Tag: military
-
The Ramifications of Ukraine’s Drone Attack
You can read the details of Operation Spiderweb elsewhere. What interests me are the implications for future warfare: If the Ukrainians could sneak drones so close to major air bases in a police state such as Russia, what is to prevent the Chinese from doing the same with U.S. air bases? Or the Pakistanis with…
-
Russian military hacking unit uncovered
First seen on scworld.com Jump to article: www.scworld.com/brief/russian-military-hacking-unit-uncovered
-
AI-Powered Drones: Ukraine’s Historic Strikes on Russian Aircraft
Ukraine’s AI-powered FPV drones redefine warfare, featuring advancements in military technology and cost-effective strategies. Learn more! First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/06/ai-powered-drones-ukraines-historic-strikes-on-russian-aircraft/
-
US military IT specialist arrested for allegedly trying to leak secrets to foreign government
A 28-year-old civilian IT worker at the Defense Intelligence Agency has been arrested in Northern Virginia on suspicion that he leaked secrets to a foreign government. First seen on therecord.media Jump to article: therecord.media/defense-intelligence-agency-it-specialist-suspected-leak-foreign-government
-
UK Launches ‘Kill Web’ Linking Cyber Operations and Military
New Cyber and Electromagnetic Command Pitched as Lessons Learned from Ukraine. The United Kingdom pledged Thursday one billion pounds for a military Digital Targeting Web the government said will enable quick fire targeting of enemy assets, including through offensive cyber operations. Ways of warfare are rapidly changing, said Defense Secretary John Healy. First seen on…
-
UK military to establish new Cyber and Electromagnetic Command
Britain’s strategic defense review calls for a new Cyber and Electromagnetic Command to “lead defensive cyber operations and coordinate offensive cyber capabilities” with the military’s National Cyber Force. First seen on therecord.media Jump to article: therecord.media/uk-military-new-cyber-electromagnetic-command
-
Ukraine detains alleged Russian spies who used dash cams to guide missile strikes
The suspects allegedly parked cars with activated dash cams near military targets and left them to record for up to 12 hours. First seen on therecord.media Jump to article: therecord.media/ukraine-detains-russian-spies-using-dashcams-missile-strikes
-
Armed forces charity steps in to address cyber mental health crisis
CIISec and military charity PTSD Resolution hope to address a gathering mental health crisis among frontline cyber professionals First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366625032/Armed-forces-charity-steps-in-to-address-cyber-mental-health-crisis
-
Russian Hackers Target Western Firms Aiding Ukraine, Spy on Shipments
Russian military hackers are targeting Western firms aiding Ukraine, using cyberespionage to infiltrate logistics networks and spy on arms shipments. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/news/russian-hackers-target-western-firms/
-
Russian APT28 compromised Western logistics and IT firms to track aid to Ukraine
Tags: access, advisory, api, authentication, cctv, cloud, computer, container, credentials, cve, cybersecurity, data, detection, email, exploit, flaw, government, hacker, identity, infrastructure, Internet, login, malicious, malware, mfa, military, network, ntlm, office, open-source, password, phishing, powershell, russia, service, software, threat, tool, ukraine, vulnerabilityCredential guessing and spearphishing: The attackers used brute-force credential guessing techniques, also known as password spraying, to gain initial access to accounts. This was complemented with targeted phishing emails that directed recipients to fake login pages for government entities or Western cloud email providers. These phishing pages were stored on free web hosting services or…
-
Behörden warnen: Russische Hacker bei Spionage über IP-Kameras erwischt
Dem russischen Militär zugeordnete Hacker haben es wohl auf Hilfslieferungen an die Ukraine abgesehen. Tausende IP-Kameras wurden infiltriert. First seen on golem.de Jump to article: www.golem.de/news/behoerden-warnen-russische-hacker-bei-spionage-ueber-ip-kameras-erwischt-2505-196449.html
-
Russian Hackers Exploit Email and VPN Vulnerabilities to Spy on Ukraine Aid Logistics
