article thumbnail

US Disrupts Russian Military Intelligence Botnet

Data Breach Today

federal government says it disrupted a criminal botnet that Russian military intelligence had converted into a platform for global cyberespionage. The malware targets Linux-based IoT devices - in this case, routers made by New York manufacturer Ubiquiti. GRU Hackers Commandeered 'Moobot' for Cyberespionage The U.S.

Military 191
article thumbnail

Million of vehicles can be attacked via MiCODUS MV720 GPS Trackers

Security Affairs

” The MiCODUS MV720 GPS Tracker is a popular vehicle GPS tracker manufactured in China, which is used by consumers for theft protection and location management, and by organizations for vehicle fleet management. The analysis of the sector usage on a global scale revealed significant differences by continent in the typical user profile.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Episode 249: Intel Federal CTO Steve Orrin on the CHIPS Act and Supply Chain Security

The Security Ledger

Related Stories Forget the IoT. Steve talks about his work representing Intel and its technologies to the Federal Government and the impact of the recent passage of the CHIPS Act, a huge federal investment in promoting domestic manufacturing of semiconductors. New IoT Security Regulations on Tap in U.S., Read the whole entry. »

article thumbnail

White House Releases National Cybersecurity Strategy

Hunton Privacy

s ability to assist allies and partners in strengthening cybersecurity, (iv) building coalitions to reinforce global norms of responsible state behavior, and (v) securing global supply chains for information, communications and operational technology products and services that power the U.S. economy.

article thumbnail

Supply Chain Security is the Whole Enchilada, But Who’s Willing to Pay for It?

Krebs on Security

The chips were alleged to have spied on users of the devices and sent unspecified data back to the Chinese military. Supermicro has assembly facilities in California, the Netherlands, and Taiwan, but its motherboards—its core product—are nearly all manufactured by contractors in China. But the U.S.

article thumbnail

Highlights from the New U.S. Cybersecurity Strategy

Krebs on Security

military in disrupting cybercriminal infrastructure, and it names China as the single biggest cyber threat to U.S. based semiconductor manufacturing and research and to make the U.S. The White House’s new national cybersecurity strategy also envisions a more active role by cloud providers and the U.S. ” Many of the U.S.

article thumbnail

MY TAKE: How state-backed cyber ops have placed the world in a constant-state ‘Cyber Pearl Harbor’

The Last Watchdog

That May 10th air strike by the Israel Defense Force marked the first use of military force in direct retaliation for cyber spying. This comes as no surprise to anyone in the military or intelligence communities. nuclear arsenal in 2003 • Breaches of computers at the Department of Commerce in 2006 • Hacking of military systems at U.S.

IoT 171