Iran has broken the back of the American army in the Middle East! 16 military bases in 8 countries badly destroyed, report reveals

0

Middle East War: Big news has come regarding the Middle East war. Iran has caused a lot of damage to America’s military bases. According to the recent report related to the new investigation, Iran has taken this action against America by targeting important targets.

According to CNN reports, investigation has revealed that at least 16 American military bases have been damaged in Iranian attacks. These are part of the American military bases in the Middle East. Important locations are included in this loss. This has raised questions about America’s presence in the area.

These bases located in 8 countries were targeted

It has been said in this report that these military bases present in 8 countries of America have been targeted. It has been so badly damaged that it is partially unusable. Also, in this report, satellite photographs and interviews of officials of Gulf Arab countries including America have been cited.

If reports are to be believed, the facilities have been completely destroyed. He needs to stop. On the other hand, there are leaders who say that repairing these things is beneficial. America benefits from this at the strategic level. Apart from this, the report claims that satellite images show that Iranian forces have mainly targeted advanced radar bases, communication infrastructure and aircraft.

Changing these can prove costly.

It is also said that changing these systems can prove costly. American officials say that these areas have expensive and limited resources. Apart from this, Pentagon Controller Jules J. Hurst III told his lawmakers on Wednesday that America has spent $25 billion so far in the conflict with Iran. However, it is estimated that this figure may be between 40 to 50.

read this also

‘For breaking US-Israel promises…’ Tehran warned after rejecting Trump’s proposal

‘Public land cannot be used by one party to offer Namaz’, comments HC

0

Allahabad High Court has made a big comment regarding offering Namaz on public land. The High Court has said that public land cannot be used by one party for offering Namaz. The court also said that the right to religious freedom also depends on the freedom of the other party.

Commenting further, the Allahabad High Court said, “If work is done contrary to the High Court tradition, the state government has the full right to intervene.” A petition was filed in the HC for offering Namaz on the populated land in Ikauna, Sambhal. Justice Garima Prasad and Justice Saral Srivastava rejected the petition.

Akhilesh Yadav’s big allegation, ‘The same process was completely implemented in West Bengal which…’

In this decision given in the writ petition (Asin vs Uttar Pradesh Government), the court made it clear that everyone has equal rights on public land and its unilateral use is not legally acceptable.

In the judgment, the Court made it clear that earlier in the case of Munazir Khan vs. State of Uttar Pradesh and Others, the Court, while protecting bona fide prayer within private premises, had held that personal religious practice cannot be arbitrarily interfered with. However, these decisions cannot be read as implying that there is complete freedom for organized or regular collective activity on private premises. Where activity extends beyond that area and begins to affect the public sector, legitimate regulation applies. This decision does not give the right to convert private premises into uncontrolled collective space.

The Court said that the right to practice religion is subject to public order, including access, movement and peaceful life, and cannot be exercised in a way that interferes with these rights of others. The court said that even if the land is considered private, the petitioner is not entitled to the relief sought. The record shows that he is not protecting any existing practice but is demanding the introduction of regular mass meetings involving persons from within and outside the village. It has been accepted that earlier Namaz was offered only on special occasions like Eid. This extension beyond the limited private sector falls outside the protected area and is subject to regulation.

UP Congress Chief Ajay Rai fainted during the program, admitted to hospital

Access Denied



Access Denied You don’t have permission to access “http://news.sky.com/story/british-wife-screams-8216i-love-you8217-as-husband-executed-in-texas-13538937” on this server.

Reference #18.8e644217.1777654114.7240068

https://errors.edgesuite.net/18.8e644217.1777654114.7240068



Source link

CM Samrat Chaudhary said – ‘The persecution of some people has started, further…’, also gave a big statement on the land of the Math

0

Bihar will run with good governance, listen with open ears, the government will take whatever steps need to be taken for the safety of women and girls in Bihar. Gayaji is famous for Pind Daan. Pind Daan of some people has started. In future too, our government will continue to perform Pind Daan of many such criminals to establish good governance in Bihar. Chief Minister Samrat Chaudhary said these things in Gayaji on Friday (May 01, 2026).

