THE DAILY PRAETORIAN: Cybersecurity Trends – 3/12/25

THE DAILY PRAETORIAN: Cybersecurity Trends – 3/12/25

Image Credit: iStock / Carmen K Sisson | Imagery Disclaimer

Securing Tomorrow: Your Daily Dose of Cyber Safety, Tech Trends, National Defense News, and Inspiration.

“Economic power begets military power.”

 

— Historian Paul Kennedy

I. National Defense: Key developments in national defense, particularly cyber and technological warfare.

  • China’s shipbuilding dominance a national security risk for US: Report

  • China’s dominance in global shipbuilding, now controlling over 50% of the market, has raised economic and national security concerns for the U.S. and its allies, according to a new CSIS report. In 2024 alone, a single Chinese shipbuilder produced more commercial vessels by tonnage than the entire U.S. industry has since WWII. The report warns that China’s state-owned shipbuilding giant, CSSC, benefits from Beijing’s military-civil fusion strategy, using foreign contracts to fund warship production and modernize the Chinese Navy. President Trump has vowed to revive American shipbuilding, proposing tariffs, docking fees on Chinese vessels, and a new White House office for shipbuilding to counteract China’s “dual-use” shipbuilding ecosystem. Click here to read more.

     

II. Tech Trends: Updates on emerging technology trends shaping the digital world.

  • All this bad AI is wrecking a whole generation of gadgets

  • The anticipated AI-driven gadget revolution has failed to materialize as promised, largely because AI assistants like Siri, Alexa, and ChatGPT still aren’t reliable or transformative enough to change how we interact with technology. Tech companies bet big on AI-powered assistants replacing traditional interfaces, envisioning a future where voice commands replace typing and tapping. However, these assistants remain limited, unreliable, and far from game-changing. Meanwhile, the industry’s obsession with AI has led to a stagnation in innovation for hardware and overall gadget quality, leaving consumers without the groundbreaking devices they were promised. Click here to read more.

     

III. Inspiration: Articles centered on faith that offer guidance and reflection.

  • How to break free from perfectionism

  • The world pressures us to be perfect, and as Christians, Matthew 5:48 adds another layer: “Be perfect, therefore, as your Heavenly Father is perfect.” This pursuit can trap us in an exhausting cycle of high expectations, failure, and self-condemnation. However, Scripture reminds us that God never expected us to achieve perfection on our own. Romans 3:23 states that all have sinned, and John 15:5 confirms that apart from Christ, we can do nothing. True transformation comes not through striving but by grace through faith (Ephesians 2:8-9). The Holy Spirit refines us, and Christ’s righteousness completes us (2 Corinthians 5:21). Instead of chasing unattainable standards, we must embrace God’s grace, surrender to His perfection, and allow His Spirit to work through us. Let go of self-reliance, embrace vulnerability, and trust that His power is made perfect in our weakness (2 Corinthians 12:9). Click here to read more.

IV. Cyber Safety: A focus on the latest cybersecurity threats, tips, or breaches impacting individuals and organizations.

  • Massive research into iOS apps uncovers widespread secret leaks, abysmal coding practices

  • A Cybernews investigation into 156,000 iOS apps revealed that 71% of them leak at least one hardcoded secret, including API keys, cloud storage credentials, and even payment processor access, posing major security risks. The study found over 815,000 exposed secrets, with some apps containing unencrypted storage endpoints leaking 406TB of data. High-risk keys, such as Stripe financial keys and JWT authentication tokens, were also discovered, potentially leading to fraud and data breaches. Experts warn that Apple’s App Store review process does not check for such vulnerabilities, making it crucial for developers to remove hardcoded secrets and implement better security measures. Click here to read more.

V. Shield of Israel: Coverage from The Jerusalem Post, providing an Israeli perspective on ongoing conflicts.

  • IDF deploying ‘worm-sized’ spy devices in Gaza to track hostages, future targets – report

  • Israel has ramped up its intelligence-gathering efforts in Gaza, deploying drones to plant espionage devices and collect crucial data on hostages and potential military targets, according to reports from Palestinian terror factions. These drones are allegedly dropping surveillance equipment, including miniature wiretapping devices, in strategic locations such as cemeteries and urban areas. Hamas and other Gaza-based groups claim to have detected and neutralized some of these devices, while also monitoring drop sites for Israeli retrieval attempts. Amid heightened tensions, Hamas has issued new security measures, warning its members and families to avoid sharing sensitive information, particularly as Israel allegedly intensifies intelligence efforts during Ramadan. Click here to read more.

