memoment editorial

173rd Airborne Brigade

US Army Marks First Drone-on-Drone Kill in Historic Training Exercise

In a scene that felt closer to sci-fi than training, Army paratroopers made history with the first drone-on-drone kill. On August 27, the Department of Defense confirmed the milestone, highlighting how quickly the Army is adapting to drone warfare.
The strike occurred earlier this month at the Unmanned Aerial Systems (UAS) and Launched Effects Summit at Fort Rucker, Alabama, where the 173rd Airborne Brigade teamed with the Pennsylvania National Guard and Army engineers.
Chief Warrant Officer 2 Nate Shea, Pennsylvania Army National Guard, piloted a first-person view (FPV) drone fitted with a Claymore mine against a fixed-wing uncrewed aerial system flown by Chief Warrant Officer 2 Andrew Topits of the 173rd.
After lining up behind the target and calling “Arming,” Shea detonated the charge, destroying the aircraft in midair.

US Army Marks First Drone-on-Drone Kill in Historic Training Exercise Read More »

1495px Artist rendering of a Columbia class ballistic missile submarine 2019 190306 N N0101 125 1

Electric Boat Lays Keel for Future USS Wisconsin (SSBN 827)

The keel for the future USS Wisconsin (SSBN 827), the second Columbia-class nuclear-powered ballistic missile submarine, was laid during a ceremony on Aug. 27 at the General Dynamics Electric Boat Quonset Point facility in Kingstown, Rhode Island.

U.S. Navy press release

The keel laying ceremony signifies a major milestone in the life of a ship as it begins to transition from design to reality. The future Wisconsin will be the second Columbia-class submarine, following the future USS District of Columbia (SSBN 826).

“Our ballistic missile submarines are the most survivable leg of our nation’s nuclear triad; they are the ultimate guarantee that no adversary will ever miscalculate America’s resolve,” said Adm. William Houston, Director, Naval Nuclear Propulsion Program, in his keynote remarks. “From this keel, the Wisconsin will rise—an intricate structure of power, precision, and purpose. And just as the keel bears the weight of the ship, this vessel bears the weight of our nation’s most solemn responsibility: to deter war and preserve peace through strength.”

Houston directly addressed the workforce charged with building this intricate submarine. “To our shipbuilders, engineers and suppliers: your craftsmanship makes this possible,” said Houston. “You are laying not just a keel, but the foundation of security for generations to come.”

The submarine’s sponsor is Dr. Kelly Geurts, a retired educator and military spouse. Her husband, the Honorable James Geurts, is a former Assistant Secretary of the Navy for Research, Development and Acquisition.

This is the third Navy ship to bear the name Wisconsin. The original Wisconsin (BB-9), an Illinois-class pre-Dreadnought battleship, was commissioned in 1901 and served as the flagship of the Pacific fleet until 1903. In 1908 the ship joined the Atlantic fleet for the trans-pacific leg of the Great White Fleet and was decommissioned in 1920.

Wisconsin (BB-64), an Iowa-class battleship, was commissioned in April 1944. The ship served in combat in the Pacific, notably at the Philippines, Iwo Jima, Okinawa and the final bombardments in Japan. Wisconsin was decommissioned after World War II and was later recommissioned for the Korean War serving until 1958. The ship was recommissioned once more in 1988 to participate in the Persian Gulf War before being decommissioned a final time, in 1991. The ship now operates as a museum battleship at Nauticus Berthing in Norfolk, Virginia.

The keel laying of future USS Wisconsin (SSBN 827) symbolizes the Navy’s 250-year commitment to innovation and maritime dominance. From seabed to space, the Navy delivers power for peace – always ready to fight and win. This milestone marks the Navy’s enduring legacy and commitment to shaping the future of maritime power.

Columbia-class submarines will replace the U.S. Navy’s Ohio-class ballistic missile submarines. The Navy’s ballistic missile submarines, often referred to as “boomers,” serve as an undetectable launch platform for submarine-launched ballistic missiles. They are designed specifically for stealth and to provide an ensured second-strike capability forming the backbone of the Nation’s strategic deterrence strategy.

