Tag: military
-
Trump Fires NSA, Cyber Command Chief, Fueling Security Fears
by
in SecurityNewsOfficials Warn Trump’s Abrupt Firings Severely Weaken National Cyber Defenses. President Donald Trump fired National Security Agency and Cyber Command chief Gen. Timothy Haugh after a meeting with far-right conspiracy theorist Laura Loomer, sparking concerns among cybersecurity experts and lawmakers that the dismissals weaken national cyber defenses and military readiness. First seen on govinfosecurity.com Jump…
-
Russian Seashell Blizzard Targets Organizations Using Custom-Built Hacking Tools
by
in SecurityNewsSeashell Blizzard, also known as APT44, Sandworm, and Voodoo Bear, has emerged as a sophisticated adversary targeting critical sectors worldwide. Associated with Russia’s Military Intelligence Unit 74455 (GRU), this group has been active since at least 2009, focusing on sectors such as energy, telecommunications, government, military, manufacturing, and retail. Their operations often involve long-term access…
-
Veterans are an obvious fit for cybersecurity, but tailored support ensures they succeed
by
in SecurityNewsSecurity is built into just about any military role: “Veterans make great cybersecurity specialists, because they’ve had security-focused roles, whether physical or information security, no matter what branch of the service they were in,” says Bryan Radliff, a 31-year veteran of the US Army who now serves as the CyberVets program manager in the Onward…
-
Evolution and Growth: The History of Penetration Testing
by
in SecurityNewsThe history of penetration testing begins with military strategies used to test enemy defenses. Over time, this evolved into a formal practice for identifying vulnerabilities in computer systems. This article traces the brief history of of penetration testing, from its early conceptual roots in military exercises, through the rise of ‘Tiger Teams’ in the 1970s,……
-
How an Interdiction Mindset Can Help Win War on Cyberattacks
by
in SecurityNewsThe US military and law enforcement learned to outthink insurgents. It’s time for cybersecurity to learn to outsmart and outmaneuver threat actors with the same framework. First seen on darkreading.com Jump to article: www.darkreading.com/cyberattacks-data-breaches/how-interdiction-mindset-cyberattacks
-
6 hard-earned tips for leading through a cyberattack, from CSOs who’ve been there
by
in SecurityNews
Tags: attack, awareness, breach, business, cisco, ciso, control, cyber, cyberattack, cybersecurity, data, group, incident response, infosec, infrastructure, lessons-learned, military, open-source, phishing, phone, privacy, programming, ransomware, security-incident, service, skills, software, strategy, threat, training, updateDevelop muscle memory, and patience, through simulations: Authority under crisis is meaningless if you can’t establish followership. And this goes beyond the incident response team: CISOs must communicate with the entire organization, a commonly misunderstood imperative, says Pablo Riboldi, CISO of nearshore talent provider BairesDev.”I find that employee involvement tends to be overlooked during cyberattacks.…
-
Operation HollowQuill Weaponized PDFs Deliver a Cobalt Strike Malware Into Gov Military Networks
In a recent revelation by SEQRITE Labs, a highly sophisticated cyber-espionage campaign, dubbed Operation HollowQuill, has been uncovered. The operation targets academic, governmental, and defense-related networks in Russia using weaponized decoy PDFs to deliver Cobalt Strike malware implants. The campaign appears to focus on infiltrating critical institutions such as the Baltic State Technical University (BSTU…
-
PJobRAT Android Malware Masquerades as Dating and Messaging Apps to Target Military Personnel
PJobRAT, an Android Remote Access Trojan (RAT) first identified in 2019, has resurfaced in a new campaign targeting users in Taiwan. Initially, PJobRAT was known for targeting Indian military personnel by disguising itself as dating and instant messaging apps. The latest iteration of this malware has evolved, now masquerading as apps like ‘SangaalLite’ and ‘CChat’,…
-
PJobRAT Malware Campaign Targeted Taiwanese Users via Fake Chat Apps
An Android malware family previously observed targeting Indian military personnel has been linked to a new campaign likely aimed at users in Taiwan under the guise of chat apps.”PJobRAT can steal SMS messages, phone contacts, device and app information, documents, and media files from infected Android devices,” Sophos security researcher Pankaj Kohli said in a…
