Leaking Military Secrets on Gaming Discussion Boards

Schneier on Security

People are leaking classified military information on discussion boards for the video game War Thunder to win arguments — repeatedly. Uncategorized games leaks military operational security secrecy

Spear Phishing Campaign Targets the US Military

KnowBe4

Researchers at Zscaler warn that a spear phishing campaign is targeting the US military and other sectors with phishing emails that purport to be voicemail notifications.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Military Cryptanalytics, Part III

Schneier on Security

The NSA has just declassified and released a redacted version of Military Cryptanalytics , Part III, by Lambros D. Uncategorized cryptanalysis FOIA history of cryptography military NSA

Russia Warns of Military Action If US Attacks Infrastructure

Data Breach Today

Russian Foreign Ministry Says Aggressive Actions in Cyberspace Won’t Go Unanswered Top Russian diplomat Andrei Krutskikh is pressuring the U.S. to back down in cyberspace after the director of U.S. Cyber Command, Army Gen.

APT Group Targeting Military Refines Its Tactics

Data Breach Today

More Military Cryptanalytics, Part III

Schneier on Security

Callimahos’s Military Cryptanalytics, Part III. Uncategorized cryptanalysis cryptography FOIA history of cryptography military NSALate last year, the NSA declassified and released a redacted version of Lambros D. We just got most of the index. It’s hard to believe that there are any real secrets left in this 44-year-old volume.

The US Military Buys Commercial Location Data

Schneier on Security

Vice has a long article about how the US military buys commercial location data worldwide. military is buying the granular movement data of people around the world, harvested from innocuous-seeming apps, Motherboard has learned.

Iran's Military Reportedly Backs Ransomware Campaign

Data Breach Today

Could Cyberespionage Be Campaign's Real Purpose? Iran's Islamic Revolutionary Guard Corps was behind a ransomware campaign that used a contracting company called "Emen Net Pasargard" to target more than a dozen organizations, according to the security firm Flashpoint.

Veterans Explain How Military Service Prepared Them for Cybersecurity Careers

Dark Reading

The ability to handle intense pressure is just one of the skills that veterans bring to corporate cybersecurity work

U.S. Charges 4 Chinese Military Officers in 2017 Equifax Hack

Krebs on Security

as members of the PLA’s 54 th Research Institute, a component of the Chinese military. military against foreign targets, Barr said the DOJ did so in this case because the accused “indiscriminately” targeted American civilians on a massive scale. The U.S.

US Military Has Acted Against Ransomware Groups: Report

Dark Reading

Paul Nakasoke, head of US Cyber Command and director of the NSA, said the military has taken offensive action against ransomware groups

Australia Took Military System Offline Over Hack Fears

Data Breach Today

Defense Department Says No Data Was Compromised Australia reportedly took a sensitive military recruiting database offline for 10 days in February following concerns it may have been compromised.

Military Vets Share Lessons That Helped Them Build Infosec Startups

Dark Reading

Startup founders say serving in the military taught them how to defend against cyberattacks and how to build teams. These lessons are serving them well as they run their own companies

Celebrate Nurses Week with the Military Nurse

Unwritten Record

The nurse has a long history of serving the United States military. World War II presented a need for nurses and the military and American Red Cross initiated an intense recruitment and training program, resulting in nearly 74,00 women serving as nurses.

Chinese APT Bronze President Mounts Spy Campaign on Russian Military

Dark Reading

The war in Ukraine appears to have triggered a change in mission for the APT known as Bronze President (aka Mustang Panda

Anonymous targets the Russian Military and State Television and Radio propaganda

Security Affairs

Anonymous continues to support Ukraine against the Russian criminal invasion targeting the Russian military and propaganda. List of Russian military stationed in Bucha (51460).

LinkedIn ‘Job Offers’ Targeted Aerospace, Military Firms With Malware

Threatpost

A recent malware campaign targeted victims at European and Middle East aerospace and military companies - via LinkedIn spear-phishing messages. Hacks Web Security aerospace espionage LinkedIn Middle East Military operation in(ter)ception Spear Phishing

Transparent Tribe Mounts Ongoing Spy Campaign on Military, Government

Threatpost

Government Malware Vulnerabilities apt crimson RAT Cyberattacks cyberespionage data theft military targets Spear Phishing spy campaign transparent tribe usbwormThe group has added a management console and a USB worming function to its main malware, Crimson RAT.

Ukraine: Military defense agencies and banks hit by cyberattacks

Security Affairs

The post Ukraine: Military defense agencies and banks hit by cyberattacks appeared first on Security Affairs. Ukraine ‘s defense agencies and two state-owned banks were hit by Distributed Denial-of-Service (DDoS) attacks.

Military’s RFID Tracking of Guns May Endanger Troops

Threatpost

RFID gun tags leave the military exposed to tracking, sniffing and spoofing attacks, experts say. . Government Hacks Web Security

China's Military Behind 2017 Equifax Breach: DoJ

Dark Reading

Four members of China's People Liberation Army hacked the information broker, leading to the theft of sensitive data on approximately 145 million citizens

Veterans Day Military History Link Roundup

Unwritten Record

It marks the end of fighting in World War I, the war that was supposed to end all wars, and honors our nation’s military veterans. Here at the Unwritten Record, we share a lot of records related to military history and those who have served in the military.