Electric Boat Lays Keel for Future USS Wisconsin (SSBN 827) Read More »

James Webb Space Telescope

James Webb Space Telescope Discovery Challenges What We Think We Know About Planet Formation

New James Webb Space Telescope observations present a fresh challenge to long-held ideas about the chemistry of planet-forming disks, revealing a surprisingly high concentration of carbon dioxide in regions that may eventually give rise to Earth-like bodies.
Appearing in Astronomy and Astrophysics, the recent research utilized Webb’s MIRI instrument, a technology at the heart of many recent astronomical advances, to collect what astronomers found to be anomalous new data.
The paper may suggest a new path forward in identifying strange isotopes detected in meteorites from the birth of our own solar system.
Planet Forming Disks
“Unlike most nearby planet-forming disks, where water vapor dominates the inner regions, this disk is surprisingly rich in carbon dioxide,” says lead author Jenny Frediani, PhD student at the Department of Astronomy, Stockholm University. “In fact, water is so scarce in this system that it’s barely detectable — a dramatic contrast to what we typically observe.”
Stars form from clouds of gas that linger around after a stellar birth. These clouds are not finished with creation at that point; instead, plants form as the loose collections of matter pull together. As typically understood, this means that ice-filled pebbles migrate from chilled edges, closer to their star, sublimating their water. 
Human scientific instruments trained on such planet-forming regions pick this up as water vapor signatures emanating from the inner zones. What defies expectations in the new research is the presence of a strong carbon dioxide signature detected by the James Webb Space Telescope, originating from the center of a planet-forming disk rather than the center of the star.
“This challenges current models of disk chemistry and evolution since the high carbon dioxide levels relative to water cannot be easily explained by standard disk evolution processes,” Frediani explains.
James Webb Space Telescope Observations
Adding to the intrigue, the spectrometry results from the James Webb Space Telescope’s MIRI instrument identified that the carbon dioxide present was occurring in rare isotopically variant forms. These observations may answer some lingering questions astronomers have regarding the birth of our solar system. Some comets and meteorites, which can be traced back to the beginnings of our solar system, harbor similarly strange isotopic signatures that have long perplexed researchers.
The area of the cosmos that Webb peered into for this study is designated NGC 6357, located approximately 53 trillion kilometers from Earth. Researchers investigating the disk were part of the eXtreme Ultraviolet Environments (XUE) collaboration, a scientific endeavor that brings together professionals to study how intense radiation fields affect the chemistry of such disks.
Credit: Stockholm University (SU) and María Claudia Ramírez-Tannus, Max Planck Institute for Astronomy (MPIA)
“It reveals how extreme radiation environments—common in massive star-forming regions—can alter the building blocks of planets,” said Maria-Claudia Ramirez-Tannus from the Max Planck Institute for Astronomy in Heidelberg and lead of the XUE collaboration. “Since most stars and likely most planets form in such regions, understanding these effects is essential for grasping the diversity of planetary atmospheres and their habitability potential.”
MIRI Provides New Insight
Since its launch, the James Webb Space Telescope’s MIRI instrument has proven to be a boon for deep space research. Distant objects, such as these dust-filled disks, can now be observed in infrared wavelengths at a level of precision previously unattainable. 

By using this instrument to focus on regions of space where planet formation processes are visible, astronomers are gaining new knowledge of the physical and chemical conditions present through direct observations.
The observations are also enabling comparisons to less active regions, allowing astronomers to discern how environmental diversity impacts the birth and evolution of planetary systems across the universe.
The recent paper, “XUE: The CO_2-rich Terrestrial Planet-forming Region of an Externally Irradiated Herbig Disk,” appeared in Astronomy and Astrophysics on August 29, 2025.
Ryan Whalen covers science and technology for The Debrief. He holds an MA in History and a Master of Library and Information Science with a certificate in Data Science. He can be contacted at ryan@thedebrief.org, and follow him on Twitter @mdntwvlf.

