logo
Swarmer and SpiderOak Partner to Secure Autonomous Drone Operations in Contested Environments

Swarmer and SpiderOak Partner to Secure Autonomous Drone Operations in Contested Environments

Strategic collaboration delivers zero-trust security and resiliency for military autonomous swarm operations, including those deployed in electronic warfare zones
RESTON, VA / ACCESS Newswire / May 19, 2025 / Swarmer, a leading provider of autonomous drone software, has entered into an agreement with SpiderOak, the leading cybersecurity company powering zero-trust solutions for the tactical edge. As part of the agreement, Swarmer will integrate the SpiderOak platform to provide secure interactions and revocation to its autonomous software platforms. This integration specifically addresses the challenges of securing communications for autonomous fleets operating in contested environments, including electronic warfare zones in Ukraine.
Swarmer's technology enables uncrewed air, sea, and ground vehicles to communicate and coordinate autonomously without human intervention, even when GPS and RF communication are jammed. This allows for adaptive mission execution through coordinated swarm formations - allowing one operator to control hundreds of drones.
The SpiderOak platform provides a unique combination of security controls plus guaranteed eventual delivery designed for autonomous operations at the tactical edge. With SpiderOak, Swarmer's autonomy software can ensure any to any message exchanges in the formation are authenticated, authorized, and encrypted without additional networking controls or certificate management. The low Size, Weight, and Power (SWaP) requirements and decentralized security model eliminate the need for additional infrastructure, making SpiderOak ideal for autonomous operations in challenging environments.
'SpiderOak simplifies how our warfighter replenishes losses in theater ensuring replacements are authenticated and authorized to join the operation, while ensuring that lost and potentially compromised assets are revoked,' said Swarmer's Co-founder and CEO, Sergey Kuprienko.
'Autonomy at the edge brings a new set of security and communication challenges to the digital battlefield, especially with autonomous systems in contested or unreliable environments. Our mesh platform provides zero-trust access control and data exchange without the infrastructure or connectivity overhead that traditional security tools require. We are excited to partner with Swarmer to bring this next generation capability to market,' said Dave Pearah, CEO of SpiderOak.
'As we've seen in contemporary combat, autonomous fleets are significant force multipliers on the modern battlefield-but without robust security, they can become liabilities instead of assets. As missions evolve and new systems are added to the fight, the ability to authorize and authenticate every mission, operator, and data flow in real time will become essential. The integrity, confidentiality, and adaptability of these systems must be baked in from the start. The side that secures its data and controls access dynamically will have a significant competitive advantage,' said Lieutenant General Ken Tovo, U.S. Army (Retired); former Commanding General, US Army Special Operations Command
About Swarmer
Founded in 2023, Swarmer is revolutionizing autonomous UAS operations on the battlefield with a software system that enables drones (and robots) to operate autonomously and work together in large teams. With the team's background in the world's leading tech companies, and with boots on the ground in real conflict zones, Swarmer's mission is to enable individual operators to control hundreds of drones simultaneously - drones of any manufacturer, type, or purpose. Swarmer's technology allows uncrewed vehicles to be interoperable and work together seamlessly. Learn more at getswarmer.com.
About SpiderOak
SpiderOak is a 100% U.S.-owned and operated software company dedicated to solving the computer security challenges of the 21st century. Our technology allows applications to secure all interactions between each other, providing strong assurances of authority and identity and the flexibility to integrate with existing systems, software, and devices beyond centralized cloud services and data centers to the far reaches of the tactical edge. For more information about SpiderOak products, services, or business development opportunities, check us out at www.spideroak.com.
Media Contact
Escalate PR for SpiderOak
[email protected]
SOURCE: SpiderOak
press release
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Russia Is Developing A New Soldier-Worn Counter-Drone Jammer
Russia Is Developing A New Soldier-Worn Counter-Drone Jammer

