article thumbnail

Leaking Military Secrets on Gaming Discussion Boards

Schneier on Security

People are leaking classified military information on discussion boards for the video game War Thunder to win arguments — repeatedly. Uncategorized games leaks military operational security secrecy

article thumbnail

Military Cryptanalytics, Part III

Schneier on Security

The NSA has just declassified and released a redacted version of Military Cryptanalytics , Part III, by Lambros D. Uncategorized cryptanalysis FOIA history of cryptography military NSA

Military 132
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

UAC-0142 APT targets Ukraine’s Delta military intelligence program

Security Affairs

Ukraine’s CERT-UA revealed the national Delta military intelligence program has been targeted with a malware-based attack. ” states the Ukrainian military. SecurityAffairs – hacking, Delta military intelligence).

article thumbnail

More Military Cryptanalytics, Part III

Schneier on Security

Callimahos’s Military Cryptanalytics, Part III. Uncategorized cryptanalysis cryptography FOIA history of cryptography military NSALate last year, the NSA declassified and released a redacted version of Lambros D. We just got most of the index. It’s hard to believe that there are any real secrets left in this 44-year-old volume.

article thumbnail

Snatch group claims to have hacked military provider HENSOLDT France

Security Affairs

The Snatch ransomware group claims to have hacked HENSOLDT France, a company specializing in military and defense electronics. HENSOLDT is a company specializing in military and defense electronics.

Military 123
article thumbnail

Iran's Military Reportedly Backs Ransomware Campaign

Data Breach Today

Iran's Islamic Revolutionary Guard Corps was behind a ransomware campaign that used a contracting company called "Emen Net Pasargard" to target more than a dozen organizations, according to the security firm Flashpoint. Could Cyberespionage Be Campaign's Real Purpose?

Military 225
article thumbnail

Security News This Week: Sensitive US Military Emails Exposed

WIRED Threat Level

Security Security / Cyberattacks and Hacks Security / Security News Security / Privacy Security / National SecurityPlus: Iran’s secret torture black sites, hacking a bank account with AI-generated voice, and Lance Bass’ unhinged encounter in Russia.

article thumbnail

US Military Emails Exposed via Cloud Account

Dark Reading

A DoD email server hosted in the cloud (and now secured) had no password protection in place for at least two weeks

article thumbnail

U.S. Charges 4 Chinese Military Officers in 2017 Equifax Hack

Krebs on Security

as members of the PLA’s 54 th Research Institute, a component of the Chinese military. military against foreign targets, Barr said the DOJ did so in this case because the accused “indiscriminately” targeted American civilians on a massive scale. The U.S.

Military 246
article thumbnail

UK won the Military Cyberwarfare exercise Defence Cyber Marvel 2 (DCM2)

Security Affairs

This year, 750 cyber specialists have participated in the military cyberwarfare exercise. ” Britain’s 7 Military Intelligence team, who competed remotely from Italy, won the exercise, followed by te Tallinn-based 5 Military Intelligence.

article thumbnail

Anonymous targets the Russian Military and State Television and Radio propaganda

Security Affairs

Anonymous continues to support Ukraine against the Russian criminal invasion targeting the Russian military and propaganda. List of Russian military stationed in Bucha (51460). The Russian government has declared VGTRK essential for the “security of the state.”

Military 131
article thumbnail

Facebook Catches Iranian Spies Catfishing US Military Targets

WIRED Threat Level

Security Security / Security NewsThe hackers posed as recruiters, journalists, and hospitality workers to lure its victims.

Military 137
article thumbnail

Report Outlines Military Health Facility Security Weaknesses

Data Breach Today

Watchdog Agency: Problems Put Patient Data at Risk Some military health facilities haven't consistently implemented security controls, putting patient data at risk, according to a new watchdog agency report. But security experts say the weaknesses are quite common at civilian health facilities as well

Military 100
article thumbnail

DOJ: Company Sold Gear With Security Flaws to US Military

Data Breach Today

military and other agencies for a decade and passing the gear off as American made Prosecutors Allege Firm Sold Chinese Surveillance Tech That Contained Vulnerabilities Federal prosecutors have charged a Long Island company, along with seven of its employees, with selling vulnerability-laden Chinese technology to the U.S.

