U.S. Charges 4 Chinese Military Officers in 2017 Equifax Hack

Krebs on Security

as members of the PLA’s 54 th Research Institute, a component of the Chinese military. military against foreign targets, Barr said the DOJ did so in this case because the accused “indiscriminately” targeted American civilians on a massive scale. The U.S.

DOJ: Company Sold Gear With Security Flaws to US Military

Data Breach Today

military and other agencies for a decade and passing the gear off as American made

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Report Outlines Military Health Facility Security Weaknesses

Data Breach Today

Watchdog Agency: Problems Put Patient Data at Risk Some military health facilities haven't consistently implemented security controls, putting patient data at risk, according to a new watchdog agency report.

Unsecure Database Exposed US Military Personnel Data: Report

Data Breach Today

military and other government personnel, according to a new report from two independent security researchers

NATO military command center should be fully operational in 2023

Security Affairs

The NATO military command center should be fully operational in 2023, every member states will contribute with its cyber capabilities to the military hub. NATO alliance is aware of growing threats in the cyberspace and the new NATO military command center aims to respond them.

How Military Tactics Apply to Cybersecurity

eSecurity Planet

Former West Point professor Greg Conti explains how military doctrines apply to cyber security, and what lessons enterprises can learn from that

Germany and the Netherlands agreded to build TEN, the first ever joint military internet

Security Affairs

The governments of Germany and The Netherlands agreed to build the first-ever joint military Internet, so-called TEN (Tactical Edge Networking). “The name of this new Dutch-German military internet is the Tactical Edge Networking, or TEN, for short.”

Chinese Military Wants to Develop Custom OS

Schneier on Security

Since these leaks have revealed that the US can hack into almost anything, the Chinese government's plan is to adopt a "security by obscurity" approach and run a custom operating system that will make it harder for foreign threat actors -- mainly the US -- to spy on Chinese military operations.

Opinion: Don't Let a Tech Slowdown Threaten Our Military

WIRED Threat Level

The right software and digital engineering can take military aircraft back to the future. Security Security / National Security Opinion

Autoclerk travel reservations platform data leak also impacts US Government and military

Security Affairs

Security experts at vpnMentor’s discovered a breach in a database belonging to Autoclerk, a reservations management system owned by Best Western Hotels and Resorts Group. The list of affected users includes the US government, military, and Department of Homeland Security (DHS). .

Machete cyber-espionage group targets Latin America military

Security Affairs

Security experts from ESET uncovered a cyber-espionage group tracked as Machete that stole sensitive files from the Venezuelan military. Security experts from ESET reported that a cyberespionage group tracked as Machete has stolen sensitive files from the Venezuelan military.

Russian military plans to replace Windows with Astra Linux

Security Affairs

Cyber security seems to subvert the globalization concept, governments are working to develop their own technology fearing possible espionage and sabotage activities of foreign states. The post Russian military plans to replace Windows with Astra Linux appeared first on Security Affairs.

Chinese Military personnel charged with hacking into credit reporting agency Equifax

Security Affairs

The United States Department of Justice charged 4 Chinese military hackers with hacking into credit reporting agency Equifax. The four members of the Chinese military unit are Wu Zhiyong (???), were members of the PLA’s 54 th Research Institute, a component of the Chinese military.

U.S. Military Members Catfished and Hooked for Thousands of Dollars

Threatpost

Mobile Security Web Security catfish enforcement action ncis prisoners sextortion scam South Carolina U.S. MilitaryPrisoners in South Carolina posed convincingly as beautiful women on social media platforms.

Global Crime Ring Bilks U.S. Military Members, Vets Out of Millions

Threatpost

Government Hacks Privacy Web Security Bank Accounts benefits portals Department of Justice Fraud global crime ring ID theft Money Laundering theft U.S. Military veterans veterans affairs

A new piece of Ryuk Stealer targets government, military and finance sectors

Security Affairs

A new piece of the Ryuk malware has been improved to steal confidential files related to the military, government, financial statements, and banking. The post A new piece of Ryuk Stealer targets government, military and finance sectors appeared first on Security Affairs.

Security Pros Agree Military Should Conduct Offensive Hacking

Dark Reading

But it can't operate in a bubble, a new Washington Post study indicates

OP Glowing Symphony – How US military claims to have disrupted ISIS ‘s propaganda

Security Affairs

US military claims to have disrupted the online propaganda activity of the Islamic State (ISIS) in a hacking operation dating back at least to 2016. ” reads a post published by the National Security Archive at George Washington University.

Polar Fitness App Exposes Location of ‘Spies’ and Military Personnel

Threatpost

The fitness app Polar Flow exposes the whereabouts of some of its high-profile users, including “spies” and those with sensitive positions in the military. Hacks Mobile Security Privacy Fitness tracker geolocation data IoT military personnel polar polar fitness Polar Flow spies

Strava Data Heat Maps Expose Military Base Locations Around the World

WIRED Threat Level

The US military is reexamining security policies after fitness tracker data shared on social media revealed bases and patrol routes. Security

City of Pensacola hit by a cyberattack few days after military base shooting

Security Affairs

Pensacola spokeswoman Kaycee Lagarde confirmed that the city was working with the authorities, including FBI , Department of Homeland Security and the Florida Department of Law Enforcement.

