article thumbnail

Microsoft links Cadet Blizzard APT to Russia’s military intelligence GRU

Security Affairs

The IT giant pointed out that Cadet Blizzard is distinct from other known APT groups operating under the control of the Russian military intelligence GRU, such as Forest Blizzard ( STRONTIUM ) and Seashell Blizzard (IRIDIUM). Unlike other Russia-linked APT group, CadetBlizzard operations are extremely disruptive.

article thumbnail

GUEST ESSAY – Notable events in hacking history that helped transform cybersecurity assessment

The Last Watchdog

Here are five notable historical events that influenced cybersecurity assessment and transformed it into what it is today: The Battle of Midway (1942). military officials hired data analysts to crack the Japanese secret code known as JN-25. After the devastating blow of Pearl Harbor, U.S. As a result, the U.S. The ILOVEYOU Worm (2000).

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Apply Military Strategy to Cybersecurity at Black Hat Trainings Virginia

Dark Reading

This special October event in Alexandria, Virginia offers unique, practical courses in everything from data breach response to military strategy for cybersecurity.

article thumbnail

Non-Military Photographs of Native Americans Within the Records of the Chief Signal Officer

Unwritten Record

In this blog post I will highlight some of the late 19th and early 20th century photographs that are located in the series 111-SC, Photographs of American Military Activities, ca. 1918-1981 whether your research involves military activities or not. 1918-1981 from record group 111, Records of the Chief Signal Officer, 1918-1981.

article thumbnail

Report: Recent 10x Increase in Cyberattacks on Ukraine

Krebs on Security

As their cities suffered more intense bombardment by Russian military forces this week, Ukrainian Internet users came under renewed cyberattacks, with one Internet company providing service there saying they blocked ten times the normal number of phishing and malware attacks targeting Ukrainians. Of those 121 million events, 4.6

Phishing 255
article thumbnail

Recent events at the Innovation Hub

Archives Blogs

The Innovation Hub accomplishes an important part of NARA’s mission to make access happen through digitization, and also serves as an important event space to bring together both internal and external stakeholders for collaborative activities and cooperative learning. Students in the National Archives Innovation Hub.

article thumbnail

Apr 03 – Apr 09 Ukraine – Russia the silent cyber conflict

Security Affairs

This post provides a timeline of the events related to the Russian invasion of Ukraine from the cyber security perspective. Below is the timeline of the events related to the ongoing invasion of Ukraine that occurred in the previous weeks: April 8 – Anonymous and the IT ARMY of Ukraine continue to target Russian entities.