On the other hand, Emperor Chaudhary also announced the removal of illegal encroachment from the monastery land. Said that the campaign to remove illegal encroachment from the monastery land will start from Bodh Gaya. Regarding the education system of Bihar, the CM said that why the children of ministers and MLAs do not study in government schools, in the next two years such arrangements will be made that the children of all these (ministers and MLAs) will study in them.

Also read- Tejashwi Yadav angry over the murder of Maulana of Kishanganj in UP, ‘After seeing the name and identity of the police…’

Emperor reached Gayaji for the first time after becoming CM

On Friday, on the occasion of Buddha Purnima, a religious coordination program in Indian tradition was organized under the National Seminar cum Cultural Awareness at Shankaracharya Math in Bodh Gaya. Chief Minister Samrat Chaudhary participated in this program as the chief guest. after becoming Chief Minister Samrat Chaudhary Reached Gayaji and Bodh Gaya for the first time.

First of all, the Chief Minister reached Vishnupad Temple, where he performed formal worship of Lord Vishnu in the sanctum sanctorum of the temple. After this he visited Vishnupad Corridor area and took stock of the construction works. Also inspected various places including Devghat situated on the banks of river Falgu.

After inspection of Vishnupad Corridor, the Chief Minister reached Bodh Gaya by road. The workers gave him a grand welcome at various places on the way. After reaching Bodhgaya, he offered prayers at the Mahabodhi temple and then reached the BTMC office. Here he held a review meeting with officials regarding the Bodhgaya Corridor project. Necessary guidelines were also given.

Also read- Bihar: Congress leader Praveen Kushwaha dies in road accident, Rahul Gandhi expresses grief

ADT data breach exposes names, phone numbers, addresses and partial SSNs


NEWYou can now listen to Fox News articles!

ADT has confirmed a new data breach, and it comes with a familiar twist. A well-known cybercrime group is reportedly demanding money and threatening to leak data if it does not get paid.

The group behind it, ShinyHunters, says it stole more than 10 million records. ADT has not confirmed that number, but it says attackers accessed customer data.

According to the company, “ADT’s cybersecurity systems detected unauthorized access to a limited set of customer and prospective customer data on April 20, and the company’s response protocols activated immediately, terminating the intrusion, launching a forensic investigation with leading third-party cybersecurity experts, and notifying law enforcement.”

Sign up for my FREE CyberGuy Report

  • Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.
  • For simple, real-world ways to spot scams early and stay protected, visit CyberGuy.com trusted by millions who watch CyberGuy on TV daily.
  • Plus, you’ll get instant access to my Ultimate Scam Survival Guide free when you join.  

GOOGLE CONFIRMS DATA STOLEN IN BREACH BY KNOWN HACKER GROUP

Illustration of a hacker working at a computer with code on screen

ADT confirmed a new data breach after hackers claimed they stole millions of records and threatened to leak the data. The company said customer payment information and security systems were not affected. (Kurt “CyberGuy” Knutsson)

What data was exposed in the ADT breach

ADT says, “The investigation confirmed that the information involved was limited to names, phone numbers, and addresses. In a small percentage of cases, dates of birth and the last four digits of Social Security numbers or Tax IDs were included. 

Here is the part that may bring some relief. ADT tells CyberGuy, “Critically, no payment information, including bank accounts or credit cards, was accessed, and customer security systems were not affected or compromised in any way.”

Still, this kind of personal data carries real value. Even without full Social Security numbers, attackers can use it to build convincing scams that feel personal.

