article thumbnail

The US Military Buys Commercial Location Data

Schneier on Security

Vice has a long article about how the US military buys commercial location data worldwide. military is buying the granular movement data of people around the world, harvested from innocuous-seeming apps, Motherboard has learned. location data purchases have extended from law enforcement to military agencies.

Military 111
article thumbnail

New HiatusRAT campaign targets Taiwan and U.S. military procurement system

Security Affairs

military procurement system. military procurement system and was spotted targeting Taiwan-based organizations The choice of the new targets in the latest campaign suggests a strategic interest of the People’s Republic of China according to the 2023 ODNI threat assessment. military server used for contract proposals and submissions.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Autoclerk travel reservations platform data leak also impacts US Government and military

Security Affairs

The data leak exposed sensitive personal information of thousands of users worldwide and hotel guests, along with a hotel and travel reservations. The list of affected users includes the US government, military, and Department of Homeland Security (DHS). . ” reads the analysis published by vpnMentor. ” . .”

article thumbnail

Episode 256: Recursive Pollution? Data Feudalism? Gary McGraw On LLM Insecurity

The Security Ledger

Related Stories BitCoins To Bombs: North Korea Funds Military With Billions In Stolen Cryptocurrency China Calls Out U.S. The post Episode 256: Recursive Pollution? Read the whole entry. » » Click the icon below to listen. For Hacking.

article thumbnail

Accused ‘Raccoon’ Malware Developer Fled Ukraine After Russian Invasion

Krebs on Security

A 26-year-old Ukrainian man is awaiting extradition from The Netherlands to the United States on charges that he acted as a core developer for Raccoon , a popular “malware-as-a-service” offering that helped paying customers steal passwords and financial data from millions of cybercrime victims. According to those sources, U.S.

Military 292
article thumbnail

Russia-linked APT Gamaredon starts stealing data from victims between 30 and 50 minutes after the initial compromise

Security Affairs

Ukraine’s Computer Emergency Response Team (CERT-UA) states that Russia-linked APT Gamaredon starts stealing data 30 minutes after the initial compromise. The Gamaredon APT group continues to carry out attacks against entities in Ukraine, including security services, military, and government organizations.

article thumbnail

Understanding China’s Data Regulatory Regime: What Are Important Data? And Can They Be Transferred Outside Of China?

Data Matters

The concept of “important data” is a cornerstone of China’s data regulatory regime. The Cyber Security Law (2017) (the CSL ) prohibits operators of critical information infrastructures ( CIIs ) from transferring their “important data” and personal information outside of China. Then, what are “important data”?