James Webb Space Telescope Discovery Challenges What We Think We Know About Planet Formation Read More »

docusign apple fraud photo 1

Scammers are using DocuSign emails to push Apple Pay fraud

NEWYou can now listen to Fox News articles!
Phishing scams are getting smarter, and one of the latest tricks involves fake DocuSign emails that appear to show charges from major companies like Apple. At first glance, these fraud messages look convincing, often including a receipt, order ID and even a support number. But instead of connecting you to Apple or another legitimate service, that number links you directly to scammers.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.DON’T FALL FOR THIS BANK PHISHING SCAM TRICKAll about the DocuSign & Apple Pay fraudThese phishing emails pretend to be billing receipts for recent Apple Pay purchases. They typically claim that a subscription has been charged to your account and prompt you to call a phone number if you do not recognize the charge. Scammers spoof Apple, Netflix, and other brands to push fake subscription charges posing as DocuSign. (Kurt “CyberGuy” Knutsson)The emails often use well-known brands such as Apple, Netflix, Expedia, or even lawn service companies to make them seem credible. Some also include a “DocuSign” link with a security code, creating the illusion that you need to access a file to confirm the transaction.In reality, neither Apple nor these other companies sends billing receipts through DocuSign. That detail alone is a red flag. Another telltale sign is the sender’s address. It may contain odd characters, such as a Cyrillic “B” replacing the “B” in “Billing,” which helps scammers bypass spam filters.AMAZON ALERTS CUSTOMERS ABOUT IMPERSONATION SCAMSHow the DocuSign scam worksThe scam aims to catch you off guard and pressure you into acting fast. The email claims your Apple Pay account has been charged for a subscription or purchase. It includes an order ID, a charge amount, and a DocuSign link that supposedly holds a receipt or confirmation file. To make it look even more convincing, some versions add a security code to “unlock” the document.The message also lists a phone number and urges you to call if the charge was not authorized. That number is the core of the scam. Instead of reaching Apple, Netflix or whichever company the email pretends to represent, you end up speaking with a scammer posing as a support agent.Once you’re on the call, the scammer tries to convince you that your account has been compromised or that the payment must be reversed right away. From there, the tactics vary. They might ask for your Apple ID, banking details, or card numbers. They may pressure you to download remote access software so they can “fix” the issue on your device. In some cases, they demand payment for fake account protection or reversal fees. DocuSign scam uses fake receipts and urgent language to steal personal information from users. (Kurt “Cyberguy” Knutsson)The end goal is always the same: gain enough access to lock you out of your accounts, steal sensitive data, or initiate fraudulent transactions. What makes these scams dangerous is how they combine multiple red flags in one message: a realistic-looking receipt, official logos, a DocuSign link, urgent language, and a phone number that appears to be the quickest way to resolve the issue.HOW TO TELL IF A LOGIN ALERT IS REAL OR A SCAM5 ways to stay safe from the DocuSign scamScammers rely on people reacting quickly without questioning the details. The good news is that there are simple steps you can take to protect yourself. Here are five practical ways to stay safe.1) Inspect the sender address carefullyScammers often use email addresses that look close to official ones but contain subtle differences, such as extra letters or swapped characters. If the email does not come from an official domain like @apple.com, it is not legitimate. Fraudulent billing emails claim Apple Pay charges and link victims to fake support lines using DocuSign. (Kurt “CyberGuy” Knutsson) 2) Know how companies send receiptsApple, Netflix, and other major services do not send billing statements through DocuSign. If a receipt shows up in this format, you can safely assume it is a scam. Real receipts always come directly from the service provider itself.3) Watch out for phishing links and use strong antivirus softwareBe cautious with any links in suspicious emails. Scammers often mask harmful links behind text that looks legitimate, such as “View Document” or “Review Payment.” Hover over the link without clicking to see the real web address. If it does not match the official company domain, do not click.The best way to safeguard yourself from malicious links is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at CyberGuy.com.4) Double-check your transaction historyInstead of trusting the email, confirm whether a charge actually exists. Apple users can review purchases directly from the Settings app under their Apple ID. If nothing shows up, the receipt is fake. Other services have similar ways to check history.5) Delete personal data from the internetThe less information scammers can find about you online, the harder it is for them to craft convincing attacks. Consider removing old accounts you no longer use, limit the personal details you share publicly on social media, and use data removal services when possible. This reduces the risk of your name, email, or phone number being targeted in scams like this.While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice.  They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites.  It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet.  By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.CLICK HERE TO GET THE FOX NEWS APPKurt’s key takeawayPhishing scams are constantly evolving, and the DocuSign Apple Pay ruse is just one of many. The best defense is a healthy dose of skepticism. If something feels off, stop, double-check, and confirm directly through official channels. Scammers rely on panic and quick reactions. By slowing down and verifying details, you can protect yourself from falling into their trap.Should email providers step up their filters so fewer of these messages slip through? Let us know by writing to us at Cyberguy.com.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM.Copyright 2025 CyberGuy.com.  All rights reserved. 