-
Cyber Threats Jeopardize US Military Mobility, Report Warns
by
in SecurityNewsChinese Cyber Pre-Positioning Endangers US Military Logistics and Readiness. The U.S. military’s ability to deploy, supply and sustain its forces in a major conflict is under threat – not from enemy fire, but from cyberattacks targeting the digital systems that keep troops and equipment moving, according to a new report.</ First seen on govinfosecurity.com Jump…
-
Intelligence chiefs insist Signal chat was a simple mistake
by
in SecurityNewsDemocrats on the House Intelligence Committee expressed anger over the use of the messaging app to coordinate military strikes on Houthi targets in Yemen. First seen on cyberscoop.com Jump to article: cyberscoop.com/signal-chat-house-intelligence-tulsi-gabbard-chrissy-houlahan/
-
Intelligence chiefs insist Signal chat was a simple mistake
by
in SecurityNewsDemocrats on the House Intelligence Committee expressed anger over the use of the messaging app to coordinate military strikes on Houthi targets in Yemen. First seen on cyberscoop.com Jump to article: cyberscoop.com/signal-chat-house-intelligence-tulsi-gabbard-chrissy-houlahan/
-
Intel chiefs again say they did not share classified info amid new questions on war chats
by
in SecurityNewsPresident Donald Trump’s intelligence chiefs on Wednesday maintained they did not share classified information about an eminent U.S. military strike on a messaging app, even as more details about the discussion came to light. First seen on therecord.media Jump to article: therecord.media/intel-chiefs-again-say-they-did-not-share-classified-info-house-hearing
-
Military AI caught in tension between speed and control
by
in SecurityNewsThe use of artificial intelligence in military contexts can unlock a range of benefits for defence organisations, but also highlights a clear tension between speed and control baked into the technology First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366621215/Military-AI-caught-in-tension-between-speed-and-control
-
OPSEC Nightmare: Leaking US Military Plans to a Reporter
by
in SecurityNews
Tags: militaryExperts say the leakage of US military plans to a reporter this month reflects a severe operational security failure on the part of US leadership. First seen on darkreading.com Jump to article: www.darkreading.com/cybersecurity-operations/opsec-nightmare-leaking-us-military-plans-reporter
-
White House’s Operational Security Fail: No Signal Required
by
in SecurityNews‘Encryption Can’t Protect You From Stupid,’ Says Leading Cryptographer We’re all human. Who among us hasn’t lost a thumb drive or added a journalist to a consumer-grade encrypted app group chat devoted to White House war planning and military operations? Still, some accidental data breaches pose a bigger risk than others. First seen on govinfosecurity.com…
-
Meet the Low-Key Access Broker Supercharging Russian State Cybercrime
by
in SecurityNewsRaspberry Robin breaks into organizations and sells access to Russian threat actors, including the military cyber unit behind attempted coups, assassinations, and influence operations throughout Europe. First seen on darkreading.com Jump to article: www.darkreading.com/cyberattacks-data-breaches/access-broker-russian-state-cybercrime
-
North Korea Launches Military Research Facility to Strengthen Cyber Warfare Operations
by
in SecurityNewsNorth Korea has taken a significant step in enhancing its cyber warfare capabilities by establishing a new research center, known as Research Center 227, under the military’s Reconnaissance General Bureau (RGB). This move is part of a broader strategy to bolster the country’s offensive cyber operations, particularly focusing on AI-powered hacking technologies. Background and Objectives…
-
Hacker nutzen alte Windows-Sicherheitslücke aus Microsoft tut nichts
by
in SecurityNews
Tags: bug, bug-bounty, china, cyberattack, exploit, germany, hacker, iran, microsoft, military, north-korea, update, vulnerability, windowsExperten des Sicherheits-Unternehmens Trend Micro haben eine als ZDI-CAN-25373 bezeichnete Sicherheitslücke in Windows entdeckt, die Angreifer seit mindestens 2017 ausnutzen. Über die Lücke können die Angreifer Schadcode auf den betroffenen Windows-Rechnern ausführen, sofern der Benutzer eine verseuchte Webseite besucht oder eine infizierte Datei öffnet.Die Lücke steckt in der Vorgehensweise, wie Windows .lnk-Dateien (Verknüpfungsdateien) verarbeitet. Angreifer können Kommandozeilen-Befehle, die…
