U.S. Charges 4 Chinese Military Officers in 2017 Equifax Hack

Krebs on Security

as members of the PLA’s 54 th Research Institute, a component of the Chinese military. military against foreign targets, Barr said the DOJ did so in this case because the accused “indiscriminately” targeted American civilians on a massive scale. The U.S.

DOJ: Company Sold Gear With Security Flaws to US Military

Data Breach Today

Prosecutors Allege Firm Sold Chinese Surveillance Tech That Contained Vulnerabilities Federal prosecutors have charged a Long Island company, along with seven of its employees, with selling vulnerability-laden Chinese technology to the U.S.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

NATO military command center should be fully operational in 2023

Security Affairs

The NATO military command center should be fully operational in 2023, every member states will contribute with its cyber capabilities to the military hub. NATO alliance is aware of growing threats in the cyberspace and the new NATO military command center aims to respond them.

Gamaredon APT Improves Toolset to Target Ukraine Government, Military

Threatpost

The Gamaredon advanced persistent threat (APT) group has been supercharging its operations lately, improving its toolset and ramping up attacks on Ukrainian national security targets.

Chinese Military Wants to Develop Custom OS

Schneier on Security

Since these leaks have revealed that the US can hack into almost anything, the Chinese government's plan is to adopt a "security by obscurity" approach and run a custom operating system that will make it harder for foreign threat actors -- mainly the US -- to spy on Chinese military operations.

Locating Secret Military Bases via Fitness Data

Schneier on Security

Over this weekend, someone realized that it could be used to locate secret military bases: just look for repeated fitness activity in the middle of nowhere. datacollection geolocation military secrecy

Chinese Military personnel charged with hacking into credit reporting agency Equifax

Security Affairs

The United States Department of Justice charged 4 Chinese military hackers with hacking into credit reporting agency Equifax. The four members of the Chinese military unit are Wu Zhiyong (???), were members of the PLA’s 54 th Research Institute, a component of the Chinese military.

How the US Military Can Better Keep Hackers

Schneier on Security

Interesting commentary : The military is an impossible place for hackers thanks to antiquated career management, forced time away from technical positions, lack of mission, non-technical mid- and senior-level leadership, and staggering pay gaps, among other issues.

Autoclerk travel reservations platform data leak also impacts US Government and military

Security Affairs

“The data Our team viewed highly sensitive data exposing the personal details of government and military personnel, and their travel arrangements to locations around the world, both past and future.” “The greatest risk posed by this leak was to the US government and military.

Machete cyber-espionage group targets Latin America military

Security Affairs

Security experts from ESET uncovered a cyber-espionage group tracked as Machete that stole sensitive files from the Venezuelan military. Security experts from ESET reported that a cyberespionage group tracked as Machete has stolen sensitive files from the Venezuelan military.

Russian military plans to replace Windows with Astra Linux

Security Affairs

The Russian military is in the process of replacing the Windows system with the Linux distribution Astra Linux. It provides data protectionup to the level of “top secret” in Russian classified information grade.”

A new piece of Ryuk Stealer targets government, military and finance sectors

Security Affairs

A new piece of the Ryuk malware has been improved to steal confidential files related to the military, government, financial statements, and banking. It is not clear if the malware was developed by the threat actors behind Ryuk Ransomware for data exfiltration.

Their War Too: U.S. Women in the Military During WWII. Part I

Unwritten Record

This year, we are focusing on the role women played in the United States Military during World War II in a two-part blog post. The size of the global conflict was unprecedented and once the United States entered the war, its citizens had to mobilize quickly. It’s Your War, Too.

Military justice

InfoGovNuggets

A Brigadier General in charge defending the accused at Guantanamo was arrested on the order of a military judge. The General’s crime: allowing other civilian defense attorneys to resign after it was discovered the Government had bugged the room where the attorneys met with their clients. Do military judges have more power than either they think they have or that they should? A new oxymoron.

Polar Fitness App Exposes Location of ‘Spies’ and Military Personnel

Threatpost

The fitness app Polar Flow exposes the whereabouts of some of its high-profile users, including “spies” and those with sensitive positions in the military. Hacks Mobile Security Privacy Fitness tracker geolocation data IoT military personnel polar polar fitness Polar Flow spies

OP Glowing Symphony – How US military claims to have disrupted ISIS ‘s propaganda

Security Affairs

US military claims to have disrupted the online propaganda activity of the Islamic State (ISIS) in a hacking operation dating back at least to 2016. It was initially approved for a 30-day period in late 2016, but it was later extended.

Security Pros Agree Military Should Conduct Offensive Hacking

Dark Reading

But it can't operate in a bubble, a new Washington Post study indicates

MY TAKE: Let’s not lose sight of why Iran is pushing back with military, cyber strikes

The Last Watchdog

It is not often that I hear details about the cyber ops capabilities of the USA or UK discussed at the cybersecurity conferences I attend. Related: We’re in the golden age of cyber spying Despite the hush-hush nature of Western cyber ops, it is axiomatic in technology and intelligence circles that the USA and UK possess deep hacking and digital spying expertise – capabilities which we regularly deploy to optimize our respective positions in global affairs.

