Tag: military
-
6 hard-earned tips for leading through a cyberattack, from CSOs who’ve been there
Tags: attack, awareness, breach, business, cisco, ciso, control, cyber, cyberattack, cybersecurity, data, group, incident response, infosec, infrastructure, lessons-learned, military, open-source, phishing, phone, privacy, programming, ransomware, security-incident, service, skills, software, strategy, threat, training, updateDevelop muscle memory, and patience, through simulations: Authority under crisis is meaningless if you can’t establish followership. And this goes beyond the incident response team: CISOs must communicate with the entire organization, a commonly misunderstood imperative, says Pablo Riboldi, CISO of nearshore talent provider BairesDev.”I find that employee involvement tends to be overlooked during cyberattacks.…
-
Operation HollowQuill Weaponized PDFs Deliver a Cobalt Strike Malware Into Gov Military Networks
In a recent revelation by SEQRITE Labs, a highly sophisticated cyber-espionage campaign, dubbed Operation HollowQuill, has been uncovered. The operation targets academic, governmental, and defense-related networks in Russia using weaponized decoy PDFs to deliver Cobalt Strike malware implants. The campaign appears to focus on infiltrating critical institutions such as the Baltic State Technical University (BSTU…
-
PJobRAT Android Malware Masquerades as Dating and Messaging Apps to Target Military Personnel
PJobRAT, an Android Remote Access Trojan (RAT) first identified in 2019, has resurfaced in a new campaign targeting users in Taiwan. Initially, PJobRAT was known for targeting Indian military personnel by disguising itself as dating and instant messaging apps. The latest iteration of this malware has evolved, now masquerading as apps like ‘SangaalLite’ and ‘CChat’,…
-
PJobRAT Malware Campaign Targeted Taiwanese Users via Fake Chat Apps
An Android malware family previously observed targeting Indian military personnel has been linked to a new campaign likely aimed at users in Taiwan under the guise of chat apps.”PJobRAT can steal SMS messages, phone contacts, device and app information, documents, and media files from infected Android devices,” Sophos security researcher Pankaj Kohli said in a…
-
Cyber Threats Jeopardize US Military Mobility, Report Warns
Chinese Cyber Pre-Positioning Endangers US Military Logistics and Readiness. The U.S. military’s ability to deploy, supply and sustain its forces in a major conflict is under threat – not from enemy fire, but from cyberattacks targeting the digital systems that keep troops and equipment moving, according to a new report.</ First seen on govinfosecurity.com Jump…
-
Intelligence chiefs insist Signal chat was a simple mistake
Democrats on the House Intelligence Committee expressed anger over the use of the messaging app to coordinate military strikes on Houthi targets in Yemen. First seen on cyberscoop.com Jump to article: cyberscoop.com/signal-chat-house-intelligence-tulsi-gabbard-chrissy-houlahan/
-
Intel chiefs again say they did not share classified info amid new questions on war chats
President Donald Trump’s intelligence chiefs on Wednesday maintained they did not share classified information about an eminent U.S. military strike on a messaging app, even as more details about the discussion came to light. First seen on therecord.media Jump to article: therecord.media/intel-chiefs-again-say-they-did-not-share-classified-info-house-hearing
-
Military AI caught in tension between speed and control
The use of artificial intelligence in military contexts can unlock a range of benefits for defence organisations, but also highlights a clear tension between speed and control baked into the technology First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366621215/Military-AI-caught-in-tension-between-speed-and-control
-
OPSEC Nightmare: Leaking US Military Plans to a Reporter
Tags: militaryExperts say the leakage of US military plans to a reporter this month reflects a severe operational security failure on the part of US leadership. First seen on darkreading.com Jump to article: www.darkreading.com/cybersecurity-operations/opsec-nightmare-leaking-us-military-plans-reporter
-
White House’s Operational Security Fail: No Signal Required
‘Encryption Can’t Protect You From Stupid,’ Says Leading Cryptographer We’re all human. Who among us hasn’t lost a thumb drive or added a journalist to a consumer-grade encrypted app group chat devoted to White House war planning and military operations? Still, some accidental data breaches pose a bigger risk than others. First seen on govinfosecurity.com…
-
Meet the Low-Key Access Broker Supercharging Russian State Cybercrime