Scammers are using DocuSign emails to push Apple Pay fraud Read More »

Paratrooper Departure

Today in History: August 30, America’s Final Departure from Afghanistan

On August 30, 2021, the United States closed the chapter on its longest war. Under the cover of night, the last US Air Force transport planes lifted off from Kabul’s Hamid Karzai International Airport. Onboard were the final contingent of American troops guarding the evacuation effort.
For the first time in 20 years, Afghanistan was left without a US military presence. Minutes after the planes disappeared into the night sky, Taliban fighters fired into the air in celebration, declaring victory after a two-decade insurgency.
This final moment came after weeks of stunning and rapid developments. In early August, the Taliban began a lightning offensive across Afghanistan, seizing provincial capitals at an astonishing pace.
Afghan government forces, trained and supported by the United States and NATO, collapsed in a matter of days. By August 15, Taliban fighters entered Kabul without significant resistance. Afghan President Ashraf Ghani fled the country, leaving a vacuum that signaled the end of the US-backed government.

Today in History: August 30, America’s Final Departure from Afghanistan Read More »

raft 2

Fox News AI Newsletter: Fighter pilots take directions from AI

NEWYou can now listen to Fox News articles!
Welcome to Fox News’ Artificial Intelligence newsletter with the latest AI technology advancements.IN TODAY’S NEWSLETTER:- Fighter pilots take directions from AI in Pentagon’s groundbreaking test- Google Pixel 10 event brings new phones, smartwatch, earbuds and AI- Elon Musk’s xAI sues Apple, OpenAI over AI competition and App Store rankings Image of Starsage’s battle manager system  (Raft AI )MACHINE WINGMAN: For the first time, U.S. fighter pilots took direction from an AI “air battle manager” in a Pentagon test that could change how wars are fought in the skies.STAR-POWERED TECH: Google kicked off its Made by Google event last week with blockbuster energy. Jimmy Fallon played host, bringing humor and star presence. Steph Curry highlighted how the Pixel 10 empowers creators and athletes to capture and share their stories. Lando Norris, fresh from the F1 circuit, showed off how Pixel’s speed and AI enhancements fit into fast-paced lives. And the Jonas Brothers premiered a music video filmed entirely on the new Pixel 10 Pro, proving the phone’s camera is ready for professional-grade production.TECH THROWDOWN: Billionaire entrepreneur Elon Musk’s artificial intelligence startup xAI sued Apple and ChatGPT maker OpenAI in U.S. federal court in Texas on Monday, accusing them of illegally conspiring to thwart competition for artificial intelligence. Visitors walk in front of the Meta (Facebook) sign at its headquarters in Menlo Park, California, United States on December 29, 2022.  ((Photo by Tayfun Coskun/Anadolu Agency via Getty Images))BIG MONEY MOVE: Meta Platforms, Inc., the parent company of Facebook and Instagram, is launching a new political action committee to back candidates in California who support pro-artificial intelligence policies and oppose strict regulation.RISING CONCERNS: Artificial intelligence is developing rapidly. While some are embracing it, others are warning of the potential threats. But both sides agree the technology is changing how the world operates.TECH SPOTTER: A missing hiker’s dead body was finally found in July in Italy’s rugged Piedmont region after 10 months. The recovery team credited the breakthrough to an AI-powered drone that spotted a critical clue within hours. The same process would have taken weeks or even months if done by the human eye. Will Smith performs onstage during a concert at Cardiff Castle on Aug. 25, 2025, in Cardiff, Wales. (Maxine Howell)FAKE CROWD FRENZY: Will Smith is facing accusations of using artificial intelligence to create a crowd in a video shared online.TECH DEAL: Nvidia CEO Jensen Huang told FOX Business on Thursday that he is in talks with the Trump administration about selling its powerful Blackwell chip to China, saying how the global adoption of American tech could help the U.S. win the AI race.EVOLVING ROLES: Right now, many people are worried that artificial intelligence is coming for their jobs. If you’re one of them, then the recent study by Microsoft will shed some light on how AI’s generative capabilities will impact your field of work. In short, some occupations are more susceptible to its influence than others.Subscribe now to get the Fox News Artificial Intelligence Newsletter in your inbox.FOLLOW FOX NEWS ON SOCIAL MEDIAFacebookInstagramYouTubeTwitterLinkedInSIGN UP FOR OUR OTHER NEWSLETTERSFox News FirstFox News OpinionFox News LifestyleFox News HealthDOWNLOAD OUR APPSFox NewsFox BusinessFox WeatherFox SportsTubiWATCH FOX NEWS ONLINEFox News GoSTREAM FOX NATIONFox NationStay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox News here.