Military 113
article thumbnail

Facebook Ad Services Let Anyone Target US Military Personnel

WIRED Threat Level

Researchers warn that an advertising platform with categories like “Army” and “United States Air Force Security Sources” could be abused. Security Security / Security News

Military 138
article thumbnail

UK printing company Doxzoo exposed US and UK military docs

Security Affairs

UK printing company Doxzoo exposed hundreds of gigabytes of information, including documents related to the US and British military. Security experts at vpnMentor discovered 343GB worth of files belonging to the printing company Doxzoo that were exposed on an AWS server.

Military 109
article thumbnail

BlackCat Ransomware gang stole secret military data from an industrial explosives manufacturer

Security Affairs

The BlackCat Ransomware group claims to have hacked SOLAR INDUSTRIES INDIA and to have stolen 2TB of “secret military data.” “Because of low security, more than 2TB of sensitive data related to weapons production was stolen from Solar Industries India Limited.”

article thumbnail

A Trickbot Assault Shows US Military Hackers' Growing Reach

WIRED Threat Level

Security Security / Cyberattacks and HacksDespite the operation's short-term effects, it sets new precedents for the scope of Cyber Command's mission.

Military 143
article thumbnail

Ukraine: Belarusian APT group UNC1151 targets military personnel with spear phishing

Security Affairs

In August 2020, security experts from FireEye uncovered a disinformation campaign aimed at discrediting NATO by spreading fake news content on compromised news websites. The CERT of Ukraine (CERT-UA) warned of a spear-phishing campaign targeting Ukrainian armed forces personnel.

Military 127
article thumbnail

NATO military command center should be fully operational in 2023

Security Affairs

The NATO military command center should be fully operational in 2023, every member states will contribute with its cyber capabilities to the military hub. The new NATO military command center should be fully operational in 2023, among its tasks the defense of the critical infrastructure of member states and the ability to carry out cyber attacks according to rules of engagement still to be defined. 31 at its military hub in Belgium.

article thumbnail

The Police's Military Tactics Turn Peaceful Protests Violent

WIRED Threat Level

Security Security / National SecurityResearch shows that calm and negotiation, not excessive force, reduces damage. So why are officers still turning to tear gas?

Military 143
article thumbnail

Ukraine: Military defense agencies and banks hit by cyberattacks

Security Affairs

PRIVATBANK WAF is watching you)” The Ukrainian Center for Strategic Communications and Information Security also published a post on Facebook explaining that clients of the Privatbank were not able to perform payments, however threat actors did not steal funds from their bank accounts.

article thumbnail

Germany and the Netherlands agreded to build TEN, the first ever joint military internet

Security Affairs

The governments of Germany and The Netherlands agreed to build the first-ever joint military Internet, so-called TEN (Tactical Edge Networking). Government officials from Germany and the Netherlands signed an agreement for the building of the first-ever joint military Internet, so-called TEN (Tactical Edge Networking). “The name of this new Dutch-German military internet is the Tactical Edge Networking, or TEN, for short.” SecurityAffairs – TEN, military).

article thumbnail

Locating Secret Military Bases via Fitness Data

Schneier on Security

Over this weekend, someone realized that it could be used to locate secret military bases: just look for repeated fitness activity in the middle of nowhere. datacollection geolocation military secrecyIn November, the company Strava released an anonymous data-visualization map showing all the fitness activity by everyone using the app.

article thumbnail

Maze ransomware operators stole data from US military contractor Westech

Security Affairs

Hackers have stolen confidential documents from the US military contractor Westech, which provides critical support for US Minuteman III nuclear deterrent. Security experts fear that hackers could attempt to sell stolen data about the nuclear deterrent on to a foreign state.

Military 106
article thumbnail

Military Carrier Pigeons in the Era of Electronic Warfare

Schneier on Security

camouflage espionage militaryThey have advantages : Pigeons are certainly no substitute for drones, but they provide a low-visibility option to relay information. Considering the storage capacity of microSD memory cards, a pigeon's organic characteristics provide front line forces a relatively clandestine mean to transport gigabytes of video, voice, or still imagery and documentation over considerable distance with zero electromagnetic emissions or obvious detectability to radar.

article thumbnail

LinkedIn ‘Job Offers’ Targeted Aerospace, Military Firms With Malware

Threatpost

A recent malware campaign targeted victims at European and Middle East aerospace and military companies - via LinkedIn spear-phishing messages. Hacks Web Security aerospace espionage LinkedIn Middle East Military operation in(ter)ception Spear Phishing

article thumbnail

How Military Tactics Apply to Cybersecurity

eSecurity Planet

Former West Point professor Greg Conti explains how military doctrines apply to cyber security, and what lessons enterprises can learn from that

article thumbnail

Unsecure Database Exposed US Military Personnel Data: Report

Data Breach Today

military and other government personnel, according to a new report from two independent security researchers Exposed Database Owned by AutoClerk Hotel Reservation Management System An unsecure database belonging to a company that provides hotel reservation management technology exposed about 179 GB of customer data, including travel arrangements and other data for U.S.