How hackers may have accessed ADT systems

This breach may have started with a phone call. ShinyHunters told BleepingComputer it used a voice phishing attack, often called vishing, to compromise an employee’s Okta single sign-on account. The group claims that access allowed it to steal data from ADT’s Salesforce system. ADT has confirmed unauthorized access to customer and prospective customer data, but it has not publicly confirmed that specific attack method. This approach has become more common. Instead of hacking systems directly, attackers target people. One successful interaction can unlock multiple systems at once.

In a statement to CyberGuy, ADT said its response worked as intended.

“ADT’s protocols performed as designed: the breach was identified quickly, the threat was contained, and the scope was limited,” the company said. “ADT has directly notified all impacted individuals and will offer complimentary identity protection services as appropriate. Protecting customers is not just a priority; it is the foundation of what ADT does. The company remains committed to investing in and strengthening the cybersecurity infrastructure that its customers and their families depend on.”

RANSOMWARE ATTACK EXPOSES SOCIAL SECURITY NUMBERS AT MAJOR GAS STATION CHAIN

Sign indicating home is secured by ADT alarm system in front of suburban house

A sign in front of a suburban home in San Ramon, Calif., indicates the house is secured by an ADT alarm system to prevent burglaries and break-ins.

Why the ADT data breach matters for you

On the surface, this breach may seem limited. No financial data. No system control. That sounds contained. The reality is more complicated.

Names, phone numbers and addresses create a powerful starting point for scams. Add even partial Social Security data, and the risk increases. Criminals can use that information to impersonate companies, reset accounts or trick victims into handing over more sensitive details.

This also raises a bigger issue. Even companies focused on security can become targets. That should change how you think about your own exposure. 

ADT’s history of data breaches

This isn’t the first time ADT has dealt with a data breach. The company disclosed incidents in August and October of 2024 that exposed customer and employee information.

When breaches happen more than once, it raises questions about internal security practices and how attackers keep finding a way in.

At the same time, it highlights a broader trend. Cybercriminal groups like ShinyHunters are focusing on identity systems and employee access instead of traditional hacking methods.

Ways to stay safe after a data breach

After a breach like this, the goal is to reduce how much attackers can do with your information and make yourself a harder target going forward. 

1) Watch for targeted scams

If someone claims to be from a company like ADT, pause before responding. Scammers often use real details to sound convincing. Hang up and contact the company directly using a verified number. 

2) Limit your exposed personal data

Consider using a personal data removal service. These tools help remove your information from data broker sites, which reduces what scammers can find about you online. Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting CyberGuy.com.

3) Add identity theft monitoring

Identity theft monitoring can alert you to suspicious activity tied to your name or Social Security number early, which gives you a chance to act before damage spreads. See my tips and best picks on Best Identity Theft Protection at CyberGuy.com.

4) Strengthen your passwords and account security

Use a password manager to create and store strong, unique passwords. If you reused passwords anywhere, especially on email or banking accounts, update them right away to prevent account takeovers. Check out the best expert-reviewed password managers of 2026 at CyberGuy.com.

HEALTHCARE DATA BREACH HITS SYSTEM STORING PATIENT RECORDS

Person using smartphone with blurred background

Hackers accessed a limited set of ADT customer and prospective customer data, the company said, including names, phone numbers and addresses. In some cases, partial Social Security or Tax ID information was also exposed. (Matt Cardy/Getty Images)

5) Turn on two-factor authentication

Adding an extra login step, such as two-factor authentication (2FA), makes it much harder for attackers to break into your accounts, even if they have your credentials.

6) Keep your devices protected

Make sure your devices run updated security software. Many modern tools can detect suspicious activity before it turns into a bigger problem.

7) Freeze your credit if sensitive data was exposed

If your Social Security number or even part of it may be involved, consider placing a credit freeze with the major bureaus. This prevents new accounts from being opened in your name without your approval.

8) Review your financial and account activity

Keep an eye on bank accounts, credit cards and important logins for unusual activity. Even small, unfamiliar charges or login alerts can be an early warning sign. 

