article thumbnail

Threat actor claims to have hacked European manufacturer of missiles MBDA

Security Affairs

The attackers said that the stolen data includes information about the employees of the company involved in military projects, commercial activities, contract agreements and correspondence with other companies. Adrastea said that they have found critical vulnerabilities in the company infrastructure and have stolen 60 GB of confidential data.

article thumbnail

EU leaders aim at boosting defense and security, including cybersecurity

Security Affairs

During a video conference of the members of the European Council, EU leaders agreed on a new strategy aimed at boosting defense and security. Following the Cybersecurity Strategy presented in December 2020, we invite the Commission and the High Representative to report on implementation by June 2021.” ”” Michel added.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Employees abused systems at Ukrainian nuclear power plant to mine cryptocurrency

Security Affairs

The equipment was discovered present in the power plant’s administration offices. The SBU seized equipment composed of two metal cases containing that included coolers and video cards ( Radeon RX 470 GPU), computer components commonly used in mining factories. ” reported ZDnet. ” reported ZDnet.

Mining 98
article thumbnail

NEW TECH: Circadence deploys ‘gamification’ training to shrink cybersecurity skills gap

The Last Watchdog

The Boulder, CO-based company got its start in the mid-1990s as a pioneer of massive multi-player video games. Even though game is in the name, gamification isn’t about turning a Power Point presentation into an interactive Angry Birds tournament. Could it play a role in closing the skills gap?

article thumbnail

Cellebrite ‘s forensics tool affected by arbitrary code execution issue

Security Affairs

The popular cryptographer and researcher Moxie claims the list of customers of the company includes authoritarian regimes in Belarus, Russia, Venezuela, and China, death squads in Bangladesh, and military juntas in Myanmar. Industry-standard exploit mitigation defenses are missing, and many opportunities for exploitation are present”.

article thumbnail

100th Anniversary of the Tomb of the Unknown Soldier in Moving Image Records

Unwritten Record

The records of the military branches are a particularly plentiful source of material, with footage from the 1921 ceremony through the early 21st century. These films were created to document visits to the Tomb by military officials, diplomats, and U.S.

article thumbnail

MY TAKE: Why companies and consumers must collaborate to stop the plundering of IoT systems

The Last Watchdog

IoT devices help remotely control our household appliances, power plants, smart buildings, factories, airports, shipyards, trucks, trains and military. Sherman “Sometimes we don’t even realize how many of our devices today have audio and video recording capabilities,” Sherman says. And we’re just getting started.

IoT 277