French naval officer’s jogging app logs Inadvertently expose France’s aircraft carrier location


The relentless pursuit of a personal best is a common motivator for athletes, but for one French naval officer, a routine morning run has now been linked to a national security scare.

While the French military typically prides itself on stealth and strategic positioning, the precise coordinates of its flagship were recently broadcast worldwide via a fitness app. The incident occurred when an officer, identified in the logs as Arthur, recorded a high-speed jog on the deck of the Charles de Gaulle. By failing to turn off his Strava GPS tracking, he effectively turned the nuclear-powered vessel into a digital beacon in the Mediterranean.

Read more…
Source:  International Business Times News


Sign up for the Cyber Security Review Newsletter
The latest cyber security news and insights delivered right to your inbox


Related:

  • Anthropic ditches its core safety promise in the middle of an AI red line fight with the Pentagon

    February 25, 2026

    Anthropic, a company founded by OpenAI exiles worried about the dangers of AI, is loosening its core safety principle in response to competition. Instead of self-imposed guardrails constraining its development of AI models, Anthropic is adopting a nonbinding safety framework that it says can and will change. In a blog post Tuesday outlining its new policy, ...

  • You can jailbreak an F-35 just like an iPhone, says Dutch defense chief

    February 18, 2026

    Lockheed Martin’s F-35 fighter aircraft can be jailbroken “just like an iPhone,” the Netherlands’ defense secretary has claimed. Gijs Tuinman made the comments during a podcast interview after being asked whether the aircraft’s software could be modified by European forces without permission from the US should it withdraw as an ally. “The F-35 is truly a ...

  • ISA warns of increasing cyber attacks against Israeli officials

    February 11, 2026

    The ISA and the National Cyber Directorate announced on Wednesday that they thwarted hundreds of cyberattack attempts over the past year carried out by Iranian intelligence operatives. According to the agencies, the attacks targeted senior government and defense officials, academics, journalists, and employees in the defense industry. A joint statement said a marked escalation in hostile ...

  • Beyond the Battlefield: Threats to the Defense Industrial Base

    February 10, 2026

    In modern warfare, the front lines are no longer confined to the battlefield; they extend directly into the servers and supply chains of the industry that safeguards the nation. Today, the defense sector faces a relentless barrage of cyber operations conducted by state-sponsored actors and criminal groups alike. In recent years, Google Threat Intelligence Group (GTIG) ...

  • Approaching cyclone: Vortex Werewolf attacks Russia

    February 6, 2026

    In December 2025 and January 2026, BI.ZONE Threat Intelligence detected malicious activity by a new cluster Vortex Werewolf (SkyCloak). The attacks targeted Russian government and defense organizations. BI.ZONE researchers findings indicate that the adversary used phishing emails to deliver malware to the target systems. Victims received messages containing a download link disguised as a Telegram file‑sharing ...

  • North Korean Labyrinth Chollima is morphing into three separate entities

    January 30, 2026

    One of the largest and most successful North Korean state-sponsored threat actors has split into three separate entities, each with their own tactics, malware tools, targets, and goals, experts have warned. In a recent in-depth analysis, researchers from CrowdStrike expalined the move is a strategic evolution to make Labyrinth Chollima cyberattacks more efficient, and that the ...