab and REvil now has a name and a face. Authorities in Germany say 31-year-old Russian Daniil Maksimovich Shchukin headed both cybercrime gangs and helped carry out at least 130 acts of computer sabotage and extortion against victims across the country between 2019 and 2021.
-
‘CanisterWorm’ Springs Wiper Attack Targeting Iran
by BrianKrebs on March 23, 2026 at 3:43 pm
A financially motivated data theft and extortion group is attempting to inject itself into the Iran war, unleashing a worm that spreads through poorly secured cloud services and wipes data on infected systems that use Iran's time zone or have Farsi set as the default language.
-
Feds Disrupt IoT Botnets Behind Huge DDoS Attacks
by BrianKrebs on March 20, 2026 at 12:49 am
The U.S. Justice Department joined authorities in Canada and Germany in dismantling the online infrastructure behind four highly disruptive botnets that compromised more than three million hacked Internet of Things (IoT) devices, such as routers and web cameras. The feds say the four botnets -- named Aisuru, Kimwolf, JackSkid and Mossad -- are responsible for a series of recent record-smashing distributed denial-of-service (DDoS) attacks capable of knocking nearly any target offline.
-
Iran-Backed Hackers Claim Wiper Attack on Medtech Firm Stryker
by BrianKrebs on March 11, 2026 at 4:20 pm
A hacktivist group with links to Iran's intelligence agencies is claiming responsibility for a data-wiping attack against Stryker, a global medical technology company based in Michigan. News reports out of Ireland, Stryker's largest hub outside of the United States, said the company sent home more than 5,000 workers there today. Meanwhile, a voicemail message at Stryker's main U.S. headquarters says the company is currently experiencing a building emergency.
-
Hims Breach Exposes the Most Sensitive Kinds of PHI
by Nate Nelson on April 10, 2026 at 8:02 pm
Threat actors breached the telehealth brand, and now they may know who's bald, overweight, and impotent. What could they do with that information?
-
Your Next Breach Will Look Like Business as Usual
by Jeanette Miller-Osborn on April 10, 2026 at 7:21 pm
These are the fundamental detection model shifts cybersecurity teams need to make to keep up with the rising number of credential-based attacks.
-
FINRA Launches Financial Intelligence Fusion Center to Combat Cybersecurity and Fraud Threats
on April 10, 2026 at 3:52 pm
-
Orange Business Reimagines Enterprise Voice Communications With Trust and AI
on April 10, 2026 at 3:05 pm
-
Industrial Controllers Still Vulnerable As Conflicts Move to Cyber
by Robert Lemos on April 10, 2026 at 1:30 pm
The US government warns programmable logic controllers are being targeted, and research turns up 179 vulnerable operational technology (OT) devices.
-
In Other News: Cyberattack Stings Stryker, Windows Zero-Day, China Supercomputer Hack
by SecurityWeek News on April 10, 2026 at 2:44 pm
Other noteworthy stories that might have slipped under the radar: Jones Day hacked, Internet Bug Bounty program paused due to AI, new Mac stealer malware. The post In Other News: Cyberattack Stings Stryker, Windows Zero-Day, China Supercomputer Hack appeared first on SecurityWeek.
-
Juniper Networks Patches Dozens of Junos OS Vulnerabilities
by Ionut Arghire on April 10, 2026 at 1:44 pm
A critical-severity flaw could be exploited remotely, without authentication, to take over a vulnerable device. The post Juniper Networks Patches Dozens of Junos OS Vulnerabilities appeared first on SecurityWeek.
-
Industry Reactions to Iran Hacking ICS in Critical Infrastructure: Feedback Friday
by SecurityWeek News on April 10, 2026 at 12:41 pm
The US government has warned that Iran-linked hackers are manipulating PLCs and SCADA systems to cause disruption. The post Industry Reactions to Iran Hacking ICS in Critical Infrastructure: Feedback Friday appeared first on SecurityWeek.
-
Orthanc DICOM Vulnerabilities Lead to Crashes, RCE
by Ionut Arghire on April 10, 2026 at 11:53 am
Attackers could exploit these vulnerabilities in denial-of-service, information disclosure, and arbitrary code execution attacks. The post Orthanc DICOM Vulnerabilities Lead to Crashes, RCE appeared first on SecurityWeek.
-
Chrome 147 Patches 60 Vulnerabilities, Including Two Critical Flaws Worth $86,000
by Eduard Kovacs on April 10, 2026 at 10:44 am
The critical vulnerabilities affect Chrome’s WebML component and they have been reported by anonymous researchers. The post Chrome 147 Patches 60 Vulnerabilities, Including Two Critical Flaws Worth $86,000 appeared first on SecurityWeek.