-
Chinese military-linked companies dominate US digital supply chain
by
in SecurityNewsDespite growing national security concerns and government restrictions, Chinese military-linked companies remain deeply embedded in the US digital supply chain, according to … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/03/20/digital-supply-chain-security-concerns/
-
Ukrainian military targeted in new Signal spear-phishing attacks
by
in SecurityNewsUkraine’s Computer Emergency Response Team (CERT-UA) is warning about highly targeted attacks employing compromised Signal accounts to send malware to employees of defense industry firms and members of the country’s army forces. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/ukrainian-military-targeted-in-new-signal-spear-phishing-attacks/
-
US must prioritize cybersecurity training for the military’s engineers
by
in SecurityNewsThe Defense Department faces a startling capability gap. First seen on defensescoop.com Jump to article: defensescoop.com/2025/03/13/prioritize-cybersecurity-training-military-engineers/
-
SCADA Vulnerabilities Allow Attackers to Cause DoS and Gain Elevated Privileges
by
in SecurityNews
Tags: control, cyber, data, dos, government, infrastructure, microsoft, military, network, risk, vulnerability, windowsA recent security assessment by Palo Alto Networks’ Unit 42 has uncovered multiple vulnerabilities in the ICONICS Suite, a widely used Supervisory Control and Data Acquisition (SCADA) system. These vulnerabilities, identified in versions 10.97.2 and earlier for Microsoft Windows, pose significant risks to critical infrastructure sectors such as government, military, manufacturing, water and wastewater, and…
-
SideWinder APT Deploys New Tools in Attacks on Military Government Entities
by
in SecurityNewsThe SideWinder Advanced Persistent Threat (APT) group has been observed intensifying its activities, particularly targeting military and government entities across various regions. This group, known for its aggressive expansion beyond traditional targets, has recently updated its toolset to include sophisticated malware designed for espionage. SideWinder’s primary targets have historically included entities in Pakistan, Sri Lanka,…
-
CISOs müssen OT-Risiken stärker adressieren
by
in SecurityNews
Tags: china, ciso, cyber, cyberattack, exploit, firewall, hacker, infrastructure, Internet, iran, kev, kritis, military, ransomware, risk, technology, update, vulnerabilityDa Angriffe auf OT-Bereiche zunehmen, sollten CISOs einen Exposure-Management-Ansatz verfolgen.Die Bedrohungen gegen die Betriebstechnik (Operational Technology, OT) der kritischen Infrastruktur (KRITIS) verschärfen sich kontinuierlich. China baut offensive Komponenten in amerikanische Militär- und Unternehmensnetzwerke ein. Zudem haben chinesische Hacker Telekommunikationsunternehmen und Internetdienstleister infiltriert, um Zivilisten auszuspionieren. Seit etlichen Jahren, also bereits deutlich vor dem Angriffskrieg, greift…
-
Cyberangriff auf ein staatliches Rüstungsunternehmen in Argentinien
by
in SecurityNewsCyberattack on Military Manufacturing, Security Risk and Official Silence First seen on agendamalvinas.com.ar Jump to article: agendamalvinas.com.ar/en/noticia/ciberataque-a-fabricaciones-militares-riesgo-de-seguridad-y-silencio-oficial
-
ISMG Editors: Is US Cyber Pause on Russia a Strategic Risk?
by
in SecurityNewsAlso: the Recent Ransomware Surge, Crypto Reserve Controversy. In this week’s update, four ISMG editors discussed the recent surge in ransomware attacks, implications of the U.S. military’s pause on cyber operations against Russia, and President Trump’s bold but controversial plan to create a national cryptocurrency reserve. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/ismg-editors-us-cyber-pause-on-russia-strategic-risk-a-27672
-
Two US Army soldiers charged with selling military secrets to China
by
in SecurityNewsTwo active-duty and one former U.S. Army soldiers were arrested on Thursday for allegedly stealing classified materials from the military and selling them to conspirators in China. First seen on therecord.media Jump to article: therecord.media/two-army-soldiers-charged-selling-secrets-to-china