Australia Took Military System Offline Over Hack Fears

Data Breach Today

Defense Department Says No Data Was Compromised Australia reportedly took a sensitive military recruiting database offline for 10 days in February following concerns it may have been compromised.

U.S. Charges 4 Chinese Military Officers in 2017 Equifax Hack

Krebs on Security

as members of the PLA’s 54 th Research Institute, a component of the Chinese military. military against foreign targets, Barr said the DOJ did so in this case because the accused “indiscriminately” targeted American civilians on a massive scale. The U.S.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

UK printing company Doxzoo exposed US and UK military docs

Security Affairs

UK printing company Doxzoo exposed hundreds of gigabytes of information, including documents related to the US and British military. The researchers reported their discovery to the company on January 26, but it never responded.

Maze ransomware operators stole data from US military contractor Westech

Security Affairs

Hackers have stolen confidential documents from the US military contractor Westech, which provides critical support for US Minuteman III nuclear deterrent. The post Maze ransomware operators stole data from US military contractor Westech appeared first on Security Affairs.

DOJ: Company Sold Gear With Security Flaws to US Military

Data Breach Today

Prosecutors Allege Firm Sold Chinese Surveillance Tech That Contained Vulnerabilities Federal prosecutors have charged a Long Island company, along with seven of its employees, with selling vulnerability-laden Chinese technology to the U.S.

NATO military command center should be fully operational in 2023

Security Affairs

The NATO military command center should be fully operational in 2023, every member states will contribute with its cyber capabilities to the military hub. NATO alliance is aware of growing threats in the cyberspace and the new NATO military command center aims to respond them.

Chinese APT Tropic Trooper target air-gapped military Networks in Asia

Security Affairs

Chinese threat actors, tracked as Tropic Trooper and KeyBoy, has been targeting air-gapped military networks in Taiwan and the Philippines. The threat actor targeted government offices, military, healthcare, transportation, and high-tech industries in Taiwan , the Philippines, and Hong Kong.

African American Women in the Military During WWII

Unwritten Record

For some great background information, be sure to visit our previous blog – Their War Too: Women in the Military During WWII. American citizens surged to enlist in all branches of the US Military and women wanted to serve their country too.

Germany and the Netherlands agreded to build TEN, the first ever joint military internet

Security Affairs

The governments of Germany and The Netherlands agreed to build the first-ever joint military Internet, so-called TEN (Tactical Edge Networking). “The name of this new Dutch-German military internet is the Tactical Edge Networking, or TEN, for short.”

How the US Military Can Better Keep Hackers

Schneier on Security

Interesting commentary : The military is an impossible place for hackers thanks to antiquated career management, forced time away from technical positions, lack of mission, non-technical mid- and senior-level leadership, and staggering pay gaps, among other issues.

Chinese Military Wants to Develop Custom OS

Schneier on Security

Since these leaks have revealed that the US can hack into almost anything, the Chinese government's plan is to adopt a "security by obscurity" approach and run a custom operating system that will make it harder for foreign threat actors -- mainly the US -- to spy on Chinese military operations.

Gamaredon APT Improves Toolset to Target Ukraine Government, Military

Threatpost

The Gamaredon advanced persistent threat (APT) group has been supercharging its operations lately, improving its toolset and ramping up attacks on Ukrainian national security targets.

Twitter, Facebook, and Instagram blocked in Turkey as Idlib military crisis escalates

Security Affairs

Network data collected by the NetBlocks internet observatory confirm that Turkey has blocked access to social media as Idlib military crisis escalates. It's 5:30 a.m. in #Turkey where social media have been blocked for six hours after a military incident in #Idlib , Syria.

Alleged cyber attacks caused fire and explosions at nuclear and military facilities in Iran

Security Affairs

The media reported a fire at the Natanz nuclear enrichment site and an explosion at the Parchin military complex near Tehran, the latter is suspected to be a government center for the production of missiles.

Russian military plans to replace Windows with Astra Linux

Security Affairs

The Russian military is in the process of replacing the Windows system with the Linux distribution Astra Linux. It provides data protectionup to the level of “top secret” in Russian classified information grade.”

Machete cyber-espionage group targets Latin America military

Security Affairs

Security experts from ESET uncovered a cyber-espionage group tracked as Machete that stole sensitive files from the Venezuelan military. Security experts from ESET reported that a cyberespionage group tracked as Machete has stolen sensitive files from the Venezuelan military.

Chinese Military personnel charged with hacking into credit reporting agency Equifax

Security Affairs

The United States Department of Justice charged 4 Chinese military hackers with hacking into credit reporting agency Equifax. The four members of the Chinese military unit are Wu Zhiyong (???), were members of the PLA’s 54 th Research Institute, a component of the Chinese military.

Autoclerk travel reservations platform data leak also impacts US Government and military

Security Affairs

“The data Our team viewed highly sensitive data exposing the personal details of government and military personnel, and their travel arrangements to locations around the world, both past and future.” “The greatest risk posed by this leak was to the US government and military.

A new piece of Ryuk Stealer targets government, military and finance sectors

Security Affairs

A new piece of the Ryuk malware has been improved to steal confidential files related to the military, government, financial statements, and banking. It is not clear if the malware was developed by the threat actors behind Ryuk Ransomware for data exfiltration.