Forbes

timean hour ago

  • Forbes

Russia Is Developing A New Soldier-Worn Counter-Drone Jammer

Social Media Capture The current phase of the Russia-Ukraine war has been marked by the growing dominance of drones on the battlefield. Earlier in the war, drone strikes were primarily aimed at armored vehicles and other equipment. However, they are now increasingly being used to target individual soldiers. Both sides are rapidly developing new counter-drone solutions that can protect their soldiers, with Ukraine recently introducing counter-drone rifle rounds. Russia is similarly developing counter-drone solutions that can be deployed at the individual soldier level. A recent Russian video posted to social media demonstrates a new soldier-worn electronic warfare system that jams the video feed from small drones. The New Russian Counter-Drone System The video shows a Russian soldier demonstrating the compact drone detection and jamming system. The system includes a head-mounted module with two antennas, a switching harness, an arm-mounted display, and a battery pack. The head-mounted module is attached to the back of the helmet with two antennas protruding from the top. The system detects the drone through its radio signature and then appears to intercept the drone's video feed, which is displayed on the arm-mounted screen. The soldier can then choose to jam the feed, which he does in the demonstration. Social Media Capture This design is unique because most counter-drone systems do not target the video transmissions. Conventional jammers usually focus on control and navigation links, which are easier to disrupt. Radio signals weaken as they travel, so the strength at the receiver is only a fraction of the original transmission. This makes it relatively straightforward to jam a control channel by broadcasting a stronger signal near the receiving end. In contrast, the video feed is transmitted from the drone at high power to ensure that the signal is strong enough to reach the operator, making it far more difficult to overpower with conventional jamming techniques. Russia's approach suggests a focus on precision and efficiency rather than brute-force interference. Instead of flooding multiple frequencies with broadband noise, which requires considerable power and risks interfering with friendly communications, the system uses a more targeted method. Drawing on Russia's long-standing expertise in electronic warfare, it detects the drone passively by sensing its radio emissions, identifies the exact frequency of the video link, and then applies a focused jamming signal. This reduces the power consumption and the size of the system. It also minimizes the system's electromagnetic signature, making it harder for the Ukrainians to detect and target. This design choice is likely influenced by the fact that newer Ukrainian drones incorporate failsafe modes that activate when control or navigation signals are jammed. By blinding the operator through video disruption while leaving control links intact, the system avoids triggering these failsafe modes and creates confusion for the operator. Regardless, this approach has significant limitations. In particular, it does protect Russian soldiers from the increasingly common fiber-optic drones which transmit their video feeds via a tether. Additionally, the system will require frequent updates as Ukrainian drones move to more secure video channels and implement failsafe modes for when the video feed is jammed. Implications Of This New Counter-Drone Jammer On the Broader War Both Russia and Ukraine are racing to counter the growing drone threat, as drones have become responsible for the bulk of the casualties and destruction on the battlefield. This trend is accelerating as the war becomes increasingly dismounted, with units fighting in dense urban environments. In this setting, drones have become fully integrated into offensive and defensive tactics, with both sides using them to locate and target enemy troops. Social Media Capture This reliance on drones has created a stalemate along the front. Any assaulting force is quickly detected and struck by enemy drones, preventing large-scale offensive operations. Therefore, whichever side can better shield its soldiers from drone attacks will gain a clear advantage in cities such as Chasiv Yar and in towns near Kupyansk, Kharkiv City, and Sumy City. If this Russian technology proves effective and can neutralize Ukrainian drones, even for a short period, it could enable substantial gains in these areas, with major implications across the entire front. More broadly, as drone technology has shifted from large strategic platforms to small, agile FPV drones, counter-drone systems are having to evolved as well. Older vehicle-mounted systems were built to defend large areas against long-range strikes. Now, both sides are developing and fielding compact systems designed to protect individual soldiers. If Russia succeeds in deploying this new soldier-worn counter-drone jammer, it could secure a critical edge on the battlefield.

