article thumbnail

Employees abused systems at Ukrainian nuclear power plant to mine cryptocurrency

Security Affairs

The Ukrainian Secret Service is investigating the case of employees at a nuclear power plant that connected its system online to mine cryp tocurrency. On July 10, agents of the SBU raided the nuclear power plant and discovered the equipment used by the employees to mining cryptocurrency. ” reported ZDnet. ” reported ZDnet.

Mining 107
article thumbnail

RedFoxtrot operations linked to China’s PLA Unit 69010 due to bad opsec

Security Affairs

Experts attribute a series of cyber-espionage campaigns dating back to 2014, and focused on gathering military intelligence, to China-linked Unit 69010. These targets suggest the group is likely interested in gathering intelligence on military technology and defense” reads the report published by the Insikt Group. .

Military 122
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Guy Fawkes Day – LulzSec Italy hit numerous organizations in Italy

Security Affairs

Italian Military Personnel and National Association of Professional Educators. National Mining Office for Hydrocarbons & Geo-resources. Administrator Username & Password To Access Archive: [link]. Military Personnel. National Research Center’s Public Relations Office. 6 Databases Total: [link].

Passwords 105
article thumbnail

Security Affairs newsletter Round 450 by Pierluigi Paganini – INTERNATIONAL EDITION

Security Affairs

CISA and ENISA enhance their Cooperation CISA adds Qlik bugs to exploited vulnerabilities catalog Report: 2.6

article thumbnail

Security Affairs newsletter Round 264

Security Affairs

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for you in your email box. Copyright (C) 2014-2015 Media.net Advertising FZ-LLC All Rights Reserved -->. Copyright (C) 2014 Media.net Advertising FZ-LLC All Rights Reserved -->.

article thumbnail

Jen Easterly Takes Charge of CISA At Black Hack USA 2021

ForAllSecure

She is a daughter of a military father and so she went to West Point Academy, as one of the first female cadets. Oue particular passion of mine," Easterly said, "is developing diverse organizations. So the whole idea is we make cybersecurity careers more accessible so that more people can see themselves in assignment.".

article thumbnail

Ethical Hackers: A Business’s Best Friend?

Thales Cloud Protection & Licensing

The four key methods of an ethical hacker include: Monitoring: They’ll monitor a company to understand the data it creates and stores and where any sensitive data is — the gold mine hackers are after. military and Apple regularly offering rewards to anyone who can find and report vulnerabilities.

Cloud 91