     
THE DAILY PRAETORIAN: Cybersecurity Trends – 3/11/25

THE DAILY PRAETORIAN: Cybersecurity Trends – 3/11/25

Image Credit: U.S. Department of Defense (DoD) / Air Force Capt. Nathan Poblete | Imagery Disclaimer

Securing Tomorrow: Your Daily Dose of Cyber Safety, Tech Trends, National Defense News, and Inspiration.

“Wars may be fought with weapons, but they are won by people. It is the spirit of those people who follow and the people who lead that gains victory.”

 

-General George Patton

I. National Defense: Key developments in national defense, particularly cyber and technological warfare.

  • You Don’t Need A Kill Switch To Hobble Exported F-35s

  • Despite recent European media speculation, Lockheed Martin and multiple governments have denied that the F-35 has a remote “kill switch,” but the aircraft remains heavily reliant on U.S.-controlled maintenance, logistics, and mission planning systems, meaning any foreign-operated fleet could quickly become non-functional if American support were withdrawn. This concern has resurfaced amid shifting U.S. foreign policy, particularly after President Trump’s decision to cut military aid to Ukraine and questions about NATO commitments, raising fears that future U.S. arms exports to Europe could decline. While most F-35 operators depend on the U.S. for critical software and mission data, Israel is the only country with sovereign control over its fleet, highlighting the geopolitical risks tied to reliance on American-made fighter jets. Click here to read more.
     

II. Tech Trends: Updates on emerging technology trends shaping the digital world.

  • Spain to impose massive fines for not labelling AI-generated content

  • Spain’s government has approved a bill enforcing strict AI transparency rules, imposing fines up to €35 million ($38.2 million) or 7% of global revenue on companies that fail to label AI-generated content, particularly deepfakes. The legislation aligns with the EU’s AI Act, making Spain one of the first European countries to adopt comprehensive AI regulations aimed at preventing misinformation and protecting democracy. The bill also bans subliminal AI techniques that manipulate vulnerable groups and prohibits AI-based biometric classification for risk assessment, though real-time biometric surveillance remains permitted for national security. The newly established AI agency, AESIA, will oversee enforcement, except in cases involving privacy, finance, and elections, which will be handled by respective regulators. Click here to read more.

     

III. Inspiration: Articles centered on faith that offer guidance and reflection.

  • NBA Star Trey Jemison Credits God for His Success and Shares Bible Studies with Fans

  • Los Angeles Lakers player Trey Jemison openly shares his Christian faith, using his platform to inspire others and acknowledge that his talent and success are gifts from God. Despite early struggles in his basketball career, Jemison believes divine intervention has led him to the NBA, crediting his journey to God’s favor. Through Instagram, he engages his followers in Bible studies and discussions on faith, emphasizing that his identity is rooted not in basketball but as a “son of the Most High.” Jemison remains transparent about his spiritual journey, admitting imperfections but striving daily to grow closer to Christ. Click here to read more.

IV. Cyber Safety: A focus on the latest cybersecurity threats, tips, or breaches impacting individuals and organizations.

  • New Ballista IoT Botnet Linked to Italian Threat Actor

  • Cato Networks has uncovered a new IoT botnet, Ballista, which exploits a two-year-old TP-Link Archer router vulnerability (CVE-2023-1389) to compromise devices globally. Linked with moderate confidence to an Italian threat actor, Ballista has targeted organizations in the US, Australia, China, and Mexico, spanning industries like manufacturing, healthcare, and technology. The malware, first detected in January 2025, establishes a TLS-encrypted command-and-control (C2) channel to execute commands, spread malware, and launch DDoS attacks. Attackers have recently switched from using a hardcoded IP address to Tor domains for increased stealth. With over 6,000 exposed devices still vulnerable, the botnet remains an active threat. Click here to read more.

V. Shield of Israel: Coverage from The Jerusalem Post, providing an Israeli perspective on ongoing conflicts.

  • Houthi terrorists vow to resume attacks on Israeli ships after Gaza aid deadline ended

  • Yemen’s Houthi movement has declared an immediate ban on Israeli ships passing through the Red Sea, Bab al-Mandab Strait, Gulf of Aden, and the Arabian Sea, vowing to attack any vessel that violates the restriction. The ban will remain in place until Israel reopens Gaza’s crossings and allows humanitarian aid in, according to Houthi military spokesperson Yahya Saree. The Iran-backed Houthis have previously carried out over 100 naval attacks on commercial ships since November 2023, sinking two vessels and causing global shipping disruptions. The U.S. State Department officially designated the Houthis as a “foreign terrorist organization” on March 4, 2025, following President Trump’s call for the move earlier this year. Click here to read more.