Their War Too: U.S. Women in the Military During WWII. Part I

Unwritten Record

This year, we are focusing on the role women played in the United States Military during World War II in a two-part blog post. The size of the global conflict was unprecedented and once the United States entered the war, its citizens had to mobilize quickly. It’s Your War, Too.

Operation In(ter)reception targets Military and Aerospace employees in Europe and the Middle East

Security Affairs

Experts uncovered a new cyber-espionage campaign, dubbed “ Operation In(ter)receptio n,” aimed at aerospace and military organizations in Europe and the Middle East. Finally, it created a scheduled task, set to execute a remote XSL script periodically via the copied WMIC.exe.”

InvisiMole group targets military sector and diplomatic missions in Eastern Europe

Security Affairs

Security researchers at ESET recently uncovered a campaign carried out by the InvisiMole group that has been targeting a small number of high-profile organizations in the military sector and diplomatic missions in Eastern Europe.

Military justice

InfoGovNuggets

A Brigadier General in charge defending the accused at Guantanamo was arrested on the order of a military judge. The General’s crime: allowing other civilian defense attorneys to resign after it was discovered the Government had bugged the room where the attorneys met with their clients. Do military judges have more power than either they think they have or that they should? A new oxymoron.

Polar Fitness App Exposes Location of ‘Spies’ and Military Personnel

Threatpost

The fitness app Polar Flow exposes the whereabouts of some of its high-profile users, including “spies” and those with sensitive positions in the military. Hacks Mobile Security Privacy Fitness tracker geolocation data IoT military personnel polar polar fitness Polar Flow spies

Security Pros Agree Military Should Conduct Offensive Hacking

Dark Reading

But it can't operate in a bubble, a new Washington Post study indicates

OP Glowing Symphony – How US military claims to have disrupted ISIS ‘s propaganda

Security Affairs

US military claims to have disrupted the online propaganda activity of the Islamic State (ISIS) in a hacking operation dating back at least to 2016. It was initially approved for a 30-day period in late 2016, but it was later extended.

U.S. military to trawl through 350B social media messages

Information Management Resources

military plans to analyze 350 billion social-media posts from around the world to help it track how popular movements evolve. The U.S. Social media Internet Data management

Their War Too: U.S. Women in the Military During WWII. Part II

Unwritten Record

In part I of this two-part series, we discussed the role women played in the military during World War II by highlighting those who served in the Women’s Army Corps (WAC), the Coast Guard Women’s Reserve (SPARS), and the Women Air Force Service Pilots (WASP) during World War II.

The Military Should Teach Artificial Intelligence to Watch Drone Footage

WIRED Threat Level

Opinion: The Pentagon collects so much surveillance footage that humans can’t watch all of it. It’s time to deploy AI. Security Opinion

City of Pensacola hit by a cyberattack few days after military base shooting

Security Affairs

City IT staff has been working to restore the network, but some services are still down. In response to the incident, the city was forced to disconnect most of its systems, the attack impacted emails, telephone lines, and online payment services.

Forward Progress: Congress Requires DOD to Digitize DD-214 Military Service Records

Archives Blogs

By doing so, the FY 2020 NDAA is a very small step toward the “government-wide technology investment strategy” that PIDB advocated for in its 2016 Report to the President, The Importance of Technology in Classification and Declassification.

Military documents about MQ-9 Reaper drone leaked on dark web

The Security Ledger

Hackers have put up for sale on the dark web sensitive military documents, some associated with the U.S. military’s MQ-9 Reaper drone aircraft, one of its most lethal and technologically advanced drones, security research firm Recorded Future recently discovered. » Related Stories Fitness apps: Good for your health, not so much for military security Evasive new botnet can take over enterprise devices to steal data, spread ransomware U.S.

NSA releases a guide to reduce location tracking risks

Security Affairs

It can reveal details about the number of users in a location, user and supply movements, daily routines (user and organizational), and can expose otherwise unknown associations between users and locations.”

Risk 73

From China with Love: New York Firm sold millions in PRC Surveillance Gear to US Government, Military

The Security Ledger

Military, the Department of Energy and other government agencies that it claimed were "Made in the U.S.A". A complaint unsealed by the Department of Justice on Thursday alleges a New York firm engineered a years-long scheme to deceive the U.S.

Secret Service Investigates Breach at U.S. Govt IT Contractor

Krebs on Security

Secret Service is investigating a breach at a Virginia-based government technology contractor that saw access to several of its systems put up for sale in the cybercrime underground, KrebsOnSecurity has learned. It’s down when you get to the tier-three and the tier-four” subcontractors.

IT 240

The NSA on the Risks of Exposing Location Data

Schneier on Security

While the guidance in this document may be useful to a wide range of users, it is intended primarily for NSS/DoD system users. It's hard to be clandestine in our always connected world. cybersecurity geolocation military nsa riskassessment risks smartphones tracking

Risk 84

How the U.S. Army Served its Movie-Mad GIs during World War II

Unwritten Record

The ease with which most of us stream movies and television makes it hard to. Army Signal Corps as part of its “Film Bulletin” series , showcases the military’s efforts to produce and bring films to soldiers overseas during the Second World War.