article thumbnail

U.S. Charges 4 Chinese Military Officers in 2017 Equifax Hack

Krebs on Security

as members of the PLA’s 54 th Research Institute, a component of the Chinese military. Attorney General Bill Barr said at a press conference today that the Justice Department doesn’t normally charge members of another country’s military with crimes (this is only the second time the agency has indicted Chinese military hackers).

Military 246
article thumbnail

Chinese Cycldek APT targets Vietnamese Military and Government in sophisticated attacks

Security Affairs

China-linked APT group Cycldek is behind an advanced cyberespionage campaign targeting entities in the government and military sector in Vietnam. China-linked APT group LuckyMouse (aka Cycldek, Goblin Panda , Hellsing, APT 27, and Conimes) is targeting government and military organizations in Vietnam with spear-phishing.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

A brief history of cryptography: Sending secret messages throughout time

IBM Big Data Hub

Most cryptosystems begin with an unencrypted message known as plaintext, which is then encrypted into an indecipherable code known as ciphertext using one or more encryption keys. 650 BC: Ancient Spartans used an early transposition cipher to scramble the order of the letters in their military communications.

article thumbnail

InvisiMole group targets military sector and diplomatic missions in Eastern Europe

Security Affairs

Security researchers at ESET recently uncovered a campaign carried out by the InvisiMole group that has been targeting a small number of high-profile organizations in the military sector and diplomatic missions in Eastern Europe. ” reads the analysis published by ESET. Pierluigi Paganini. SecurityAffairs – hacking, InvisiMole).

article thumbnail

GCHQ implements World War II cipher machines in encryption app CyberChef

Security Affairs

UK intelligence agency GCHQ released emulators for World War II cipher machines (Enigma, Typex and The Bombe) that can be executed in the encryption app CyberChef. The post GCHQ implements World War II cipher machines in encryption app CyberChef appeared first on Security Affairs. Pierluigi Paganini.

article thumbnail

Google TAG warns that Russian COLDRIVER APT is using a custom backdoor

Security Affairs

The ColdRiver APT (aka “ Seaborgium “, “Callisto”, “Star Blizzard”, “TA446”) is a Russian cyberespionage group that has been targeting government officials, military personnel, journalists and think tanks since at least 2015. When the victims opens the PDF, an encrypted text is displayed. ” reads TAG’s analysis.

article thumbnail

Author Q&A: In modern cyberwarfare ‘information security’ is one in the same with ‘national security’

The Last Watchdog

Arquilla is a distinguished professor of defense analysis at the United States Naval Postgraduate School. Bitskrieg gives substance to, and connects the dots between, a couple of assertions that have become axiomatic: •Military might no longer has primacy. Keep info moving around in the Cloud – and keep it strongly encrypted.