MY TAKE: Let’s not lose sight of why Iran is pushing back with military, cyber strikes

The Last Watchdog

The digital strike against Iran is a great example of using USCYBERCOM as a special ops force, clearly projecting US power by going deep behind enemy lines to knock out the adversary’s intelligence and command-and-control apparatus,” observes Phil Neray, VP of Industrial Cybersecurity for CyberX, a Boston-based supplier of IoT and industrial control system security technologies. Then last Saturday, the Department of Homeland Security alerted U.S.

'Star Wars: The Rise of Skywalker' Is a Lesson in Military Opposites

WIRED Threat Level

Security Security / Security NewsThe Resistance is outmanned and outgunned, but their adaptability wins the day.

GoScanSSH Malware Targets SSH Servers, But Avoids Military and.GOV Systems

Threatpost

Researchers identify a new malware family called GoScanSSH that avoids servers linked to government and military IP addresses. . Cloud Security Government Hacks Malware ARM GoScanSSH GoScanSSH Malware SSH SSH Servers x86 x86_64

The Military Should Teach Artificial Intelligence to Watch Drone Footage

WIRED Threat Level

Security OpinionOpinion: The Pentagon collects so much surveillance footage that humans can’t watch all of it. It’s time to deploy AI.

History of the US Army Security Agency

Schneier on Security

Interesting history of the US Army Security Agency in the early years of Cold War Germany. historyofsecurity intelligence military

From China with Love: New York Firm sold millions in PRC Surveillance Gear to US Government, Military

The Security Ledger

Military, the Department of Energy and other government agencies that it claimed were "Made in the U.S.A". Independent Security Researchers Feel the Chill Up North Podcast Episode 141: Massive Data Breaches Just Keep Happening.

TikTok App Had Major Security Vulnerabilities

Data Breach Today

Now Fixed, Check Point Says Flaws Could Have Led to Account Takeover The security company Check Point has revealed several vulnerabilities in TikTok, the popular Chinese video app that has raised concerns lately from the U.S. military and lawmakers.

Fitness apps: Good for your health, not so much for military security

The Security Ledger

Fitness apps are proving to be a lot less beneficial to military security than they are for military fitness. That after researchers in the Netherlands discovered that data from the Polar fitness app revealed the homes and habits of those exercising in clandestine locations around the world, including intelligence agencies, military bases, nuclear.

Military documents about MQ-9 Reaper drone leaked on dark web

The Security Ledger

Hackers have put up for sale on the dark web sensitive military documents, some associated with the U.S. military’s MQ-9 Reaper drone aircraft, one of its most lethal and technologically advanced drones, security research firm Recorded Future recently discovered. » Related Stories Fitness apps: Good for your health, not so much for military security Evasive new botnet can take over enterprise devices to steal data, spread ransomware U.S.

DoD: Cerner EHR will meet military cybersecurity standards

Information Management Resources

Cyber security EHR implementations Patient data Interoperability hdm morning rounds leadCareful steps to protect data are an example of how the DoD and VA are cooperating and engaging in joint decision-making.

Leaky AWS Storage Bucket Spills Military Secrets, Again

Threatpost

Cloud Security Government Privacy Web Security AWS AWS Storage Bucket Chris Vickery Leaky AWS Storage Bucket Linux misconfigured servers National Security Agency NOFORN NSA Red Disk top secret United States Defense DepartmentFor the second time in ten days, researchers at UpGuard released sensitive data belonging to the United States Defense Department that was stored insecurely online.

Supply-Chain Security

Schneier on Security

Earlier this month, the Pentagon stopped selling phones made by the Chinese companies ZTE and Huawei on military bases because they might be used to spy on their users. But it's just one instance of the much larger issue of securing our supply chains. backdoors china essays military

Poland to establish Cyberspace Defence Force by 2024

Security Affairs

“We’re well aware that in today’s world it’s possible to influence the situation in states by using these methods ( cyberwar ),” Mariusz Blaszczak told to local media at a military cyber training centre in Zegrze.

DOD DISA US agency discloses a security breach

Security Affairs

The Defense Information Systems Agency (DISA) US agency in charge of secure IT and communication for the White House has disclosed a data breach. Hackers accessed employees’ personal details, including social security numbers. military and civilian personnel.

Hamas Ensnares Israeli Soldiers with Pretty ‘Ladies’

Threatpost

Facebook Government Malware Mobile Security Privacy catfish fake chat app fake profiles hamas Israeli Defense Force israeli soldiers military service mobile malware social media Spyware telegram twitter

Cloud Security Fail: Classified U.S. Military Data Exposed in Amazon S3 Bucket

eSecurity Planet

The exposed data includes information on the Army's Distributed Common Ground System and its cloud component, Red Disk