Tags: cyber, email, exploit, hacker, intelligence, military, russia, service, spy, technology, threat, ukraine, vpn, vulnerabilityRussian cyber threat actors have been attributed to a state-sponsored campaign targeting Western logistics entities and technology companies since 2022.The activity has been assessed to be orchestrated by APT28 (aka BlueDelta, Fancy Bear, or Forest Blizzard), which is linked to the Russian General Staff Main Intelligence Directorate (GRU) 85th Main Special Service Center, Military Unit…
-
Russian Intelligence Hackers Stalk Western Logistics Firms
Tags: cctv, cybersecurity, government, hacker, hacking, intelligence, Internet, military, russia, technologyWestern Governments Publish Warning Over Unit 26165 Activities. A slew of Western cybersecurity agencies warned Wednesday that Russian intelligence is targeting logistics and technology companies in a prolonged hacking campaign that includes an emphasis on internet-connected cameras situated along border crossings and military installations. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/russian-intelligence-hackers-stalk-western-logistics-firms-a-28449
-
EU sanctions target individuals, organizations behind Russia’s disinformation and sabotage operations
Members of the Russian military intelligence unit GRU, as well as individuals involved in promoting Kremlin narratives through social media campaigns, were targeted with the sanctions. First seen on therecord.media Jump to article: therecord.media/eu-sanctions-orgs-individuals-tied-to-russia-disinformation
-
SideWinder APT Hackers Exploits Legacy Office Vulnerabilities to Deploy Malware Undetected
Tags: apt, credentials, cyber, exploit, government, hacker, malware, microsoft, military, office, threat, vulnerabilityThe Acronis Threat Research Unit (TRU) has revealed an advanced campaign believed to be orchestrated by the SideWinder advanced persistent threat (APT) group. This operation, running through early 2025, has primarily targeted high-value government and military institutions across Sri Lanka, Bangladesh, and Pakistan, exploiting unpatched legacy Microsoft Office vulnerabilities to deploy credential-stealing malware while evading…
-
UK ‘extremely dependent’ on US for space security
Tags: militaryAfter 60 years+ cooperation on space and military ops, worrying ‘rhetoric’ from Team Trump has Brits examining options First seen on theregister.com Jump to article: www.theregister.com/2025/05/21/uk_space_commitee/
-
Turkish APT Exploits Chat App Zero-Day to Spy on Iraqi Kurds
Even after their zero-day turned into an n-day, attackers known as Marbled Dust or Sea Turtle continued to spy on military targets that had failed to patch Output Messenger. First seen on darkreading.com Jump to article: www.darkreading.com/cyberattacks-data-breaches/turkish-apt-exploits-chat-app-zero-day-spy-iraqi-kurds
-
Data on sale: Trump administration withdraws data broker oversight proposal
Tags: breach, compliance, data, data-breach, exploit, finance, framework, group, identity, infrastructure, law, military, privacy, regulation, theft, vulnerabilityPrivacy concerns escalate : Without these protections, data brokers can continue collecting and selling Americans’ sensitive personal information with minimal oversight. This data often includes Social Security numbers, financial records, location histories, and purchase patterns, leaving consumers vulnerable to identity theft and fraud. “Demographic groups already underserved by mainstream financial services”, low-income earners, elderly individuals, and racial…
-
Russian military cadet reportedly arrested for selling hacking tool to FSB agent
A Russian military cadet reportedly developed an algorithm that could bypass the protective infrastructure of law enforcement software and gain access to restricted data. First seen on therecord.media Jump to article: therecord.media/russian-military-cadet-reportedly-arrested-for-selling-hacking-tool
-
New leadership picks for Cyber Command, NSA coming soon amid broader decision on structure
Multiple military, civilian and congressional sources say the Trump administration could move soon to fill the top civilian position at the NSA, setting in motion other decisions about the military leadership for the spy agency and for U.S. Cyber Command. First seen on therecord.media Jump to article: therecord.media/cyber-command-nsa-trump-leadership-picks-dual-hat
-
Earth Ammit Breached Drone Supply Chains via ERP in VENOM, TIDRONE Campaigns
