Anders als es ein beliebtes Sprichwort behauptet, ist im Krieg natürlich nicht alles erlaubt – gemacht wird es trotzdem, zumindest fast alles. Aktuell gilt das insbesondere für neue Formen des Einsatzes von sog. Künstlicher Intelligenz in der Kriegführung.| Informationsstelle Militarisierung (IMI)
Threat Actors like the Typhoon Crews from China, are using simple techniques to penetrate networks. Do not ignore.| SENKI
Follow us on Twitter @HackRead| Hackread - Latest Cybersecurity, Tech, Crypto & Hacking News
No, most ASEAN countries are not ready for “serious cybersecurity.” Cybersecurity requires a persistent and consistent rhythm of action that fixes known security risks. Public benefit—non-profit cyber civil defense organizations like the Shadowserver Foundation, CyberGreen, and other organizations deliver actionable cyber-risk reporting as a public benefit. Yes, these reports are free to organizations seeking to Read More| SENKI
The French Government sees the massive number of PlugX infections as a national threat. PlugX is malware used by Nation State threat actors to get inside networks. Sekoia was part of a sinkholing action that uncovered thousands of locations where PlugX is deployed. Should you be concerned? How do you discover if you have a Read More| SENKI
If you follow the May 10, 2024, Black Basta “critical action” recommendations, you will most likely be exposed and potentially exploited by the threat actors. Read through the #StopRansomware: Black Basta AA-24-131A and HS-ISAC Black Basta Threat Actor Emerges as a Major Threat to the Healthcare Industry. Then take a step back and mitigate/remediate the Read More| SENKI
Key points from the 2018 industry consultation on our anti-DDoS strategy. This is the trust peer community who daily battles DDoS.| SENKI
Leverage Shadowserver's Cyber Civil Defence reporting to protect your network from risk.| SENKI
To celebrate Independence Day, the day Ukraine broke free from Russia, the IT Army of Ukraine defaced several major ISPs in the Russian-occupied territory of Crimea. And Anonymous, as part of #OpRussia, released a new leak.| The Cryptosphere
On Ukrainian Independence Day the IT Army of Ukraine announce a number of new victories, release a Youtube about their outage of Russian postal services, and promote a major leak of financial data from brand new hacktivist crew 2402.| The Cryptosphere
After a little time away, we’re back and sharing the official target lists from the IT Army of Ukraine. Want to know how to join the fight? Fire up Tor, then sign into your VPN, then go here: https://t.me/itarmyofukraine2022/439 Now,... Read More ›| The Cryptosphere
They’re on a roll, with three updates in 36 hours. Today they’re continuing to hit the Russian drone industry, and adding new targets suggested by hacktivist supporters around the world. Shall we get into it? Let’s get into it. Announcements... Read More ›| The Cryptosphere
The IT Army of Ukraine continues to target drone companies in Russia.| The Cryptosphere
Today, the IT Army of Ukraine and its hacktivist supporters target Russian drone companies.| The Cryptosphere
Sorry we’ve been offline: Ottawa has had a massive internet outage that’s still not fully resolved (we’d like to think that’s Russia trying to stop us from posting these, but we’d like the liability courts NOT to think that). And... Read More ›| The Cryptosphere
Today the IT Army of Ukraine targets supply and logistics in Russia.| The Cryptosphere
A great deal of our work as Linux system administrators is related to security. Each server we maintain is bombarded on daily basis in a never ending cyberwar. Some of our customers (e.g. the website of the former Finnish Minister of Foreign Affairs, government websites, high profile political organisations and media sites) are obvious targets but […]| Linux-natives
This morning I was invited on to BBC 5 Live to discuss Britain’s readiness in terms of state-on-state cyber activities. Listen to what I had to say below:| cyber.uk