City of Pensacola hit by a cyberattack few days after military base shooting

Security Affairs

City IT staff has been working to restore the network, but some services are still down. In response to the incident, the city was forced to disconnect most of its systems, the attack impacted emails, telephone lines, and online payment services.

U.S. military to trawl through 350B social media messages

Information Management Resources

military plans to analyze 350 billion social-media posts from around the world to help it track how popular movements evolve. The U.S. Social media Internet Data management

The Military Should Teach Artificial Intelligence to Watch Drone Footage

WIRED Threat Level

Opinion: The Pentagon collects so much surveillance footage that humans can’t watch all of it. It’s time to deploy AI. Security Opinion

Their War Too: U.S. Women in the Military During WWII. Part II

Unwritten Record

In part I of this two-part series, we discussed the role women played in the military during World War II by highlighting those who served in the Women’s Army Corps (WAC), the Coast Guard Women’s Reserve (SPARS), and the Women Air Force Service Pilots (WASP) during World War II.

Secret Service Investigates Breach at U.S. Govt IT Contractor

Krebs on Security

Secret Service is investigating a breach at a Virginia-based government technology contractor that saw access to several of its systems put up for sale in the cybercrime underground, KrebsOnSecurity has learned. It’s down when you get to the tier-three and the tier-four” subcontractors.

IT 285

How the U.S. Army Served its Movie-Mad GIs during World War II

Unwritten Record

The ease with which most of us stream movies and television makes it hard to. Army Signal Corps as part of its “Film Bulletin” series , showcases the military’s efforts to produce and bring films to soldiers overseas during the Second World War.

From China with Love: New York Firm sold millions in PRC Surveillance Gear to US Government, Military

The Security Ledger

Military, the Department of Energy and other government agencies that it claimed were "Made in the U.S.A". A complaint unsealed by the Department of Justice on Thursday alleges a New York firm engineered a years-long scheme to deceive the U.S.

Military documents about MQ-9 Reaper drone leaked on dark web

The Security Ledger

Hackers have put up for sale on the dark web sensitive military documents, some associated with the U.S. military’s MQ-9 Reaper drone aircraft, one of its most lethal and technologically advanced drones, security research firm Recorded Future recently discovered. » Related Stories Fitness apps: Good for your health, not so much for military security Evasive new botnet can take over enterprise devices to steal data, spread ransomware U.S.

UK, US and its allies blame Russia’s GRU for 2019 cyber-attacks on Georgia

Security Affairs

The governments of Britain and the US declared that Russia’s military intelligence service GRU is behind the massive cyber attack that hit Georgia during 2019. The APT28 group has been active since at least 2007 and it has targeted governments, militaries, and security organizations worldwide.

China's AI Strategy and its Security Implications

Schneier on Security

Allen at the Center for a New American Security has a new report with some interesting analysis and insights into China's AI strategy, commercial, government, and military. Gregory C.

Poland to establish Cyberspace Defence Force by 2024

Security Affairs

Poland announced it will launch a cyberspace defense force by 2024 composed of around 2,000 soldiers with a deep knowledge in cybersecurity. The news was reported by AFP, Blaszczak announced that the cyber command unit would start its operations in 2022.

Uncommon Valor: The Making of the Marine Corps Memorial

Unwritten Record

The film, Uncommon Valor , offers viewers a unique perspective of the creation of the memorial and the thought process behind it. The title of the film takes its name from a quote located on the memorial itself, “Uncommon Valor was a Common Virtue.”

U.S. military trusted more than Google, Facebook to develop AI

Information Management Resources

But Americans don’t trust it to do so responsibly, a survey from a U.K. Facebook Inc. is among the technology companies leading the race to develop artificial intelligence. think tank has found. Artificial intelligence Machine learning Facebook Google

Supply Chain Security is the Whole Enchilada, But Who’s Willing to Pay for It?

Krebs on Security

There aren’t any corroborating accounts of this scoop so far, but it is both fascinating and terrifying to look at why threats to the global technology supply chain can be so difficult to detect, verify and counter. Least privilege is expensive to administer but it is effective.

IT 285

The Air Force Wants to Give You Its Credit Card

WIRED Threat Level

Will Roper, acquisition executive for the US Air Force, talks to WIRED's editor-in-chief about making the military more adaptive, the role of AI, and what he worries about every day. Security

Cloud Security Fail: Classified U.S. Military Data Exposed in Amazon S3 Bucket

eSecurity Planet

The exposed data includes information on the Army's Distributed Common Ground System and its cloud component, Red Disk

DOD DISA US agency discloses a security breach

Security Affairs

The Defense Information Systems Agency (DISA) US agency in charge of secure IT and communication for the White House has disclosed a data breach. military and civilian personnel.

Attacking Soldiers on Social Media

Schneier on Security

A research group at NATO's Strategic Communications Center of Excellence catfished soldiers involved in an European military exercise -- we don't know what country they were from -- to demonstrate the power of the attack technique. It's varied, but everybody has a button.

The Sky No Longer Has Limits: Female Fighter Pilots and the Combat Exclusion Policy

Unwritten Record

The change only pertained to aviation positions and it wasn’t until 2013 that the policy was lifted from all assignments. A special edition of “Air Force Television News” distributed the press conference to members of the military. Archives Military U.S.