     
THE DAILY PRAETORIAN: Cybersecurity Trends – 3/10/25

THE DAILY PRAETORIAN: Cybersecurity Trends – 3/10/25

Image Credit: U.S. Department of Defense (DoD) / Air Force Master Sgt. Kenneth W. Norman | Imagery Disclaimer

Securing Tomorrow: Your Daily Dose of Cyber Safety, Tech Trends, National Defense News, and Inspiration.

“Flexibility is the key to airpower.”

 

— Gen. Giulio Douhet

I. National Defense: Key developments in national defense, particularly cyber and technological warfare.

  • B-21 Aerial Refueling Demands Further Point To It Being A Stealthy Flying Gas Can

  • The B-21 Raider, the U.S. Air Force’s next-generation stealth bomber, is expected to have significant aerial refueling needs, requiring adjustments in tanker strategy to support its long-range and high-efficiency operations. According to Gen. Randall Reed, the B-21’s requirements will demand higher fuel transfer capabilities, signaling potential changes in the Next-Generation Air-Refueling System (NGAS). The bomber’s stealth features also pose new challenges, as linking up with non-stealthy tankers could compromise its ability to remain undetected. With the Air Force already grappling with aerial refueling shortfalls, the NGAS initiative—which could include stealthy tankers—faces budgetary hurdles alongside other modernization programs like Next-Generation Air Dominance (NGAD). As the B-21 nears operational deployment, decisions on tanker procurement and fleet expansion will be crucial to ensuring its global strike capabilities. Click here to read more.
     

II. Tech Trends: Updates on emerging technology trends shaping the digital world.

  • A $10,000 Mac is challenging $250,000 GPU rigs: should Nvidia be concerned?

  • Apple’s M3 Ultra Mac Studio is making waves in the AI community with its ability to run 600-billion-parameter models locally, offering a 512GB unified memory that rivals high-end Nvidia GPU clusters. With a $10,000 price tag, it provides a cost-effective alternative for AI inference, creative professionals, and developers looking for on-device AI processing. Industry experts believe this move could disrupt demand for cloud-based AI, challenge Nvidia’s grip on the inference market, and drive a shift toward localized AI deployment. Early performance estimates suggest 20-50 tokens per second, making it a serious contender for AI applications. Click here to read more.

     

III. Inspiration: Articles centered on faith that offer guidance and reflection.

  • First of 3 Significant Blood Moons Hits This Week, Landing Directly on Jewish Holiday

  • A series of four major celestial events in the next two years—including three “blood moons”—could hold prophetic significance, particularly for Israel and the Middle East. The first total lunar eclipse will occur on March 14, 2025, coinciding with Purim, the Jewish holiday commemorating deliverance from annihilation in the biblical story of Esther. Another blood moon will appear in September 2025, just before Rosh Hashanah, followed by another Purim blood moon on March 3, 2026. Bible prophecy experts point to historical tetrads (four blood moons in two years) coinciding with major Jewish events, suggesting these may signal global shifts, especially concerning Israel. Could these cosmic signs be divine messages? Click here to read more.

IV. Cyber Safety: A focus on the latest cybersecurity threats, tips, or breaches impacting individuals and organizations.

  • Musk blames X outage on cyberattack

  • Social media platform X, formerly known as Twitter, experienced intermittent outages on Monday, affecting thousands of users. Elon Musk attributed the disruption to an unusually powerful cyberattack, suggesting that either a large coordinated group or a nation-state was responsible. While Musk later pointed to IP addresses from the Ukraine region, cybersecurity experts pushed back, noting that most rogue traffic originated from the U.S., Vietnam, and Brazil. The attack, a denial-of-service (DoS) operation, overwhelmed X’s infrastructure but is difficult to trace to specific perpetrators. This comes as Musk, a close adviser to President Trump, continues to criticize Ukraine’s war efforts while maintaining the country’s access to Starlink satellite services. Click here to read more.

