Chinese tech firm founded by Huawei veterans in the FBI’s crosshairs
source: reuters.com (contributed by Steve Page) | image: fbi.gov
Continue reading “Chinese tech firm founded by Huawei veterans in the FBI’s crosshairs”
Category: Security News
source: reuters.com (contributed by Steve Page) | image: fbi.gov
Continue reading “Chinese tech firm founded by Huawei veterans in the FBI’s crosshairs”
source: tomshardware.com (contributed by Steve Page) | image: pexels.com
As reported last week, Chinese hackers infiltrated the U.S. Department of Treasury and gained access to several users’ workstations. However, according to Bloomberg, the infiltration was more severe than initially reported, as hackers managed to access systems belonging to Secretary Janet Yellen and other top officials.
source: wired.com (contributed by FAN, Steve Page) | image: unsplash.com
IN RECENT YEARS, commercial spyware has been deployed by more actors against a wider range of victims, but the prevailing narrative has still been that the malware is used in targeted attacks against an extremely small number of people. At the same time, though, it has been difficult to check devices for infection, leading individuals to navigate an ad hoc array of academic institutions and NGOs that have been on the front lines of developing forensic techniques to detect mobile spyware. On Tuesday, the mobile device security firm iVerify is publishing findings from a spyware detection feature it launched in May. Of 2,500 device scans that the company’s customers elected to submit for inspection, seven revealed infections by the notorious NSO Group malware known as Pegasus. Continue reading “Phone Scanner That Detects Spyware”
source: axios.com (contributed by FAN, Bill Amshey) | Image: pexels.com
Notorious China-linked hackers known for burrowing deep into U.S. infrastructure are back, according to a report out today.
Why it matters: The resurgence shows that the Chinese government isn’t backing down from its quest to infiltrate American utilities in preparation for a potential destructive cyberattack.
Zoom in: The research team at SecurityScorecard, a cyber risk assessment company, says it has noticed Volt Typhoon moving traffic through a set of compromised routers in New Caledonia, an island nation off the coast of Australia, as recently as September.
source: fastcompany.com | image: pixabay.com
It’s been a couple of years since Apple, Google, and Microsoft started trying to kill the password, and its demise seems more likely than ever.
In 2022, all three companies embraced an alternative called passkeys, which sync securely between your devices and are protected by face recognition, a fingerprint, or a PIN. The thinking goes that if you don’t have to remember a password—or even create one in a password manager—you’re less likely to fall prey to phishing scams. And if websites don’t have to store their customers’ passwords anymore, security breaches won’t be as disastrous. Continue reading “Say Goodbye to Passwords”
source: defenseone.com | image: pixabay.com
The Pentagon has long been closed-mouthed about a family of U.S. spy satellites that since 2014 have kept an eye on foreign spacecraft in geosynchronous orbits. That hasn’t stopped Chinese satellites from dodging them.
U.S. officials declassified the Geosynchronous Space Situational Awareness Program a decade ago to show that they had eyes on high-Earth orbit, but they have rarely discussed the the six GSSAP satellites themselves, and they do not publish the standard location data meant to reduce collisions. Now, a new paper from the U.S. Air Force’s China Aerospace Studies Institute explores what the Chinese know about GSSAP—and what they’re doing about it. Continue reading “China’s Satellites Are Dodging US Eyes In Space”
source: darkreading.com | image: pexels.com
Cyber-threat actors have ramped up their targeting of the 2024 US electionswith a flood of malicious activity expected to peak over the next month, aimed at causing disruption to voters and the election process and requiring increased vigilance on the part of stakeholders.
Specifically, attackers have bolstered election-related threat activity since the beginning of the year with an increase in the sale of phishing kits targeting US voters and campaign donors; the registration of more than 1,000 domains aimed at exploiting election-related content for malicious purposes; and increased ransomware activity targeting government entities, according to research from FortiGuard Labs Threat Research released today.
Since the inception of Internet-related threats, cyber-threat actors have typically increased malicious activity ahead of elections, notes Derek Manky, chief security strategist and vice president of global threat intelligence at Fortinet. However, they aim to be especially disruptive during the current election cycle, requiring that all stakeholders be prepared to fend off malicious actors in the upcoming weeks to protect election outcomes. Continue reading “Cyberattackers Unleash Flood of Potentially Disruptive Election-Related Activity”
source: https://joecirincione.substack.com (contributed by FAN, Bill Amshey) | image: pexels.com
Something has been bothering me. Almost every reporter and Israeli official says that Israel intercepted most of the 180 missiles Iran fired at three Israeli military bases October 1. If that were true, then you would expect to see dozens of large explosions in the air as the Israeli Arrow 2 or Arrow 3 interceptors found their targets and destroyed the incoming warheads.
But that is not what you see. Dozens of videos show scores of missiles streaking across the sky with many hitting the ground and exploding in fireballs. There are numerous reports of substantial ground damage, including large craters, damaged buildings and at least one intact ballistic missile that failed to explode.
It appears that the Iranian missiles were so inaccurate that most landed a kilometer or more from their intended targets, with some landing in the sea or in vacant land. The Washington Post reports, in one of the few attempts to independently assess the damage, that, “Video recorded from the southern town of Ar’arat an-Naqab on Tuesday showed at least 20 projectiles flying through the air above the Nevatim military air base. At least six missiles hit the facility, erupting into fireballs; plumes of smoke rose from the airfield. No aircraft was hit, the Israel Defense Forces told Israeli media.” Continue reading “Did Israel Intercept Any Iranian Missiles?”
source: axios.com (contributed by FAN, Bill Amshey) | image: pexels.com
The Chinese government is running another broad campaign to hack as many American organizations as possible — heightening the threat across critical infrastructure.
Why it matters: The new hacking campaign suggests China could hold more expansive power to turn off key U.S. infrastructure than previously thought.
Driving the news: FBI director Christopher Wray said at the Aspen Cyber Summit on Wednesday that the bureau and its partners hijacked thousands of devices last week that a Chinese hacking group had infected with malware.
Zoom in: As of June, Flax Typhoon’s botnet included more than 260,000 malware-infected devices across North America, South America, Europe, Africa, Southeast Asia and Australia, according to a U.S. government advisory.
source: axios.com (contributed by FAN, Bill Amshey) | image: pexels.com
The National Institute of Standards and Technology has released its highly anticipated standards for protecting encrypted data from future quantum technologies.
Why it matters: China and other foreign foes are likely already collecting encrypted U.S. secrets with the hopes of breaking into them once quantum computing technology catches up.
What’s happening: NIST this week formally approved three post-quantum cryptography standards, marking an important first step in protecting government and critical services from encryption-breaking quantum.
What’s next: These standards will serve as a blueprint for governments and private-sector organizations around the world.