Fox News AI Newsletter: Fighter pilots take directions from AI Read More »

wall street 1152x648 1

Texas suit alleging anti-coal “cartel” of top Wall Street firms could reshape ESG

This article originally appeared on Inside Climate News, a nonprofit, non-partisan news organization that covers climate, energy, and the environment. Sign up for their newsletter here.
Since 2022, Republican lawmakers in Congress and state attorneys general have sent letters to major banks, pension funds, asset managers, accounting firms, companies, nonprofits, and business alliances, putting them on notice for potential antitrust violations and seeking information as part of the Republican pushback against “environmental, social and governance” efforts such as corporate climate commitments.
“This caused a lot of turmoil and stress obviously across the whole ecosystem,” said Denise Hearn, a senior fellow at the Columbia Center on Sustainable Investment. “But everyone wondered, ‘OK, when are they actually going to drop a lawsuit?’”
That came in November, filed by Texas Attorney General Ken Paxton and 10 other Republican AGs, accusing three of the biggest asset managers on Wall Street—BlackRock, Vanguard and State Street—of running “an investment cartel” to depress the output of coal and boosting their revenues while pushing up energy costs for Americans. The Trump administration’s Department of Justice and Federal Trade Commission filed a supporting brief in May.
The overall pressure campaign aimed at what’s known as “ESG” is having an impact.
“Over the past several months, through this [lawsuit] and other things, letters from elected officials, state and federal, there has been a chilling effect of what investors are saying,” said Steven Maze Rothstein, chief program officer of Ceres, a nonprofit that advocates for more sustainable business practices and was among the earliest letter recipients. Still, “investors understand that Mother Nature doesn’t know who’s elected governor, attorney general, president.”
Earlier this month, a US District Court judge in Tyler, Texas, declined to dismiss the lawsuit against the three asset managers, though he did dismiss three of the 21 counts. The judge was not making a final decision in the case, only that there was enough evidence to go to trial.

Texas suit alleging anti-coal “cartel” of top Wall Street firms could reshape ESG Read More »