V. Shield of Israel: Coverage from The Jerusalem Post, providing an Israeli perspective on ongoing conflicts.

  • Israel’s new status will be defending non-Islamist minorities in the Middle East – opinion

  • Israeli Prime Minister Benjamin Netanyahu and Defense Minister Israel Katz have warned Syria against harming the Druze minority, signaling Israel’s willingness to defend persecuted groups in the region. Their statement follows reports of violence in Jaramana, a Druze village near Damascus, reinforcing Israel’s potential shift toward a broader regional strategy that supports non-Arab and non-Islamist minorities. Analysts suggest this move aligns with the historical Canaanite ideology, which sought alliances beyond traditional Zionism, and could reshape Israel’s geopolitical approach. With rising Christian persecution, Yazidi genocide, and regional instability, Israel may seek new alliances beyond the Abraham Accords, strengthening diplomatic, military, and humanitarian ties. Click here to read more.

     
THE DAILY PRAETORIAN: Cybersecurity Trends – 3/6/25

THE DAILY PRAETORIAN: Cybersecurity Trends – 3/6/25

Image Credit: U.S. Department of Defense (DoD) / Navy Petty Officer 2nd Class Thomas Gooley | Imagery Disclaimer

Securing Tomorrow: Your Daily Dose of Cyber Safety, Tech Trends, National Defense News, and Inspiration.

“Advanced systems can inform us faster and more efficiently, but we must always maintain a human decision in the loop.”

 

— Gen. Anthony Cotton

I. National Defense: Key developments in national defense, particularly cyber and technological warfare.

  • This Is How The Military Wants AI To Help Control America’s Nuclear Arsenal

  • The U.S. Air Force and Space Force are actively exploring the integration of artificial intelligence (AI) into Nuclear Command, Control, and Communications (NC3) to enhance decision-making speed, secure communications, and improve logistics. AI could analyze vast amounts of data, predict maintenance needs, and strengthen cybersecurity, though officials emphasize that humans will always be in control of nuclear strike decisions. Military leaders stress that AI will assist but never replace human decision-making, addressing concerns about automation in nuclear operations. As discussions on AI’s role in national security continue, the Pentagon aims to balance technological advancements with strict human oversight. Click here to read more.
     

II. Tech Trends: Updates on emerging technology trends shaping the digital world.

  • What went wrong with Skype?

  • Once a pioneering VoIP service, Skype was Microsoft’s biggest acquisition in 2011, but mismanagement and poor strategic decisions led to its decline. Despite its dominance in the early 2010s, Skype failed to adapt to mobile trends and was overshadowed by Zoom and Microsoft Teams during the pandemic. Microsoft slowly deprioritized Skype, shutting down offices and shifting focus to newer platforms. Now, Skype is a relic of missed opportunities, fading into obscurity as Microsoft embraces AI and cloud-based communication tools. Click here to read more.

     

III. Inspiration: Articles centered on faith that offer guidance and reflection.

  • Director Jon Erwin Shares the God-Centered Vision behind ‘House of David’

  • Renowned faith-based filmmaker Jon Erwin, known for “I Can Only Imagine” and “Jesus Revolution,” is bringing the story of David to life in the new biblical series “House of David.” Produced by Wonder Project, the series spans multiple seasons and begins with David’s early years, featuring key moments like his anointing by Samuel and his battle with Goliath. Erwin hopes the show will appeal to both faith-based and mainstream audiences, drawing comparisons to “Game of Thrones.” With a strong focus on storytelling, “House of David” aims to inspire viewers to return to the Bible. Click here to read more.

IV. Cyber Safety: A focus on the latest cybersecurity threats, tips, or breaches impacting individuals and organizations.

  • Your mind, hacked: the quantum computing nightmare

  • Quantum computing threatens to unravel privacy as we know it, allowing governments and corporations to manipulate human behavior with unprecedented precision. With its ability to crack encryption instantly, quantum technology could make private chats, financial transactions, and even personal decisions vulnerable to external influence. Experts warn that once privacy is gone, so is free will, as quantum-driven AI could shape political beliefs, consumer choices, and societal narratives without us even realizing it. The race for quantum supremacy is already underway, and whoever gets there first will hold the ultimate power. Click here to read more.