-
Critical Marimo pre-auth RCE flaw now under active exploitation
by Bill Toulas on April 12, 2026 at 2:20 pm
A critical pre-authentication remote code execution (RCE) vulnerability in Marimo is now under active exploitation, leveraged for credential theft. [...]
-
Over 20,000 crypto fraud victims identified in international crackdown
by Sergiu Gatlan on April 11, 2026 at 2:20 pm
An international law enforcement action led by the U.K.'s National Crime Agency (NCA) has identified over 20,000 victims of cryptocurrency fraud across Canada, the United Kingdom, and the United States. [...]
-
ChatGPT rolls out new $100 Pro subscription to challenge Claude
by Mayank Parmar on April 11, 2026 at 2:08 am
OpenAI has rolled out a new Pro subscription that costs $100 and is in line with Claude's pricing, which also has a $100 subscription, in addition to the $200 Max monthly plan. [...]
-
Nearly 4,000 US industrial devices exposed to Iranian cyberattacks
by Sergiu Gatlan on April 10, 2026 at 3:52 pm
The attack surface targeted by Iranian-linked hackers in cyberattacks against U.S. critical infrastructure networks includes thousands of Internet-exposed programmable logic controllers (PLCs) manufactured by Rockwell Automation. [...]
-
Analysis of one billion CISA KEV remediation records exposes limits of human-scale security
by Sponsored by Qualys on April 10, 2026 at 2:01 pm
Analysis of 1 billion CISA KEV remediation records reveal a breaking point for human-scale security. Qualys shows most critical flaws are exploited before defenders can patch them. [...]
-
Citizen Lab: Law Enforcement Used Webloc to Track 500 Million Devices via Ad Data
by [email protected] (The Hacker News) on April 11, 2026 at 6:02 am
Hungarian domestic intelligence, the national police in El Salvador, and several U.S. law enforcement and police departments have been attributed to the use of an advertising-based global geolocation surveillance system called Webloc. The tool was developed by Israeli company Cobwebs Technologies and is now sold by its successor Penlink after the two firms merged in July 2023
-
GlassWorm Campaign Uses Zig Dropper to Infect Multiple Developer IDEs
by [email protected] (The Hacker News) on April 10, 2026 at 1:23 pm
Cybersecurity researchers have flagged yet another evolution of the ongoing GlassWorm campaign, which employs a new Zig dropper that's designed to stealthily infect all integrated development environments (IDEs) on a developer's machine. The technique has been discovered in an Open VSX extension named "specstudio.code-wakatime-activity-tracker," which masquerades as WakaTime, a
-
Browser Extensions Are the New AI Consumption Channel That No One Is Talking About
by [email protected] (The Hacker News) on April 10, 2026 at 11:00 am
While much of the discussion on AI security centers around protecting ‘shadow’ AI and GenAI consumption, there's a wide-open window nobody's guarding: AI browser extensions. A new report from LayerX exposes just how deep this blind spot goes, and why AI extensions may be the most dangerous AI threat surface in your network that isn't on anyone's
-
Google Rolls Out DBSC in Chrome 146 to Block Session Theft on Windows
by [email protected] (The Hacker News) on April 10, 2026 at 7:58 am
Google has made Device Bound Session Credentials (DBSC) generally available to all Windows users of its Chrome web browser, months after it began testing the security feature in open beta. The public availability is currently limited to Windows users on Chrome 146, with macOS expansion planned in an upcoming Chrome release. "This project represents a significant
-
Marimo RCE Flaw CVE-2026-39987 Exploited Within 10 Hours of Disclosure
by [email protected] (The Hacker News) on April 10, 2026 at 7:37 am
A critical security vulnerability in Marimo, an open-source Python notebook for data science and analysis, has been exploited within 10 hours of public disclosure, according to findings from Sysdig. The vulnerability in question is CVE-2026-39987 (CVSS score: 9.3), a pre-authenticated remote code execution vulnerability impacting all versions of Marimo prior to and including
SECURITY RESOURCES
- US Dept of Labor (Security Guards)
- Bureau of Security & Investigative Services
- Department of Defense
- SIA (Security Industry Authority)
- Homeland Security
- Security Info Watch
- TSA (Transportation Safety Admin)
- National Crime Agency
- American Security Force Inc.
- Guard Training
- Mobile PRO
- Ecamsecurity
- LiveView Security