9) Use strong antivirus protection

Install and maintain strong antivirus software on your devices. It can detect suspicious activity, block malware and help stop threats before they gain access to your data. Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at CyberGuy.com.

10) Be cautious with account recovery attempts

Attackers often try to reset your passwords using information they already have. If you get unexpected password reset emails or codes, treat them as a warning sign, not a routine message.

11) Opt for a reliable home security system

While ADT is one of the largest home security companies in the United States, the recent breach of customer information highlights potential vulnerabilities despite the company’s assurance that home security systems were not compromised. There are many other options in the market, whether you prefer a professionally installed system or a do-it-yourself one.

For reference, you can check out my guide on the best home security systems at CyberGuy.com, where I’ve listed four of my favorite options. You might also want to find out if your home insurance offers a discount for installing robust security protection. 

Kurt’s key takeaways

If your data was part of this breach, the risk does not end with the initial incident. In many cases, it is just getting started. You may begin to see more targeted scam calls or emails. Messages might include your name or reference your address to appear legitimate. That level of detail can make even cautious people hesitate. Even if you have never used ADT, this is a reminder of how often personal data circulates behind the scenes. Once it is out there, it can be reused in ways you never expected. The bigger takeaway is simple. Breaches like this are less about a single company and more about how exposed personal data has become across the board.

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Should companies like ADT be doing a better job protecting your data, especially after repeated breaches? Let us know by writing to us at CyberGuy.com.

Sign up for my FREE CyberGuy Report

  • Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.
  • For simple, real-world ways to spot scams early and stay protected, visit CyberGuy.com trusted by millions who watch CyberGuy on TV daily.
  • Plus, you’ll get instant access to my Ultimate Scam Survival Guide free when you join.

Copyright 2026 CyberGuy.com. All rights reserved.



Source link

Akhilesh Yadav’s big allegation, ‘The same process was completely implemented in West Bengal which…’

0

Samajwadi Party (SP) chief Akhilesh Yadav on Friday (01 May) alleged that BJP and the Election Commission have completely implemented the same process in West Bengal, which has been tried in Uttar Pradesh on a ‘test’ basis. He Lucknow He was talking to journalists during a press conference organized on the occasion of Buddha Purnima.

Responding to a question on Trinamool Congress chief Mamata Banerjee sitting outside the strongroom at the counting center for almost four hours at night, Yadav said, “This is the real problem, whom should we trust? You will remember that people were being stopped from voting by showing pistols. Voting was stopped on the strength of revolvers.”

MP Chandrashekhar Azad raised his voice on this issue of Haj pilgrims, wrote a letter to the Union Minister

Mamata Banerjee will win elections in Bengal- Akhilesh Yadav

He said, “I think that BJP and the Election Commission together have implemented the same entire process in West Bengal, which they did in Uttar Pradesh as an exercise or experiment.” The SP chief also claimed that a parallel system of central security forces has been created in West Bengal. However, he also said, “Despite this, Didi (Mamata Banerjee) will win the elections there and it will be a historic victory.”

BJP’s technology cannot be trusted- Akhilesh Yadav

On the other hand, West Bengal Chief Minister Mamata Banerjee reached Sakhawat Memorial School in South Kolkata, which is the counting center of Bhawanipur assembly constituency. The strongroom of EVM is located in this counting centre. He expressed fear of voting irregularities and EVM tampering. On the Election Commission’s decision to introduce QR code based ID system on May 4 to strengthen the security of counting centres, Akhilesh Yadav said that the technology brought by BJP cannot be trusted.

According to officials, this QR code system will be implemented during the counting of votes in the assembly elections of West Bengal, Assam, Kerala, Tamil Nadu and Puducherry as well as by-elections on seven seats in five states and later it will be implemented in all Lok Sabha and Assembly elections.