american man at computer

Farmers Insurance data breach exposes 1.1M Americans

NEWYou can now listen to Fox News articles!
Data breaches are no longer just a problem for the tech industry. They’ve become a constant across every sector, from airlines to banks to fashion brands, exposing personal data and leaving customers worried about where their information might end up. Insurance companies, sitting on mountains of sensitive details, are no exception. The latest to join the list is Farmers Insurance. The U.S. insurer confirmed that more than 1.1 million customers were affected in a breach linked to the Salesforce attacks that have swept through major organizations this year, stealing customer databases and fueling a growing wave of extortion attempts.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER DIOR DATA BREACH EXPOSES US CUSTOMERS’ PERSONAL INFORMATIONWhat you need to know about the Farmers Insurance breachFarmers Insurance has confirmed a data breach impacting more than 1.1 million customers. The incident is tied to the ongoing wave of Salesforce-related cyberattacks that have hit major companies this year.In a notice published on its website, the U.S. insurance giant said the breach occurred on May 29, 2025, through one of its third-party vendors. Farmers serves over 10 million households nationwide. It offers auto, home, life, and business insurance through a vast network of agents and subsidiaries.”On May 30, 2025, one of Farmers’ third-party vendors alerted Farmers to suspicious activity involving an unauthorized actor accessing one of the vendor’s databases containing Farmers’ customer information,” the company wrote in its advisory. Farmers Insurance confirmed that more than 1.1 million customers were affected in a breach linked to the Salesforce attacks that have swept through major organizations this year. (Kindamorphic/Getty Images)According to the company, the vendor’s monitoring tools detected the intrusion quickly, allowing containment measures to be taken. Farmers said it immediately launched an investigation, notified law enforcement, and worked to determine the scope of the breach.The investigation revealed that the stolen data included customer names, addresses, dates of birth, and driver’s license numbers. In some cases, the last four digits of Social Security numbers. Farmers began notifying affected individuals on Aug. 22, with a filing to the Maine Attorney General’s Office confirming that 1,111,386 customers were impacted.While Farmers did not publicly name the vendor involved, reports indicate that the breach is part of the larger Salesforce data theft campaign carried out by threat actors this year.ALLIANZ LIFE INSURANCE DATA BREACH EXPOSES 1.4 MILLION AMERICANSThe Salesforce data theft campaignThe Salesforce attacks have been ongoing since early 2025. Researchers attributed them to a threat actor cluster tracked as UNC6040/UNC6240. The intrusions typically begin with voice phishing (vishing) calls, where employees are tricked into approving a malicious OAuth application linked to their company’s Salesforce instance.Once connected, attackers siphon customer relationship management (CRM) databases and use the stolen data in extortion attempts. The cybercrime group ShinyHunters has claimed responsibility, according to BleepingComputer. The group claims that the attacks involve overlapping threat groups, including members of the notorious Scattered Spider gang. Hackers exploited a third-party vendor tied to Salesforce systems to steal 1.1 million Farmers Insurance customer data. (Kurt “CyberGuy” Knutsson)”Like we have said repeatedly already, ShinyHunters and Scattered Spider are one and the same,” a representative told the publication. “They provide us with initial access, and we conduct the dump and exfiltration of the Salesforce CRM instances. Just like we did with Snowflake.”The Salesforce campaign has affected a growing list of high-profile companies, including Google, Cisco, Workday, Adidas, Qantas, Allianz Life and luxury brands under LVMH such as Louis Vuitton, Dior, and Tiffany & Co.GOOGLE CONFIRMS DATA STOLEN IN BREACH BY KNOWN HACKER GROUPFarmers Insurance responseIn response to CyberGuy’s inquiry, a Farmers Insurance spokesperson shared the following statement:”At Farmers, protecting our customers’ information is our top priority. We recently discovered that an unauthorized third party briefly accessed a vendor’s system that contained some Farmers’ customer information. The incident involved only limited information from certain customers. An investigation-conducted with both internal and external security experts-found no evidence that the exposed data has been misused, nor any indication that Farmers’ own systems were compromised. We are contacting affected individuals directly and are providing support resources, including complimentary credit monitoring.”8 ways you can stay safe after a data breachIf your personal information has been exposed in the Farmers data breach, take the steps below immediately to limit the damage, protect your identity, and prevent future fraud. Farmers Insurance said it began notifying more than 1 million affected policyholders after detecting unauthorized access to customer records in a data breach. (Kurt “CyberGuy” Knutsson)1) Invest in a data removal serviceYou can’t undo the damage once hackers have accessed your data. However, you can limit the fallout by investing in a data removal service. While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice.  They aren’t cheap, and neither is your privacy.  These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites.  It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet.  By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.2) Use identity theft protection servicesYour Social Security number or other sensitive data may have been exposed in the data breach. Identity Theft companies can monitor personal information, such as your Social Security Number (SSN), phone number, and email address, and alert you if it is being sold on the dark web or used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com.3) Enable two-factor authentication (2FA)Turn on 2FA for your email, banking, and insurance logins. Even if a hacker has your password, 2FA requires a second verification step, like a code sent to your phone, making unauthorized access much harder.4) Be wary of phishing and follow-up scamsAfter a data breach, attackers often follow up with phishing emails or phone calls. They pretend to be from your insurance company or a support service. Don’t click on links in unsolicited messages, and verify any claims through official channels before responding. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com.5) Freeze your credit right awayPut a credit freeze on your files with Equifax, Experian and TransUnion. This stops criminals from opening new accounts in your name. It’s free, easy to set up, and you can lift the freeze temporarily when needed.6) Update your passwords nowChange your passwords for all important accounts. Start with email, financial, and health-related logins. Use strong, unique passwords for each account. Consider using a password manager, which securely stores and generates complex passwords, reducing the risk of password reuse.Next, see if your email has been exposed in past breaches. Our #1 password manager (see Cyberguy.com) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. Check out the best expert-reviewed password managers of 2025 at Cyberguy.com.7) Check your accounts for strange activityLook for any signs of identity misuse, like:Unknown chargesLogins from unfamiliar devicesNew accounts or lines of credit you didn’t openEarly detection makes a big difference.8) Report identity theft fastIf someone is misusing your identity, go to IdentityTheft.gov. This government site provides step-by-step help and generates the letters and reports you’ll need to stop the fraud.CLICK HERE TO GET THE FOX NEWS APPKurt’s key takeawayData breaches keep hitting companies we trust, and Farmers Insurance is the latest reminder. Even when the stolen data hasn’t been misused yet, the risk lingers long after the headlines fade. That’s why it’s so important to stay alert, protect your identity, and take simple steps now. By acting today, you put yourself in control, not the hackers.Do incidents like this make you reconsider which companies you do business with? Let us know by writing to us at Cyberguy.com.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.Copyright 2025 CyberGuy.com.  All rights reserved. 