Raspberry Robin breaks into organizations and sells access to Russian threat actors, including the military cyber unit behind attempted coups, assassinations, and influence operations throughout Europe. First seen on darkreading.com Jump to article: www.darkreading.com/cyberattacks-data-breaches/access-broker-russian-state-cybercrime
-
North Korea Launches Military Research Facility to Strengthen Cyber Warfare Operations
North Korea has taken a significant step in enhancing its cyber warfare capabilities by establishing a new research center, known as Research Center 227, under the military’s Reconnaissance General Bureau (RGB). This move is part of a broader strategy to bolster the country’s offensive cyber operations, particularly focusing on AI-powered hacking technologies. Background and Objectives…
-
Hacker nutzen alte Windows-Sicherheitslücke aus Microsoft tut nichts
Tags: bug, bug-bounty, china, cyberattack, exploit, germany, hacker, iran, microsoft, military, north-korea, update, vulnerability, windowsExperten des Sicherheits-Unternehmens Trend Micro haben eine als ZDI-CAN-25373 bezeichnete Sicherheitslücke in Windows entdeckt, die Angreifer seit mindestens 2017 ausnutzen. Über die Lücke können die Angreifer Schadcode auf den betroffenen Windows-Rechnern ausführen, sofern der Benutzer eine verseuchte Webseite besucht oder eine infizierte Datei öffnet.Die Lücke steckt in der Vorgehensweise, wie Windows .lnk-Dateien (Verknüpfungsdateien) verarbeitet. Angreifer können Kommandozeilen-Befehle, die…
-
Chinese military-linked companies dominate US digital supply chain
Despite growing national security concerns and government restrictions, Chinese military-linked companies remain deeply embedded in the US digital supply chain, according to … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/03/20/digital-supply-chain-security-concerns/
-
Ukrainian military targeted in new Signal spear-phishing attacks
Ukraine’s Computer Emergency Response Team (CERT-UA) is warning about highly targeted attacks employing compromised Signal accounts to send malware to employees of defense industry firms and members of the country’s army forces. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/ukrainian-military-targeted-in-new-signal-spear-phishing-attacks/
-
US must prioritize cybersecurity training for the military’s engineers
The Defense Department faces a startling capability gap. First seen on defensescoop.com Jump to article: defensescoop.com/2025/03/13/prioritize-cybersecurity-training-military-engineers/
-
SCADA Vulnerabilities Allow Attackers to Cause DoS and Gain Elevated Privileges
Tags: control, cyber, data, dos, government, infrastructure, microsoft, military, network, risk, vulnerability, windowsA recent security assessment by Palo Alto Networks’ Unit 42 has uncovered multiple vulnerabilities in the ICONICS Suite, a widely used Supervisory Control and Data Acquisition (SCADA) system. These vulnerabilities, identified in versions 10.97.2 and earlier for Microsoft Windows, pose significant risks to critical infrastructure sectors such as government, military, manufacturing, water and wastewater, and…
-
SideWinder APT Deploys New Tools in Attacks on Military Government Entities
The SideWinder Advanced Persistent Threat (APT) group has been observed intensifying its activities, particularly targeting military and government entities across various regions. This group, known for its aggressive expansion beyond traditional targets, has recently updated its toolset to include sophisticated malware designed for espionage. SideWinder’s primary targets have historically included entities in Pakistan, Sri Lanka,…
-
CISOs müssen OT-Risiken stärker adressieren
Tags: china, ciso, cyber, cyberattack, exploit, firewall, hacker, infrastructure, Internet, iran, kev, kritis, military, ransomware, risk, technology, update, vulnerabilityDa Angriffe auf OT-Bereiche zunehmen, sollten CISOs einen Exposure-Management-Ansatz verfolgen.Die Bedrohungen gegen die Betriebstechnik (Operational Technology, OT) der kritischen Infrastruktur (KRITIS) verschärfen sich kontinuierlich. China baut offensive Komponenten in amerikanische Militär- und Unternehmensnetzwerke ein. Zudem haben chinesische Hacker Telekommunikationsunternehmen und Internetdienstleister infiltriert, um Zivilisten auszuspionieren. Seit etlichen Jahren, also bereits deutlich vor dem Angriffskrieg, greift…
-
Cyberangriff auf ein staatliches Rüstungsunternehmen in Argentinien
Cyberattack on Military Manufacturing, Security Risk and Official Silence First seen on agendamalvinas.com.ar Jump to article: agendamalvinas.com.ar/en/noticia/ciberataque-a-fabricaciones-militares-riesgo-de-seguridad-y-silencio-oficial
-
ISMG Editors: Is US Cyber Pause on Russia a Strategic Risk?