Om Prakash Rajbhar’s direct challenge to Akhilesh Yadav, ‘Marks of sticks of Yadavs on the backs of poor people…’

Where to buy a non-Apple, non-Google smartphone • The Register


As both Apple and Google introduce unwelcome changes in their phone OSes, here’s a quick reminder that you do have alternatives to the Gruesome Twosome.

The Keep Android Open campaign is gathering attention and support as the big red numbers on its page count down. The good news is that you do already have alternatives, and The Register has been reporting on them. But if you are not the sort of person who reads phone reviews, or writeups of alternative phone OSes, and just wants to buy a new handset and retain control of it and its contents, we thought it might be a good time to remind you of where to go and who to talk to.

At the time of writing, the campaign says it’s 123 days until Google’s new measures preventing you from side-loading your own software will kick in. The campaign frames it in intentionally alarmist language:

The Register has of course been covering both the looming Google changes as well as the campaign itself.

It’s worth noting, too, that the Mountain View massive is also taking steps to make life harder for the organizations creating these de-Googled Android variants – such as the changes to the Android Open Source Platform that reduce how often the source code will be made available. As The Reg noted at the time, Google dropped its old “Don’t Be Evil” motto when it turned 20… and commemorated it by firing staff who stuck to the motto. It has changed its position on being evil, but it’s not stupid.

Fancy a free FOSS fondleslab?

Even so, there are alternatives. The Reg FOSS desk has written about several of them over the last four years, and we have more to come in the near future, as well.

For now, multiple companies will sell you a brand new smartphone with a Google-free OS on it – either a de-Googled version of Android, or a Linux OS that isn’t based on Android in the first place.

It’s somewhat easier to start with the FOSS Android Open Source Platform, and then systematically remove all the Google integration. That still leaves a feature-complete mobile OS, and it can still install and run many Android apps.

Murena

The Murena One smartphone is a privacy-centric de-Googled Android 10 phablet

The Murena One smartphone is a privacy-centric de-Googled Android 10 phablet

Murena is one of the big names in this area. It sponsors the development of /e/OS, which you can run on multiple off-the-shelf handsets, but it also offers its own range of phones and tablets so you don’t need to mess around trying to “root” an old phone. We looked at the Murena One phone in 2022 and then at /e/OS 3 on a Pixel Tablet last year.

One of the models that Murena sells with /e/OS is from Fairphone. We reported on the Fairphone 6’s 10/10 repairability score last July.

Punkt

 Punkt. MP02 is a minimalist 4G phone. pic https://www.punkt.ch/products/mp02-4g-minimalist-phone

Punkt. MP02 is a minimalist 4G phone. Pic by: Punkt

Swiss designer-kit vendor Punkt offers a variety of sleek black gadgets including an alarm clock. It’s been making phones for years, and The Reg inspected its minimalist MP02 phone back in 2018. More recently, this vulture tried out the MC02 ultra-private smartphone in 2024. That’s now been replaced with a newer faster model, the MC03, and we are currently in the process of reviewing one of the handsets.

Volla

Volla Phone X23 Ocean - from vendor website

Volla Phone X23 Ocean

German fondleslab-flinger Volla offers three smartphones and a tablet. We have yet to get our claws on one, but all of them are available with a choice of OSes: either the company’s own de-Google Android, Volla OS, or alternatively, with Ubuntu Touch, the community-led continuation of Canonical’s phone OS. We’ve reported on the OTA-24 update and later the newer Ubuntu 20.04 release.

Jolla

The new Jolla Phone, resplendent in The Orange – or Snow White and Kaamos Black

The Jolla Phone

The German Volla is not to be confused with the Finnish Jolla. We took a look at its Sailfish 5 OS and new C2 handset in December last year. The first two batches of the phone have sold out, but the company is currently taking orders for the third batch.

Furilabs

If you want Debian in your pocket, then Furilabs can help. We reported on the launch of their first handset, the FLX1, from Devconf.cz in 2024, and the company provided us with a handset which we reviewed last year.