Farmers Insurance data breach exposes 1.1M Americans Read More »

Screenshot 2025 01 22 130905 1024x539 1

Patriot Missile System Paired With Littoral Combat Ship in Test

A Lockheed Martin test this week paired an M903 Patriot launcher with the Independence-class Littoral Combat Ship USS Montgomery (LCS 8) in a demonstration to showcase expeditionary air defense concepts that can be provided to ships at sea.

The M903 is the second type of missile launcher tested and integrated into the Littoral Combat Ship (LCS) platform. Lockheed’s integration and testing efforts for the Patriot follows the Mark 70 Payload Delivery System which can deliver traditional Standard Missile variants to the LCS platform to perform ballistic missile defense and extended range anti-air warfare with SM-3 and SM-6.

Lockheed Martin previously tested the Mark 70 PDS on LCS-class ships, with former Secretary of the Navy Carlos Del Toro asserting that “LCS is back” with the new lethality it brings to the class. The launcher, also developed by Lockheed Martin, adds Mk 41 VLS capability to the flight deck of selected LCS.

Lockheed Martin spent the week aboard Montgomery demonstrating expeditionary IAMD capabilities and concepts that could be employed, aimed towards a notional fight in the Pacific as the U.S. faces down against an increasingly hostile and armed China. Rapidly proliferating missile systems fielded in the Pacific pose a threat to lightly armed littoral combat ships that would be deployed in the region.

The Mk70 Payload Delivery System, a containerized variant of the Mk 41 vertical launching system, was present on USS Nantucket (LCS 27) during its commissioning ceremony in Nov. Screenshot from U.S. Navy video

Patriot launchers, armed with PAC-3 MSE missiles, would give the LCS another option for high-end missile defense. The PAC-3 MSE is already a capability being pursued by the U.S. Navy for its combat-proven capability and mature production line, with initial units set for purchase in FY2026 for testing evaluations. It is expected to be integrated into the Mk 41 VLS cells used across the fleet/

Naval News recently covered the U.S. Navy’s interest in PAC-3 MSE at the Surface Navy Association’s National Symposium, with coverage of the first PAC-3 MSE VLS test fire here.

A M903 Patriot missile launcher sits on the flight deck of USS Montgomery (LCS 8) while in its home port of San Diego, California. The battery is equipped with eight PAC-3 MSE missiles. (Lockheed Martin photo)

The addition of ‘traditional’ Patriot launchers for the PAC-3 MSE would give the LCS classes a proven and out-of-the-box solution for the extremely high-end missile defense requirement that stretches into the hypersonic air-breathing threat regime. Experience in Ukraine and the Red Sea has helped draw conclusions, recommendations, and changes for the fleet’s missile defense capabilities, including a new ESSM Block III variant which the Sea Sparrow Office began inquiries for this week.

Placing land-based air defense systems on surface vessels is something the Russian Navy has been doing in an attempt to increase the protection of their corvettes from Ukrainian threats in the Black Sea. One year ago, a Karakurt-class corvette belonging to the Russian Baltic Fleet was also spotted with a Tor-M2KM air defense system placed on its helicopter deck.