Immersive and Endace Team Up to Deliver Hands-On, Data-Driven Cyber Training for SOC Teams
Immersive and Endace Team Up to Deliver Hands-On, Data-Driven Cyber Training for SOC Teams

Yahoo

time3 hours ago

  • Yahoo

Immersive and Endace Team Up to Deliver Hands-On, Data-Driven Cyber Training for SOC Teams

Collaboration Brings Together Immersive Cyber Exercises and Real-world Packet Forensics to Upskill SOC Teams and Strengthen Cyber Resilience AUCKLAND, New Zealand & BRISTOL, England, July 29, 2025--(BUSINESS WIRE)--Endace, the authority in Packet capture, and Immersive, the leader in people-centric cybersecurity, today announced a technical partnership designed to strengthen cyber readiness and accelerate threat response. By combining Endace's forensic packet capture technology with Immersive's technical exercises and simulations, this collaboration empowers SOC teams to build critical skills, improve investigation speed, and reduce response times. Through this integration, organizations can upskill their security teams in a realistic, controlled environment using the same tools they rely on in live networks. Analysts gain hands-on experience using EndaceProbe for forensic packet analysis and deep network visibility, within minutes of entering a scenario in Immersive's platform, allowing them to practice detecting, analyzing, and responding to real-world threats—something that isn't possible with traditional legacy training. "We're excited to collaborate with Immersive to improve cyber resilience. SOC teams learn rapidly when they can exercise with tools they use daily, against simulated threats that closely represent real-world attacks," said Cary Wright, VP Product Management, Endace. "With EndaceProbes integrated into the Immersive platform, teams can build skills in a safe environment and learn how to hunt for, and combat, even the most serious threats. When faced with a critical cyber situation, individuals can then act swiftly to understand and neutralize threats." Key benefits of the Endace and Immersive partnership include: Build and strengthen cyber readiness with live attack simulations that include packet forensics investigations using always-on EndaceProbe packet capture. Test and validate cyber capabilities under pressure, ensuring teams can detect, respond, and recover effectively. Leverage data-driven insights to prove capabilities, identify and close skill gaps, and continuously improve performance. Improve response efficiency with a workforce skilled in using forensic evidence to resolve threats faster. Learn to maximize EndaceProbe's capabilities through hands-on, gamified labs and real-world threat scenarios. Measure team readiness with performance benchmarks against industry peers to inform cyber resilience strategies. "Realistic, hands-on experience is critical to preparing cyber teams for today's fast-moving threats. By integrating Endace's enterprise-grade packet capture with the Immersive platform, we're removing barriers to working with the tools professionals rely on every day," said Thanos Karpouzis, CTO, Immersive. "This partnership enables organizations to prove and improve their readiness in a true-to-life environment, empowering teams to investigate, respond, and adapt with greater speed and confidence." To learn more, and watch a short demonstration video, click here. About Endace Endace's scalable, always-on packet capture gives Network Operations and Security teams the deep visibility they need for fast, accurate incident investigation with rich forensic evidence at their fingertips from all their tools. EndaceProbes provide enterprise-class packet sniffing in on-prem, public and private cloud environments, with rapid, centralized search and one-click access to full pcap data from leading security and performance solutions (including Microsoft, Palo Alto Networks, Fortinet, Cisco, Splunk, Elastic, and many others). Analyze network traffic using a single, unified console across all on-prem, private, or public cloud infrastructure for total hybrid cloud visibility. Capture every packet. See every threat. About Immersive Immersive, the leader in people-centric cyber resilience, helps your organization continuously prove and improve its ability to prevent and respond to cyber threats. Tailored to individual roles, our approach ensures your organization is always ready for an ever-evolving threat landscape, including the opportunities and challenges posed by AI. With a relentless focus on evidence, Immersive provides unmatched visibility into your cyber resilience. Through a single enterprise platform for individuals, teams, and the entire workforce, we empower your organization to Be Ready for what's next. Immersive is trusted by the world's largest organizations and governments, including Citi, Pfizer, Humana, HSBC, the UK Ministry of Defence, and the UK National Health Service. We are backed by Goldman Sachs Asset Management, Summit Partners, Insight Partners, Citi Ventures, Ten Eleven Ventures, and Menlo Ventures. View source version on Contacts Endace pr@ Mark Evans: +64-21-494 850 (New Zealand / APAC)Kimber Smith-Fidler: +1 775 298 5260 (USA / North America)Leah Jones (The CommsCo): +44 203 697 6680 (UK / EMEA) Immersive Jen Gainesimmersive@

