article thumbnail

GUEST ESSAY: How tech tricks used by Amazon, Netflix aid Ukraine in repelling Russia’s invasion

The Last Watchdog

Accessing video-based intelligence at the right time and place is a very effective method for gaining information about the constantly changing military landscape. Value of protocols Technological innovations have widely been credited for helping Ukraine even the odds against Russia’s military might.

Metadata 130
article thumbnail

Ukraine intelligence doxed 5 FSB Officers that are members of Gamaredon APT Group

Security Affairs

The SSU has managed to identify the perpetrators’ names, intercept their communication and obtain irrefutable evidence of their involvement in the attacks. The group targeted government and military organizations in Ukraine. 5 members of the group have been notified of suspicion of treason.” ” concludes the announcement.

Military 122
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Experts spotted two Android spyware used by Indian APT Confucius

Security Affairs

The two malware were used to spy on personnel linked to Pakistan’s military, nuclear authorities, and Indian election officials in Kashmir. ” Both malware can exfiltrate a wide range of data, including Call logs, Contacts, Device metadata (i.e. ” reads the report published by Lookout. ” concludes the report.

Metadata 112
article thumbnail

Operationalizing responsible AI principles for defense

IBM Big Data Hub

Recognizing this, the Department of Defense (DoD) launched the Joint Artificial Intelligence Center (JAIC) in 2019, the predecessor to the Chief Digital and Artificial Intelligence Office (CDAO), to develop AI solutions that build competitive military advantage, conditions for human-centric AI adoption, and the agility of DoD operations.

article thumbnail

Swiss army asks its personnel to use the Threema instant-messaging app

Security Affairs

All communication is end-to-end encrypted, and the app is open source. With this in mind, the army staff sent an email at the end of December to instruct all commanders and chiefs of staff to use the Threema messenger app for business communication with private smartphones from now on.” ” reported the Swiss Tagesanzeiger.

FOIA 105
article thumbnail

Q&A: Sophos poll shows how attackers are taking advantage of cloud migration to wreak havoc

The Last Watchdog

Digital commerce from day one has revolved around companies bulling forward to take full advantage of wondrous decentralized, anonymous characteristics of the Internet, which began a military-academic experiment. Murray: Yes, attackers are moving to more sophisticated attacks, as well. This enables them to footprint the customer environment.

Cloud 157
article thumbnail

APT28 and Upcoming Elections: evidence of possible interference

Security Affairs

This method allows to recover a property belonging to the document metadata. Figure 4: Payload stored in “Company” tag of document metadata. The network communication ends up into a command and control address is located in Czech Republic. Figure 7: user agent set by malware. Figure 8: information about DropURL/C2.