Military 113
article thumbnail

Chinese APT Tropic Trooper target air-gapped military Networks in Asia

Security Affairs

Chinese threat actors, tracked as Tropic Trooper and KeyBoy, has been targeting air-gapped military networks in Taiwan and the Philippines. The threat actor targeted government offices, military, healthcare, transportation, and high-tech industries in Taiwan , the Philippines, and Hong Kong.

Military 122
article thumbnail

Chinese Military Wants to Develop Custom OS

Schneier on Security

Citing security concerns, the Chinese military wants to replace Windows with its own custom operating system : Thanks to the Snowden, Shadow Brokers, and Vault7 leaks, Beijing officials are well aware of the US' hefty arsenal of hacking tools, available for anything from smart TVs to Linux servers, and from routers to common desktop operating systems, such as Windows and Mac.

article thumbnail

Military’s RFID Tracking of Guns May Endanger Troops

Threatpost

RFID gun tags leave the military exposed to tracking, sniffing and spoofing attacks, experts say. . Government Hacks Web Security

article thumbnail

Russian military plans to replace Windows with Astra Linux

Security Affairs

Cyber security seems to subvert the globalization concept, governments are working to develop their own technology fearing possible espionage and sabotage activities of foreign states. The Russian military is in the process of replacing the Windows system with the Linux distribution Astra Linux. “It has been officially certified by Russian Defense Ministry, Federal Service for Technical and Export Control and Federal Security Service.”

Military 106
article thumbnail

Naikon APT group uses new Nebulae backdoor in attacks aimed at military orgs

Security Affairs

China-linked APT Naikon employed a new backdoor in multiple cyber-espionage operations targeting military organizations from Southeast Asia in the last 2 years. The Naikon APT group mainly focuses on high-profile orgs, including government entities and military orgs.

Military 108
article thumbnail

Chinese Cycldek APT targets Vietnamese Military and Government in sophisticated attacks

Security Affairs

China-linked APT group Cycldek is behind an advanced cyberespionage campaign targeting entities in the government and military sector in Vietnam. ” If you want to receive the weekly Security Affairs Newsletter for free subscribe here.

Military 101
article thumbnail

Chinese APT CactusPete targets military and financial orgs in Eastern Europe

Security Affairs

China-linked threat actor tracked as CactusPete was employing an updated backdoor in recent attacks targeting military and financial organizations in Eastern Europe. The post Chinese APT CactusPete targets military and financial orgs in Eastern Europe appeared first on Security Affairs.

Military 106
article thumbnail

Twitter, Facebook, and Instagram blocked in Turkey as Idlib military crisis escalates

Security Affairs

Network data collected by the NetBlocks internet observatory confirm that Turkey has blocked access to social media as Idlib military crisis escalates. in #Turkey where social media have been blocked for six hours after a military incident in #Idlib , Syria.

Military 114
article thumbnail

EU Council sanctions two Russian military intelligence officers over 2015 Bundestag hack

Security Affairs

The Council of the European Union announced sanctions imposed on Russian military intelligence officers for 2015 Bundestag hack. The post EU Council sanctions two Russian military intelligence officers over 2015 Bundestag hack appeared first on Security Affairs.

article thumbnail

A new piece of Ryuk Stealer targets government, military and finance sectors

Security Affairs

A new piece of the Ryuk malware has been improved to steal confidential files related to the military, government, financial statements, and banking. The post A new piece of Ryuk Stealer targets government, military and finance sectors appeared first on Security Affairs.

Military 108
article thumbnail

Machete cyber-espionage group targets Latin America military

Security Affairs

Security experts from ESET uncovered a cyber-espionage group tracked as Machete that stole sensitive files from the Venezuelan military. Security experts from ESET reported that a cyberespionage group tracked as Machete has stolen sensitive files from the Venezuelan military. The group has been active since 2010 and hit military organizations and other high-profile targets worldwide.