article thumbnail

White hat hackers showed how to take over a European Space Agency satellite

Security Affairs

Credit: ESA – European Space Agency The offensive cybersecurity team at Thales demonstrated how to take control of the ESA satellite, the is considered the world’s first ethical satellite hacking exercise. Artist’s impression of OPS-SAT. The exercise aims at assessing the resilience of satellites to cyber attacks. .”

article thumbnail

Anonymous continues to support Ukraine against the Russia

Security Affairs

" You can: *E-mail random Russians: [link] & [link] *Text random Russians: [link] *WhatsApp random Russians [link] Inform the people of Russia about Ukraine! We do not know how to start this tweet… how to say HOW MUCH WE YOU! You are #Anonymous — Anonymous (@YourAnonNews) March 15, 2022.

Military 141
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Report: U.S. Cyber Command Behind Trickbot Tricks

Krebs on Security

military’s Cyber Command. ” Alex Holden , chief information security officer and president of Milwaukee-based Hold Security , has been monitoring Trickbot activity before and after the 10-day operation. A new report Friday says the coordinated attack was part of an operation carried out by the U.S.

article thumbnail

GUEST ESSAY: Preparing for the dire cybersecurity consequences of Russia’s invasion of Ukraine

The Last Watchdog

These Russian cyber actors are government organizations and include other parties who take their orders from the Russian military or intelligence organizations – while not technically under government control. About the essayist: Don Boian is the Chief Information Security Officer at Hound Labs, Inc.,

article thumbnail

China-linked APT Volt Typhoon remained undetected for years in US infrastructure

Security Affairs

agencies fear the possibility that these actors could gain access to the networks of critical infrastructure to cause disruptive effects in the event of potential geopolitical tensions and/or military conflicts. .” U.S.

article thumbnail

MY TAKE: COVID-19 cements the leadership role CISOs must take to secure company networks

The Last Watchdog

Chief Information Security Officers were already on the hot seat well before the COVID-19 global pandemic hit, and they are even more so today. One new challenge CISOs’ suddenly face is how to lock down web conferencing tools, like Zoom, Skype and Webex, without gutting their usefulness. Related: Why U.S. I’ll keep watch.

Security 309
article thumbnail

McAfee Finds Years-Long Attack by Chinese-Linked APT Groups

eSecurity Planet

“The exfiltrated data would have either been part of an intellectual property theft for economic purposes and/or would have provided insights that would be beneficial in case of military interventions. These tools were originally designed for red teams to test the security of their companies’ networks,” he said.

Military 145