article thumbnail

Pro-Ukraine attackers compromise Docker images to launch DDoS attacks on Russian sites

Security Affairs

Pro-Ukraine hackers, likely linked to Ukraine IT Army , are using Docker images to launch distributed denial-of-service (DDoS) attacks against a dozen websites belonging to government, military, and media. The DDoS attacks also targeted three Lithuanian media websites. ” reported Crowdstrike.

Honeypots 103
article thumbnail

RedFoxtrot operations linked to China’s PLA Unit 69010 due to bad opsec

Security Affairs

Experts attribute a series of cyber-espionage campaigns dating back to 2014, and focused on gathering military intelligence, to China-linked Unit 69010. These targets suggest the group is likely interested in gathering intelligence on military technology and defense” reads the report published by the Insikt Group.

Military 111
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Security Affairs newsletter Round 450 by Pierluigi Paganini – INTERNATIONAL EDITION

Security Affairs

CISA and ENISA enhance their Cooperation CISA adds Qlik bugs to exploited vulnerabilities catalog Report: 2.6

article thumbnail

Jen Easterly Takes Charge of CISA At Black Hack USA 2021

ForAllSecure

The new Director of the Cybersecurity and Infrastructure Security Agency (CISA), Jen Easterly, opened Day 2 of Black Hat USA 2021 with a remote presentation on Hacking the Cybersecurity Puzzle. She is a daughter of a military father and so she went to West Point Academy, as one of the first female cadets. There are 3.5

article thumbnail

Security Affairs newsletter Round 312

Security Affairs

Every week the best security articles from Security Affairs free for you in your email box.

article thumbnail

Ethical Hackers: A Business’s Best Friend?

Thales Cloud Protection & Licensing

As a result, businesses are being forced to take the issue of cybersecurity more seriously, facing it head on and putting in place the necessary steps (e.g., military and Apple regularly offering rewards to anyone who can find and report vulnerabilities. Diving: Ethical hackers will also go dumpster diving (i.e.,

Cloud 91
article thumbnail

The Hacker Mind: Hackers Wanted: Filling the Cybersecurity Skills Gap

ForAllSecure

In this episode, Sonny Sandelius , Assistant Director of the SANS workforce programs, talks about programs that recruit people from outside computer sciences, encouraging those from diverse backgrounds who share the curiosity and the basic aptitude necessary to become hired cybersecurity professionals in as little as six months.