article thumbnail

New HiatusRAT campaign targets Taiwan and U.S. military procurement system

Security Affairs

military procurement system. military procurement system and was spotted targeting Taiwan-based organizations The choice of the new targets in the latest campaign suggests a strategic interest of the People’s Republic of China according to the 2023 ODNI threat assessment. military server used for contract proposals and submissions.

article thumbnail

Weekly podcast: TSB, hotel locks and NATO exercise

IT Governance

This week, we discuss TSB’s chaotic system upgrade, a security flaw in electronic hotel locks and a major NATO cyber security exercise. Participating nations can practise “the entire chain of command in the event of a severe cyber incident, from strategic to operational level and involving both civilian and military capabilities”.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Wings for This Man: Celebrating the Tuskegee Airmen

Unwritten Record

The country needed to quickly increase the number of soldiers in the military while also increasing the production of wartime goods and manufacturing. Army Air Forces, was the first military unit to be made up entirely of Hollywood professionals. The First Motion Picture Unit, part of the U.S.

article thumbnail

Vladimir Putin ‘s computers still run Windows XP, Media reports

Security Affairs

In June, the Russian military announced it was in the process of replacing the Windows system with the Linux distribution Astra Linux . Astra Linux is a Debian-based distro developed in Russia by the Scientific/Manufacturing Enterprise Rusbitech RusBITech about ten years ago.

article thumbnail

2022 Cyber Security Review of the Year

IT Governance

Tensions rose throughout February as the Russian military amassed across the Ukrainian border. Although Vladimir Putin and his sympathisers assured the world that they were simply conducting military exercises, the inevitable occurred on 24 February, when troops mobilised and war was declared.

Security 132
article thumbnail

Vulnerabilities in Weapons Systems

Schneier on Security

Our military systems are vulnerable. We need to face that reality by halting the purchase of insecure weapons and support systems and by incorporating the realities of offensive cyberattacks into our military planning. Over the past decade, militaries have established cyber commands and developed cyberwar doctrine.

Military 143
article thumbnail

Weekly podcast: 2018 end-of-year roundup

IT Governance

The year started with the revelation of Spectre and Meltdown – major security flaws affecting processors manufactured by Intel, ARM and AMD. in which the travel records of military and civilian personnel – which included their personal information and credit card data – were compromised. Patches were rushed out , but many.