FuriPhone FLX1

FuriPhone FLX1

Since then, the company has launched its second model, the FLX1s. The old one was a bit of a brick, which is to be honest how this vulture likes his phones: it was 18 cm long, 9 cm wide, and 2.8 cm thick, and weighed just over a third of a kilo. (For our readers in Liberia, Myanmar and elsewhere, that’s 7 × 3½ × 1.1 inches, and ¾ lb.) The new model is under a third of the thickness, and just over 200g (7 oz.)

Purism

The Librem 5 has 3GB of memory and 32GB of storage. Pic: Purism website

The Librem 5 has 3GB of memory and 32GB of storage. Pic: Purism website – click to enlarge

Purism has a range of Free Software-powered phones, tablets, and laptops, but the one that’s relevant here is the Librem 5. It’s a low-end handset by modern standards, and it’s expensive at that, but then freedom does cost.

PinePhone and postmarketOS

PINEPHONE – Beta Edition

Pinephone, beta Edition

Pine64 offers a variety of hacker-friendly gadgets which can run open-source firmware. The one that’s most relevant here is the original PinePhone. Do beware, though, it’s a very low-end, low-spec device. We reported last year that the higher-end PinePhone Pro was being discontinued, but the older model is still available to order. It’s on the company’s global store although the EU store is currently out of stock.

We have reported on both Mobian Linux and postmarketOS, and this device can run both.

Honorable mention: FXtec

F(x)tec Pro1 X

F(x)tec Pro1 X – Click to enlarge

FXtec also offers an intriguing handset, the Pro1. The Reg reported on its launch in 2020 and it’s still listed on the company’s web store, albeit out of stock – but you may be able to find one.

But can I run my apps?

Well, probably, yes.

Several of these OSes, including Sailfish, FuriOS, Mobian, and postmarketOS are all pure Linux OSs. They’re not derived from Android, but they can all run an Android VM or container, and so allow you to install and use Android apps.

This is not an exhaustive list. They are just ones I know of or have tried. If we missed any significant players out, please do let us know. ®

Bootnote

When we referred to Apple users finding themselves with unwelcome features, we were primarily thinking of the company’s new Liquid Glass user interface. However, on discussion with several iDevice owners, it seems that there are more aggressive features. As the Reg mentioned in passing, the iOS 26.4 update introduces age verification measures to the OS. (That’s as well as changing the passcode keypad.) For UK users, Apple’s age verification wants to scan a UK passport or driver’s licence. We know of a number of adult citizens who own neither of these documents. (The author does not: he has Manx ones. This lack recently cost him his Nationwide building society account.) Without official ID, they are now locked out of controlling their own phones, stuck in child mode with access controls they can’t change.



Source link

Access Denied

0

Access Denied You don’t have permission to access “http://hindi.news18.com/photogallery/ajab-gajab/off-beat-miyazaki-mango-red-gold-price-and-specialty-bike-price-equal-japanese-mango-story-10427593.html” on this server.

Reference #18.49200117.1777655286.d3b1cd6

https://errors.edgesuite.net/18.49200117.1777655286.d3b1cd6

Pentagon announces deal with seven AI companies for classified systems | US-Israel war on Iran News

0

Most recent instance of department integrating with AI comes amid Anthropic standoff, concern over use in Iran war.

Washington, DC – The United States Department of Defense has announced a new agreement with seven Artificial Intelligence companies to use their advanced technologies for its classified networks.

The announcement on Friday is the latest instance of closer integration between the Pentagon, which has been expanding its use of AI for about a decade.

Recommended Stories

list of 3 itemsend of list

It comes amid wider scrutiny over involvement by companies with the US military, which has gained renewed attention amid a public fallout with the AI company Anthropic and questions over how AI has been used in the US-Israeli war with Iran.