Also: the Recent Ransomware Surge, Crypto Reserve Controversy. In this week’s update, four ISMG editors discussed the recent surge in ransomware attacks, implications of the U.S. military’s pause on cyber operations against Russia, and President Trump’s bold but controversial plan to create a national cryptocurrency reserve. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/ismg-editors-us-cyber-pause-on-russia-strategic-risk-a-27672
-
Two US Army soldiers charged with selling military secrets to China
Two active-duty and one former U.S. Army soldiers were arrested on Thursday for allegedly stealing classified materials from the military and selling them to conspirators in China. First seen on therecord.media Jump to article: therecord.media/two-army-soldiers-charged-selling-secrets-to-china
-
Ukraine’s intel service honors civilian hackers for the first time with military award
Ukraine’s military intelligence service (HUR) has honored a group of civilian cyber activists for their role “in strengthening national security,” marking the agency’s first official recognition of cybersecurity specialists outside the country’s military ranks. First seen on therecord.media Jump to article: therecord.media/ukraine-intel-service-honors-civilian-hackers-with-military-award
-
Military, Government, Face Escalating APT Attacks
First seen on scworld.com Jump to article: www.scworld.com/brief/military-government-face-escalating-apt-attacks
-
Military, government sectors face escalating APT attacks
First seen on scworld.com Jump to article: www.scworld.com/brief/military-government-sectors-face-escalating-apt-attacks
-
US Military Personnel Arrested for Hacking 15 Telecom Providers
Federal prosecutors have filed a detention memorandum urging the court to indefinitely detain Cameron John Wagenius, a 21-year-old active-duty U.S. Army soldier stationed at Fort Cavazos, Texas, following his alleged involvement in a multi-state cybercrime campaign targeting at least 15 telecommunications providers. The charges, unsealed ahead of a March 3 detention hearing, reveal a sprawling…
-
Belarus-Linked Ghostwriter Uses Macropack-Obfuscated Excel Macros to Deploy Malware
Opposition activists in Belarus as well as Ukrainian military and government organizations are the target of a new campaign that employs malware-laced Microsoft Excel documents as lures to deliver a new variant of PicassoLoader. The threat cluster has been assessed to be an extension of a long-running campaign mounted by a Belarus-aligned threat actor dubbed…
-
Critical deserialization bugs in Adobe, Oracle software actively exploited, warns CISA
Oracle Agile PLM flaw open to N-days: The other vulnerability, fixed in January 2024, is a high severity (CVSS 8.8/10) flaw in the export component of the Oracle’s PLM software, and stems from the improper handling of serialized data. It’s tracked as CVE-2024-20953. Successful exploitation could enable a low-privileged attacker with network access via HTTP…
-
Essential Steps for Military Members to Protect Against Identity Theft
Over the course of my professional and military career, I’ve noticed an increasing trend in malicious actions targeting the military community. Military personnel face unique cybersecurity threats, including targeted identity theft from foreign adversaries. Service members in particular are high-value targets due to their security clearances, financial stability, and access to classified or sensitive information. ……

