article thumbnail

Military Cryptanalytics, Part III

Schneier on Security

The NSA has just declassified and released a redacted version of Military Cryptanalytics , Part III, by Lambros D. Presumably, volumes IV, V, and VI are still hidden inside the classified libraries of the NSA. 20, “The Analysis of Systems Employing Long or Continuous Keys”; Monograph No. Callimahos, October 1977.

Military 126
article thumbnail

InvisiMole group targets military sector and diplomatic missions in Eastern Europe

Security Affairs

Security researchers at ESET recently uncovered a campaign carried out by the InvisiMole group that has been targeting a small number of high-profile organizations in the military sector and diplomatic missions in Eastern Europe. ” reads the analysis published by ESET. Pierluigi Paganini. SecurityAffairs – hacking, InvisiMole).

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

China-linked Alloy Taurus APT uses a Linux variant of PingPull malware

Security Affairs

On March 7, 2023, the researchers found a Linux variant of the PingPull that was uploaded to VirusTotal, it had a very low detection rate (3 out of 62) “Despite a largely benign verdict, additional analysis has determined that this sample is a Linux variant of PingPull malware. ” reads the analysis published by Unit 42.

article thumbnail

New Gallmaker APT group eschews malware in cyber espionage campaigns

Security Affairs

A previously unknown cyber espionage group, tracked as Gallmaker, has been targeting entities in the government, military and defense sectors since at least 2017. Gallmaker is a politically motivated APT group that focused its surgical operations on the government, military or defense sectors. ” continues Symantec.

article thumbnail

XDSpy APT remained undetected since at least 2011

Security Affairs

The APT group, recently discovered by ESET, targeted government and private companies in Belarus, Moldova, Russia, Serbia, and Ukraine, including militaries and Ministries of Foreign Affairs. The malware samples analyzed by the researchers are slightly obfuscated using string obfuscation and dynamic Windows API library loading.

Military 133
article thumbnail

China-linked APT40 group hides behind 13 front companies

Security Affairs

One of the above companies was headquartered in the University’s library, and the professor was also a former member of China’s military. “Following further analysis, we noticed a close association between these Hainan front companies and the academic world. ” continues the post.

article thumbnail

First Cyber Defence & Information Assurance courses to receive CILIP accreditation

CILIP

The collection, storage, analysis, use and cyber security of information represents major challenges and opportunities for all professions and I and my team are delighted and proud that our courses, that support the development of agile professionals for a digital world, have been recognised with accreditation by CILIP.? Notes for editors.