V. Shield of Israel: Coverage from The Jerusalem Post, providing an Israeli perspective on ongoing conflicts.

  • Witkoff: ‘Trump wants Hamas to release Israeli-American Edan Alexander’

  • U.S. President Donald Trump is demanding the release of Israeli-American hostage Edan Alexander as proof that Hamas is serious about negotiations, according to U.S. envoy Steve Witkoff. With reports that Alexander is wounded, Trump has made his release a top priority, warning Hamas that there will be “consequences” if it fails to comply. Witkoff confirmed that a date has been set for a return to fighting, though it remains undisclosed. Meanwhile, the U.S. and Israel are discussing potential joint action against Hamas if hostages are not freed soon. Trump hinted that such action could involve military strikes, emphasizing that someone needs to be “much tougher” on the terror group. The pressure is mounting—will Hamas comply or risk further escalation? Click here to read more.

     
THE DAILY PRAETORIAN: Cybersecurity Trends – 3/5/25

THE DAILY PRAETORIAN: Cybersecurity Trends – 3/5/25

Image Credit: U.S. Department of Defense (DoD) / Navy | Imagery Disclaimer

Securing Tomorrow: Your Daily Dose of Cyber Safety, Tech Trends, National Defense News, and Inspiration.

“Amateurs talk strategy. Professionals talk logistics.”

 

— Gen. Omar Bradley

I. National Defense: Key developments in national defense, particularly cyber and technological warfare.

  • In 15 months, the Navy fired more air defense missiles than it did in the last 30 years

  • The U.S. Navy has expended over $1 billion in interceptors during its most intense combat operations at sea since World War II, primarily defending against Houthi attacks in the Red Sea. Over a 15-month period, Navy warships engaged hundreds of enemy drones and missiles, with ships like the USS Carney experiencing 51 engagements alone. As combat pauses following a ceasefire between Israel and Hamas, the Navy faces a critical munitions shortage, raising concerns about its readiness for a potential conflict with China. Click here to read more.
     

II. Tech Trends: Updates on emerging technology trends shaping the digital world.

  • Google is adding more AI Overviews and a new ‘AI Mode’ to Search

  • Google is doubling down on AI-driven search with the expansion of AI Overviews to more queries and a new experimental “AI Mode” for Google Search. This mode, currently available to Google One AI Premium users, offers chatbot-style responses directly within search, prioritizing AI-generated answers over traditional links. Google insists that AI Overviews are improving user engagement with websites, but concerns remain about how this shift impacts web traffic and content creators. As AI increasingly shapes the search experience, the future of traditional search results is rapidly evolving. Click here to read more.

     

III. Inspiration: Articles centered on faith that offer guidance and reflection.

  • Churches Offer ‘Ash and Dash’ Option to Kick Off Lenten Season

  • Ash Wednesday marks the beginning of Lent, a season of reflection observed by many Christian denominations. Traditionally, believers gather in churches to receive ashes in the shape of a cross on their foreheads, symbolizing human mortality and the need for salvation through Jesus Christ. However, due to modern life’s fast pace, some churches now offer Ash-and-Dash services, allowing people to receive ashes in a drive-through or at metro stations. This approach has been widely embraced, with churches in the U.S. and Canada seeing a strong turnout. Click here to read more.

IV. Cyber Safety: A focus on the latest cybersecurity threats, tips, or breaches impacting individuals and organizations.

  • Dozen China-backed US Treasury hackers indicted by US disrupting years-long cyber campaign

  • The U.S. Department of Justice has indicted 12 Chinese nationals, including two government officers, for a decade-long hacking campaign targeting U.S. critical infrastructure, including the Treasury Department. The hackers, backed by Beijing, stole and sold sensitive data from government agencies, private companies, and non-profits, using malware and zero-day exploits. The U.S. Treasury sanctioned multiple Chinese entities involved, and a $2 million reward has been issued for the arrest of the main suspects, Yin Kecheng and Zhou Shuai. Click here to read more.

V. Shield of Israel: Coverage from The Jerusalem Post, providing an Israeli perspective on ongoing conflicts.

  • ‘This is your last warning!’: Trump gives ultimatum to Hamas

  • President Donald Trump issued a strong warning to Hamas, demanding the immediate release of all hostages and the return of the bodies of those killed, or face severe consequences. In a post on Truth Social and X/Twitter, Trump stated, “Shalom Hamas means Hello and Goodbye – You can choose,” urging the group’s leadership to flee Gaza while they still can. He further pledged full U.S. military support for Israel to “finish the job” if Hamas does not comply. Trump also addressed the people of Gaza, hinting at a potential future for the region but warning that continuing to hold hostages would lead to destruction. Click here to read more.

     

Pin It on Pinterest