In a statement, the Department of Defense said the new agreements with SpaceX, OpenAI, Google, NVIDIA, Reflection, Microsoft and Amazon Web Services “accelerate the transformation towards establishing the United States military as an AI-first fighting force and will strengthen our warfighters’ ability to maintain decision superiority across all domains of warfare”.

It said the companies’ capabilities would be used in its most secure information systems to “streamline data synthesis, elevate situational understanding and augment warfighter decision-making in complex operational environments”.

Noticeably absent from the Pentagon’s list was Anthropic, which had a major fallout with the Pentagon after pushing back on pressure to provide unrestricted access to its Claude AI programme for “all lawful use”.

The appeal raised concerns over Claude’s possible uses in government mass surveillance and autonomous weapons systems. The Pentagon, in turn, labelled the company a “supply chain risk”.

The two sides have since been locked in a protracted court battle, although there have been some signs of detente.

In particular, there has been an increasing desire from the administration to access Anthropic’s powerful new Mythos AI model, which is seen as a potentially transformative tool in both cyber attacks and cyber defence.

The Pentagon’s agreements with OpenAI and Google had previously been confirmed, as had a deal with Elon Musk’s xAI. The three companies had agreed to the Pentagon’s “all lawful use” provision as part of those agreements.

In its statement, the Pentagon said that over 1.3 million department personnel use its official AI platform, GenAI.mil.

“Warfighters, civilians and contractors are putting these capabilities to practical use right now, cutting many tasks from months to days,” it said.

It vowed to continue building the department’s AI architecture to avoid so-called “vendor lock”, a term for over-reliance on one vendor.

Scrutiny grows

The US government’s use of AI has gained increasing scrutiny amid its mass deportation campaign, with rights groups saying the technology company Palantir has been used to collect real-time data on potential Immigration and Customs Enforcement (ICE) targets, including pro-Palestine advocates.

Amid the US-Israel war in Iran, questions have been raised over how AI targeting systems are being used. The Pentagon has said it has hit 13,000 targets since beginning attacks on February 28.

At least 3,375 people have been killed in Iran, including at least 170 people, mostly children, in an apparent US Tomahawk strike on a girls’ school in Minab. The Pentagon has said it is still investigating.

Speaking during a Senate committee hearing on Thursday, US Senator Kirsten Gillibrand questioned Secretary of Defense Pete Hegseth on civilian harm oversight and the use of AI.

Hegseth responded that “no military, no country works harder at every echelon to ensure they protect civilian lives than the United States military, and that is an ironclad commitment that we make, no matter how…no matter what system we use”.



Source link

Kentucky Derby 2026: Odds, post time and key race day details to know


NEWYou can now listen to Fox News articles!

The 152nd Kentucky Derby, the home of “The Most Exciting Two Minutes in Sports,” will take place on Saturday at the legendary Churchill Downs racetrack in Louisville, Kentucky.

The first leg of the Triple Crown is traditionally held on the first Saturday in May. Twenty three-year-old horses will compete for a $5 million purse, with the winner of the 1¼-mile race taking home $3.1 million.

Three horses have already been scratched from this year’s race. Silent Tactic was scratched due to a foot injury and will be replaced by Great White. Fulleffort was scratched with an ankle injury and is replaced by Ocelli. Right to Party was scratched due to right front lameness and will be replaced by Robusta.

CLICK HERE FOR MORE SPORTS COVERAGE ON FOXNEWS.COM

Horses running on the track during morning training at Churchill Downs

Horses run on the track during morning training for the 152nd Kentucky Derby at Churchill Downs in Louisville, Kentucky, on April 30, 2026. (Andy Lyons/Getty Images)

Here is what you need to know heading into the race:

Who is racing and what are the betting odds?

