Today, Defense Unicorns announced the completion of a $136 million Series B financing round led by Bain Capital. The investment brings the company to unicorn status with a valuation exceeding $1 billion, driven by the company’s rapid and profitable growth. The company has seen a 300% increase in adoption year-over-year in military systems.
The Department of War is prioritizing modernization and speed, and Defense Unicorns’ platform addresses a critical infrastructure challenge by enabling secure, rapid software updates across disconnected environments from submarines, ships, and aircraft to forward operating bases. Warfighters often operate in conditions where connectivity is limited or nonexistent, and the ability to deploy software updates securely and instantly is now essential to mission success. Unicorn Delivery Service (UDS) bridges high security requirements while supporting partners and allies with modern softwaresolutions essential for next-generation national security capabilities.
The funding round was led by Bain Capital’s Tech Opportunities fund, the growth technology platform of Bain Capital. With participation from Ansa Capital, Sapphire Ventures, Valor Equity Partners, AVP, Uncorrelated Ventures, and the former Director of the Central Intelligence Agency, David H. Petraeus.
The new capital will enable Defense Unicorns to further scale and integrate open-source and commercial dual-use technology throughout the U.S. military and allied forces. To address the most critical modernization needs in defense, the company plans to advance product development across the following strategic products:
● UDS: A secure, portable, airgap-native runtime platform, purpose-built to solve DOW-specific software delivery challenges. UDS makes deploying and updating software on military systems fast and easy, with essential tools for packaging, deploying, monitoring, and sustaining mission applications.
● UDS Registry: The first software registry of its kind to offer the speed, reliability, and mission-critical performance required by military systems operating in the most extreme environments. UDS Registry gives the U.S. and our allies an American-maintained solution that secures our software supply chain and maintains trust and reliability across the software development lifecycle.
● UDS Army: A new approach to accelerate the continuous delivery of secure, mission-ready software to soldiers. UDS Army gives commercial software vendors a faster, simpler path to bring their capabilities to Army missions by combining secure DevSecOps pipelines with pre-authorized cloud environments.

Target Appears To Have Been Pwned By Hackers
Posted in Commentary with tags Hacked on January 13, 2026 by itnerdYesterday, BleepingComputer exclusively reported that hackers claimed to be selling Target’s internal source code and developer documentation after publishing a sample of stolen repositories on public software development platform, Gitea.
The hacker’s listings include 57,000 files and directory names, with an advertised total dump size of around 860 GB that the threat actor says is being offered for sale. The repositories appear to originate from Target’s private development environment, reportedly showing internal naming conventions, commit metadata with engineer names, and references to internal systems.
After security researchers contacted Target about the exposed repositories, the sample files were taken offline and Target’s developer Git server (git.target.com) became inaccessible from the internet, effectively taking the dev infrastructure offline as part of the company’s response. In parallel, Target also implemented an “accelerated” lockdown of its Git environment, restricting access to require connection via the company’s VPN or managed network to help prevent further unauthorized access.
Multiple current and former Target employees have since corroborated that the leaked source code samples match real internal platforms, tooling, and technology stacks used by the company, including references to CI/CD systems, Hadoop datasets, and proprietary service names.
Target has not publicly confirmed the full scope of any breach or whether the entire dataset was exfiltrated.
Michael Bell, Founder & CEO, Suzu Labs had this to say:
“Source code exposure gives attackers a roadmap. They can study authentication flows, find hardcoded secrets, identify vulnerable dependencies, and understand internal architecture before launching follow-on attacks. The code becomes reconnaissance.
“The “accelerated” lockdown to require VPN access raises an obvious question… why wasn’t that already required? Exposing internal Git servers to the public internet, even behind authentication, creates unnecessary attack surface. The fact that this change was accelerated after the breach suggests the access controls weren’t where they should have been.
“Employee confirmation of authenticity matters more than the threat actor’s claims. Anyone can claim to have breached a company. When current and former employees independently verify that internal system names, CI/CD tooling, and proprietary project references match real infrastructure, that’s substantive validation.
“The infostealer angle is worth watching. Hudson Rock identified a compromised Target employee workstation from September 2025 with access to IAM, Confluence, wiki, and Jira. No confirmation it’s connected, but infostealer logs are increasingly how initial access happens. Credentials get harvested, sit in underground markets, and show up months later when someone decides to monetize them.”
John Carberry, CMO, Xcape, Inc. follows with this comment:
“The reported thiler’s technical security, potentially giving attackers a detailed understanding of their digital infrastructure. The leak of 57,000 files, including CI/CD pipelines, Hadoop setups, and proprietary service names, offers a “blueprint for exploitation.” This enables future attackers to find hardcoded secrets or vulnerabilities in Target’s supply chain.
“Target’s quick response, including taking down its Git server, while necessary, shows a failure to protect its developers from credential theft or misconfiguration. This breach is especially harmful because it reveals the names and details of internal engineers, creating a targeted list for spear-phishing or social engineering.
“Unlike a simple data breach, a source code leak is a persistent threat on the dark web, as researchers can now analyze Target’s core business logic for vulnerabilities offline. Target spent over a decade rebuilding its reputation after the 2013 POS breach. This exposure of their internal code indicates the importance of network segmentation and identity-first security.
“When source code leaks, attackers stop probing and start hunting.”
Ryan McCurdy, VP of Marketing, Liquibase adds this:
“This is a reminder that delivery infrastructure is now part of the attack surface. Locking Git behind a managed network or VPN is a practical containment step, but containment isn’t the same as trust. At enterprise scale, the real control point is before production: governance at the point of change with enforced access, separation of duties, automated policy gates, and audit-grade evidence from commit to deployment. And the database layer is where this matters most, because one ungoverned schema change can ripple across applications, analytics, and AI workloads. Runtime is response. Trust is built before production.”
The good thing is that Target shut this down pretty quickly. But to be frank, they may have a fair amount of damage control to do as it’s hard to put the genie back in the bottle once is has been let out.
Leave a comment »