Extortion Evolves: Akamai SOTI Report Examines the Increasing Complexity of Ransomware Attacks
Extortion Evolves: Akamai SOTI Report Examines the Increasing Complexity of Ransomware Attacks

Yahoo

time4 hours ago

  • Yahoo

Extortion Evolves: Akamai SOTI Report Examines the Increasing Complexity of Ransomware Attacks

New report explores the tactics, techniques, and procedures attackers use and the fallout for organizations CAMBRIDGE, Mass., July 29, 2025 /PRNewswire/ -- Akamai Technologies (NASDAQ: AKAM), the cybersecurity and cloud computing company that powers and protects business online, has found that threat actors are using a new quadruple extortion tactic in ransomware campaigns, while double extortion remains the most common approach. According to the new Akamai State of the Internet (SOTI) report, Ransomware Report 2025: Building Resilience Amid a Volatile Threat Landscape, the emerging trend of quadruple extortion includes using distributed denial-of-service (DDoS) attacks to disrupt business operations and harassing third parties — like customers, partners, and media — to increase the pressure on the victim. It builds on double extortion ransomware in which attackers simply encrypt a victim's data and threaten to leak it publicly if the ransom isn't paid. "Ransomware threats today aren't just about encryption anymore," said Steve Winterfeld, Advisory CISO at Akamai. "Attackers are using stolen data, public exposure, and service outages to increase the pressure on victims. These methods are turning cyberattacks into full-blown business crises, and are forcing companies to rethink how they prepare and respond." Other key findings from the report include: GenAI and large language models (LLMs) are helping to increase the frequency and scale of ransomware attacks by making it easier for individuals with less technical expertise to launch sophisticated campaigns. These individuals and groups use LLMs to write ransomware code and improve their social engineering tactics. Hacktivist/ransomware hybrid groups are increasingly using ransomware as a service (RaaS) platforms to amplify their impact, driven by a mix of political, ideological, and financial motives. These groups have evolved from previous hacktivist organizations; for example, Dragon RaaS emerged in 2024 as an offshoot of Stormous, shifting its focus from targeting major corporations to smaller organizations with weaker security. Cryptominers pose their own unique danger, but their goals and the strategies they employ are similar to those of ransomware groups. Akamai researchers found that nearly half the cryptomining attacks they analyzed targeted nonprofit and educational organizations, likely because of a lack of resources within these industries. The TrickBot malware family, used by ransomware groups globally, has extorted more than US$724 million in cryptocurrency from victims since 2016. The Akamai Guardicore Hunt Team recently spotted this malware family linked to four suspicious scheduled tasks on five customers' systems. The report also features an analysis of the current state of legal and regulatory efforts that affect how organizations respond to ransomware. Akamai Vice President and Chief Privacy Officer James A. Casey notes that while existing cybersecurity laws apply to ransomware, specific regulations focus on discouraging ransom payments. He also highlights the importance of robust cybersecurity measures, incident reporting, and risk management, as well as strategies like Zero Trust and microsegmentation, to build resilience against evolving ransomware threats. Casey stresses the necessity for organizations to stay informed and adapt to emerging threats. Read the report to learn more and find out how Akamai uses mitigation techniques to reduce risk and strengthen defenses. About Akamai Akamai is the cybersecurity and cloud computing company that powers and protects business online. Our market-leading security solutions, superior threat intelligence, and global operations team provide defense-in-depth to safeguard enterprise data and applications everywhere. Akamai's full-stack cloud computing solutions deliver performance and affordability on the world's most distributed platform. Global enterprises trust Akamai to provide the industry-leading reliability, scale, and expertise they need to grow their business with confidence. Learn more at and or follow Akamai Technologies on X and LinkedIn. ContactsPublic RelationsAkamaiPR@ Investor Relationsinvrel@ View original content to download multimedia: SOURCE Akamai Technologies Error in retrieving data Sign in to access your portfolio Error in retrieving data Error in retrieving data Error in retrieving data Error in retrieving data

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store