  1. Renegade (Irad Ortiz Jr.) 4-1
  2. Albus (Manny Franco) 30-1
  3. Intrepido (Hector Berrios) 50-1
  4. Litmus Test (Martin Garcia) 50-1
  5. Right to Party (Chris Elliott) SCRATCHED
  6. Commandment (Luis Saez) 6-1
  7. Danon Bourbon (Atsuya Nishimura) 20-1
  8. So Happy (Mike Smith) 15-1
  9. The Puma (Javier Castellano) 10-1
  10. Wonder Dean (Ryusei Sakai) 30-1
  11. Incredibolt (Jaime Torres) 20-1
  12. Chief Wallabee (Junior Alvarado) 8-1
  13. Silent Tactic (Cristian Torres) SCRATCHED
  14. Potente (Juan Hernandez) 20-1
  15. Emerging Market (Flavien Prat) 15-1
  16. Pavlovian (Edwin Maldonado) 30-1
  17. Six Speed (Brian Hernandez Jr.) 50-1
  18. Further Ado (John Velasquez) 6-1
  19. Golden Tempo (Jose Ortiz) 30-1
  20. Fulleffort (Tyler Gaffalione) 20-1
  21. Great White (Alex Achard) 50-1
  22. Ocelli (Joe Ramos) 50-1
  23. Robusta (Cristian Torres) 50-1

ZERO BS. JUST DAKICH. TAKE THE DON’T @ ME PODCAST ON THE ROAD. DOWNLOAD NOW!

Kentucky Derby entrant The Puma galloping at Churchill Downs racetrack.

Kentucky Derby entrant The Puma works out at Churchill Downs in Louisville, Kentucky, on May 1, 2026. (Charlie Riedel/AP Photo)

Who are the favorites?

Renegade, who is trained by Todd A. Pletcher, is the current favorite at 4-1. Commandment, who is trained by Brad H. Cox, and Further Ado, who is also trained by Cox, are both at 6-1.

Chief Wallabee, who is trained by William I. Mott, is at 8-1. The Puma, who is trained by Gustavo Delgado, is at 10-1.

What everyone’s talking about ahead of the Derby

The weather is not expected to be a factor. It will be a little cooler than usual in the morning, and there is a chance of rain in the afternoon, but it should be clear for the race. It is projected to be 58 degrees when the race kicks off, which is cooler than the average temperature of the Kentucky Derby at 74 degrees, according to Kentucky.com.

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

A horse heading to the track for a workout at Churchill Downs in Louisville, Ky.

A horse heads to the track for a workout at Churchill Downs in Louisville, Kentucky, on May 1, 2026. (Charlie Riedel/AP Photo)

The 152nd Kentucky Derby will be Hall of Fame horse trainer Bob Baffert’s second appearance since being banned for four years. He was handed a suspension after his record-breaking seventh victory at the race in 2021 was later stripped due to a failed drug test.

Cherie DeVaux, the trainer of Golden Tempo, is looking to make history and became the first female trainer to win the Kentucky Derby. Vicki was the last woman trainer to have a horse in the derby, when Hidden Stash finished 13th in 2021. Shelley Riley has the best finish for women trainers, when Casual Lies came in second in 1992.

Smith, the jockey of So Happy, is 59-years-old and looking to become the oldest jockey to ever win the Kentucky Derby. Willie Shoemaker currently holds the record for oldest jockey to win, as he was 54 when Ferdinand won in 1986. Shoemaker died at 72 in 2003.

Trainer Cherie DeVaux standing outside a barn at Churchill Downs

Trainer Cherie DeVaux stands outside a barn after a workout at Churchill Downs in Louisville, Kentucky, on April 27, 2026. (Charlie Riedel/AP Photo)

 

How to watch?

  • Where: Churchill Downs, Louisville, Kentucky
  • When: May 2, 2026
  • Projected Post Time: 6:57 p.m. ET
  • TV: NBC
  • Purse: $5 million

Follow Fox News Digital’s sports coverage on X, and subscribe to the Fox News Sports Huddle newsletter.



Source link