article thumbnail

Pro-Ukraine attackers compromise Docker images to launch DDoS attacks on Russian sites

Security Affairs

Pro-Ukraine hackers, likely linked to Ukraine IT Army , are using Docker images to launch distributed denial-of-service (DDoS) attacks against a dozen websites belonging to government, military, and media. CrowdStrike Intelligence assesses these actors almost certainly compromised the honeypots to support pro-Ukrainian DDoS attacks.

Honeypots 109
article thumbnail

Episode 255: EDM, Meet CDM – Cyber Dance Music with Niels Provos

The Security Ledger

Niels Provos has a storied, two decade career on the forefront of cybersecurity, starting in the late 1990s with his work as a graduate student on phenomena like steganography and honeypots. I’ve been working on this now for 25 years and I just don’t feel it’s getting better,” Niels told me.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Podcast Episode 109: What’s The US Freedom Army? Ask Russia.

The Security Ledger

Among the revelations: the prevalence of online efforts to organize real world gatherings, like the “US Freedom Army,” which appears to be a military organization promoted via Twitter and other social media to U.S. How about a secret “US Freedom Army” organized by Russia linked online “info ops?”

article thumbnail

Warning the World of a Ticking Time Bomb

Krebs on Security

A security expert who has briefed federal and military advisors on the threat says many victims appear to have more than one type of backdoor installed. Some victims had three of these web shells installed. One was pelted with eight distinct backdoors. . national security advisors on the outbreak. CHECK MY OWA.

Honeypots 334
article thumbnail

Network Security Architecture: Best Practices & Tools

eSecurity Planet

or specialized tools to deliver obfuscation defenses such as: Honeypots: Provide tempting targets for attackers that contain no valid information as one of several similar deception technologies to trigger alerts for early attack detection. Perimeter Defense Perimeter defense blocks threats at the network’s edge.

article thumbnail

Past, present, and future of the Dark Web

Security Affairs

These are historic points of aggregations where it was possible to buy drugs, weapons, and any kind of hacking tools. The icing on the cake was a US research that decreed how the size of the Dark Web was significantly lower than previously thought. This isn’t a novelty for the experts that are studying dark web and its evolution. THE DARK WEB.

article thumbnail

The Hacker Mind Podcast: Hacking Real World Criminals Online

ForAllSecure

While I produced this episode, a 21 year old Massachusetts National Guard airman is alleged to have photographed and distributed copies of classified US Military material on Discord, a social media site. You do the same, find clues, only the breadcrumbs that lead you to an arrest are digital. Here’s Attorney General Merrick Garland.

IT 40