One former Lockheed Martin official claimed the capability shown on Montgomery was fielded as an operational asset, but Naval News was unable to verify their claims. The pairing between Patriot and the Montgomery could represent a new expeditionary air defense capability for littoral waters around the Philippines.

A highly mobile Patriot battery, exploiting the high speed characteristics of the Independence-class, could be used to follow aircraft that disperse throughout the region to various austere bases, offering a high-end air and missile defense capability to those bases quicker than driving through the less developed and potentially contested roadways in rural areas of the Philippines.

Naval News has reached out to both Lockheed Martin and the U.S. Navy for further comments on the test event.

LCS firepower enhancements and magazine depth for surface combatants are two major driving efforts for the U.S. Navy as the class takes on minesweeping, minelaying, anti-surface warfare, anti-submarine warfare, and now, with PAC-3 MSE and Mk 41 VLS containers, fleet defense missions as well. Additional experimentation and weapon integration into both LCS subclasses is will continue as the service shifts towards more heavily armed combatants for high-end combat.

Patriot Missile System Paired With Littoral Combat Ship in Test Read More »

Australia lays keel of 6th and final Arafura class OPV

Australia lays keel of 6th and final Arafura-class OPV

A ceremony was held August 29 to mark the laying of the keel of Arafura-class Offshore Patrol Vessel (OPV) 6, NUSHIP Carpentaria at Civmec in Henderson, Western Australia. The vessel is the final Arafura-class OPV under construction for the Royal Australian Navy.

Australian DoD press release

Rear Admiral Michael Houghton, Head of Patrol Boats and Specialist Ships represented the ceremony, honouring tradition by positioning a coin under the keel of NUSHIP Carpentaria.

“A keel laying ceremony which marks the beginning of a ship’s construction, is an important naval tradition which is believed to bring good luck for the vessel’s build and life at sea,” Rear Admiral Michael Houghton said.

“The OPV program is a major contributor to continuous naval shipbuilding in Australia, which creates and sustains local jobs and harnesses our national defence industry’s local talent and technology. 

“Defence investment in a sovereign Naval Shipbuilding and Sustainment Enterprise is expected to support around 8,500 jobs in shipbuilding and sustainment by 2030.

“OPVs help patrol and secure Australia’s maritime border alongside the Evolved Cape Class patrol boats. They also play an important role in Navy’s commitment to supporting the long-term objectives of the National Defence Strategy.”

The first two vessels were constructed at the Osborne Naval Shipyard in South Australia with the remaining four are currently under construction at the Henderson Maritime Precinct. The first ship, HMAS Arafura, was commissioned into service on 28 June 2025 with the second OPV, NUSHIP Eyre, expected to be delivered later this year. 

The OPVs are a more versatile platform compared with previous classes of patrol vessels. They are able to operate over longer distances and can be reconfigured to perform a number of tasks and roles originally carried out by several different classes of vessels.

-End-

Naval News comments: About Arafura-class OPV

As Naval News has previously reported, procurement of Arafura experienced significant delays and revisions. The effort, dubbed SEA 1180 saw specification changes over integration issues such as the desired main gun. The current Albanese government also cut overall procurement from twelve to six vessels. Canberra now deems the design insufficient to new requirements of the Australian Navy for more robustly armed and survivable combatants.

Nevertheless the Australian Navy arguably requires more hulls for the active and ageing fleet. RAN is pushed to maintain persistent patrols across extensive Australian territorial waters and its exclusive economic zone (EEZ). In an event receiving significant local attention, the Chinese Navy (PLAN) in earlier this year conducted a circumnavigation of Australia. The operation, including a live fire-drill, illustrates a trend of increasing naval activity near Australian waters. Such events create an increasing demand for maritime awareness with both Australia and News Zealand. Additionally the primary Australian security partner, the United States, continues to place more emphasis on burden-sharing, including in the maritime domain.

Specifications:

Length: 80 m

Beam: 13 m

Draught: 4 m

Speed: 20 knots (maximum)

Range: 7,400 kilometres

Displacement: approx. 1,640 t

Crew: 40 crew with accommodation for up to 60 personnel

Armament: 40mm gun / 2 x 50 calibre machine guns

Australia lays keel of 6th and final Arafura-class OPV Read More »