State-Sponsored Phishing Attack Targeted Israeli Military Officials

Threatpost

Analysts have uncovered an Iran-linked APT sending malicious emails to top Israeli government officials. Government

African American Women in the Military During WWII

Unwritten Record

For some great background information, be sure to visit our previous blog – Their War Too: Women in the Military During WWII. American citizens surged to enlist in all branches of the US Military and women wanted to serve their country too.

Cyberattacks Rage in Ukraine, Support Military Operations

Threatpost

At least five APTs are believed involved with attacks tied ground campaigns and designed to damage Ukraine's digital infrastructure. Government Hacks

Report Outlines Military Health Facility Security Weaknesses

Data Breach Today

Watchdog Agency: Problems Put Patient Data at Risk Some military health facilities haven't consistently implemented security controls, putting patient data at risk, according to a new watchdog agency report. But security experts say the weaknesses are quite common at civilian health facilities as well

Facebook Catches Iranian Spies Catfishing US Military Targets

WIRED Threat Level

The hackers posed as recruiters, journalists, and hospitality workers to lure its victims. Security Security / Security News

UK printing company Doxzoo exposed US and UK military docs

Security Affairs

UK printing company Doxzoo exposed hundreds of gigabytes of information, including documents related to the US and British military. Military documents belong to the US and UK military, experts noticed that the incident also impacted Doxzoo customers from India, Nigeria and Sri Lanka.

NATO military command center should be fully operational in 2023

Security Affairs

The NATO military command center should be fully operational in 2023, every member states will contribute with its cyber capabilities to the military hub. The new NATO military command center should be fully operational in 2023, among its tasks the defense of the critical infrastructure of member states and the ability to carry out cyber attacks according to rules of engagement still to be defined. 31 at its military hub in Belgium.

DOJ: Company Sold Gear With Security Flaws to US Military

Data Breach Today

military and other agencies for a decade and passing the gear off as American made Prosecutors Allege Firm Sold Chinese Surveillance Tech That Contained Vulnerabilities Federal prosecutors have charged a Long Island company, along with seven of its employees, with selling vulnerability-laden Chinese technology to the U.S.

Unsecure Database Exposed US Military Personnel Data: Report

Data Breach Today

military and other government personnel, according to a new report from two independent security researchers Exposed Database Owned by AutoClerk Hotel Reservation Management System An unsecure database belonging to a company that provides hotel reservation management technology exposed about 179 GB of customer data, including travel arrangements and other data for U.S.

Locating Secret Military Bases via Fitness Data

Schneier on Security

Over this weekend, someone realized that it could be used to locate secret military bases: just look for repeated fitness activity in the middle of nowhere. datacollection geolocation military secrecyIn November, the company Strava released an anonymous data-visualization map showing all the fitness activity by everyone using the app.

Ukraine: Belarusian APT group UNC1151 targets military personnel with spear phishing

Security Affairs

The post Ukraine: Belarusian APT group UNC1151 targets military personnel with spear phishing appeared first on Security Affairs. The CERT of Ukraine (CERT-UA) warned of a spear-phishing campaign targeting Ukrainian armed forces personnel.

Facebook Ad Services Let Anyone Target US Military Personnel

WIRED Threat Level

Researchers warn that an advertising platform with categories like “Army” and “United States Air Force Security Sources” could be abused. Security Security / Security News

A Trickbot Assault Shows US Military Hackers' Growing Reach

WIRED Threat Level

Despite the operation's short-term effects, it sets new precedents for the scope of Cyber Command's mission. Security Security / Cyberattacks and Hacks

Military Carrier Pigeons in the Era of Electronic Warfare

Schneier on Security

camouflage espionage militaryThey have advantages : Pigeons are certainly no substitute for drones, but they provide a low-visibility option to relay information. Considering the storage capacity of microSD memory cards, a pigeon's organic characteristics provide front line forces a relatively clandestine mean to transport gigabytes of video, voice, or still imagery and documentation over considerable distance with zero electromagnetic emissions or obvious detectability to radar.

Maze ransomware operators stole data from US military contractor Westech

Security Affairs

Hackers have stolen confidential documents from the US military contractor Westech, which provides critical support for US Minuteman III nuclear deterrent. The post Maze ransomware operators stole data from US military contractor Westech appeared first on Security Affairs.

The Police's Military Tactics Turn Peaceful Protests Violent

WIRED Threat Level

Research shows that calm and negotiation, not excessive force, reduces damage. So why are officers still turning to tear gas? Security Security / National Security

Germany and the Netherlands agreded to build TEN, the first ever joint military internet

Security Affairs

The governments of Germany and The Netherlands agreed to build the first-ever joint military Internet, so-called TEN (Tactical Edge Networking). Government officials from Germany and the Netherlands signed an agreement for the building of the first-ever joint military Internet, so-called TEN (Tactical Edge Networking). “The name of this new Dutch-German military internet is the Tactical Edge Networking, or TEN, for short.” SecurityAffairs – TEN, military).

How Military Tactics Apply to Cybersecurity

eSecurity Planet

Former West Point professor Greg Conti explains how military doctrines apply to cyber security, and what lessons enterprises can learn from that