Tags: cyber, espionage, group, healthcare, korea, military, service, software, supply-chain, technologyA cyber espionage group known as Earth Ammit has been linked to two related but distinct campaigns from 2023 to 2024 targeting various entities in Taiwan and South Korea, including military, satellite, heavy industry, media, technology, software services, and healthcare sectors.Cybersecurity firm Trend Micro said the first wave, codenamed VENOM, mainly targeted software service providers,…
-
Earth Ammit Hackers Deploy New Tools to Target Military Drones
The threat actor group known as Earth Ammit, believed to be associated with Chinese-speaking APTs, has emerged as a significant concern for military and industrial sectors in Eastern Asia. This group orchestrated two distinct campaigns-VENOM and TIDRONE-primarily targeting Taiwan and South Korea. Their focus on supply chain infiltration, particularly within the drone and military industries,…
-
Hacktivists Make Little Impact During India-Pakistan Conflict
While hacktivists claimed more than 100 successful attacks against Indian government, education, and military targets, the attacks were overblown in most cases and often did not even happen. First seen on darkreading.com Jump to article: www.darkreading.com/cyberattacks-data-breaches/hacktivists-little-impact-during-india-pakistan-conflict
-
Turkish Group Hacks Zero-Day Flaw to Spy on Kurdish Forces
Tags: credentials, cyberespionage, exploit, flaw, group, malware, microsoft, military, mitigation, spy, theft, zero-dayMicrosoft Researchers Link Turkish Spy Group to Output Messenger Zero-Day Hack. A Turkish-linked cyberespionage group known as Marbled Dust exploited a zero-day in the Output Messenger Server Manager application to spy on Kurdish military operations in Iraq. Microsoft reported the hack and called for immediate mitigation to block credential theft and malware delivery. First seen…
-
Chinese Actor Hit Taiwanese Drone Makers, Supply Chains
Tidrone concentrated on military entities and the satellite sector, using their associated service providers and ERP software to infect not just drones but all the entities that are part of their supply chains. First seen on darkreading.com Jump to article: www.darkreading.com/cyberattacks-data-breaches/chinese-actor-taiwanese-drone-makers-supply-chains
-
Chinese-speaking hackers disrupt drone supply chains in Taiwan, researchers say
Earth Ammit, as the group is known, launched two waves of campaigns from 2023 to 2024, affecting a range of industries including military, satellite, heavy industry, media, technology, software services and healthcare. First seen on therecord.media Jump to article: therecord.media/chinese-hackers-target-taiwan-military-sector
-
Chinese-speaking hackers disrupt drone supply chains in Taiwan, researchers say
Earth Ammit, as the group is known, launched two waves of campaigns from 2023 to 2024, affecting a range of industries including military, satellite, heavy industry, media, technology, software services and healthcare. First seen on therecord.media Jump to article: therecord.media/chinese-hackers-target-taiwan-military-sector
-
Turkey-Aligned Hackers Targeted Iraq-Based Kurds with Zero-Day Exploit
Marbled Dust has been exploiting a vulnerability in user accounts associated with the Kurdish military operating in Iraq for over a year, according to Microsoft First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/turkey-hackers-iraq-kurds-zero-day/
-
China-Nexus Nation State Actors Exploit SAP NetWeaver (CVE-2025-31324) to Target Critical Infrastructures
Tags: access, api, apt, attack, authentication, backdoor, backup, breach, business, china, cloud, control, cve, cyber, data, data-breach, detection, dns, encryption, endpoint, espionage, exploit, finance, firewall, fortinet, google, government, group, infection, infrastructure, intelligence, Internet, ivanti, linux, malicious, malware, mandiant, military, network, open-source, programming, rat, remote-code-execution, reverse-engineering, risk, rust, sap, service, strategy, tactics, threat, tool, update, vmware, vpn, vulnerability, windows, zero-dayExecutive Summary EclecticIQ analysts assess with high confidence that, in April 2025, China-nexus nation-state APTs (advanced persistent threat) launched high-temp exploitation campaigns against critical infrastructure networks by targeting SAP NetWeaver Visual Composer. Actors leveraged CVE-2025-31324 [1], an unauthenticated file upload vulnerability that enables remote code execution (RCE). This assessment is based on a publicly…

