Tag: military
-
SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 34
Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape. You’ve Got Malware: FINALDRAFT Hides in Your Drafts Telegram Abused as C2 Channel for New Golang Backdoor Infostealing Malware Infections in the U.S. Military & Defense Sector: A Cybersecurity Disaster in the Making Analyzing ELF/Sshdinjector.A!tr with…
-
US Military Health Provider HNFS Pays $11M in Settlement Over Cybersecurity Failures
US military health benefits program administrator HNFS to pay $11 million in settlement over its false claims of cybersecurity compliance. The post US Military Health Provider HNFS Pays $11M in Settlement Over Cybersecurity Failures appeared first on SecurityWeek. First seen on securityweek.com Jump to article: www.securityweek.com/us-military-health-provider-hnfs-pays-11m-in-settlement-over-cybersecurity-failures/
-
Australian Critical Infrastructure Faces ‘Acute’ Foreign Threats
The continent faces relentless military espionage, and increased cyber sabotage at the hands of authoritarian regimes, according to a high-ranking intelligence director. First seen on darkreading.com Jump to article: www.darkreading.com/ics-ot-security/australian-critical-infrastructure-acute-foreign-threats
-
Military Health Firm Pays $11.2M to Settle Cyber Fraud Case
DOJ Says Contractor Falsely Claimed to Meet Critical Cyber Requirements. A military health benefits administrator has agreed to pay $11.2 million to settle allegations that the company falsely certified compliance with cybersecurity requirements – including patch management – for three years in a contract with the U.S. Department of Defense. First seen on govinfosecurity.com Jump…
-
Infostealers Tied to Stolen AI and Defense Credentials
Information-Stealing Malware Continues to Feed Markets for Stolen Credentials. Defense sector and military agency employees, and artificial intelligence service users, all show signs of having been infected by information-stealing malware, as the market for buying and selling stolen credentials continues to thrive, experts warn. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/infostealers-tied-to-stolen-ai-defense-credentials-a-27556
-
Healthcare outfit that served military personnel settles allegations it faked infosec compliance for $11M
If this makes you feel sick, knowing this happened before ransomware actors started targeting medical info may help First seen on theregister.com Jump to article: www.theregister.com/2025/02/19/decadeold_healthcare_security_snafu_settled/
-
US Military, Defense Contractors, Subject to Infostealer Attacks
First seen on scworld.com Jump to article: www.scworld.com/brief/us-military-defense-contractors-subject-to-infostealer-attacks
-
Infostealers target major US defense contractors, military personnel
First seen on scworld.com Jump to article: www.scworld.com/news/infostealers-target-major-us-defense-contractors-military-personnel
-
Russian cyberespionage groups target Signal users with fake group invites
QR codes provide a means of phishing Signal users: These features now work by scanning QR codes that contain the cryptographic information needed to exchange keys between different devices in a group or to authorize a new device to an account. The QR codes are actually representations of special links that the Signal application knows…
-
Russian Hackers Target Signal Messenger Users to Steal Sensitive Data
Russian state-aligned threat actors have intensified their efforts to compromise Signal Messenger accounts, targeting individuals of strategic interest, according to the Google Threat Intelligence Group (GTIG). These campaigns, primarily linked to Russia’s ongoing military operations in Ukraine, aim to intercept sensitive communications from military personnel, politicians, journalists, and activists. The attackers are exploiting Signal’s >>linked…
-
Threat Actors Using $10 Infostealer Malware to Compromise US Security
Tags: access, credentials, cyber, cybersecurity, data-breach, defense, malware, marketplace, military, threatA recent cybersecurity investigation has unveiled a troubling reality: U.S. military personnel and employees of major defense contractors, including Lockheed Martin, Boeing, and Honeywell, have been compromised by infostealer malware. This inexpensive yet potent cyberweapon, available for as little as $10 per infected device on underground marketplaces, has exposed critical credentials, including access to classified…
-
Russian state hackers spy on Ukrainian military through Signal app
Russian state-backed hackers are increasingly targeting Signal messenger accounts, including those used by Ukrainian military personnel and government officials, in an effort to access sensitive information that could aid Moscow’s war effort, researchers warn. First seen on therecord.media Jump to article: therecord.media/russian-state-hackers-spy-on-ukraine-military-signal
-
Hundreds of US Military and Defense Credentials Compromised
Hudson Rock has found evidence that infostealers have compromised hundreds of US military and defense contractor credentials First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/us-military-defense-credentials/
-
Healthcare outfit that served military personnel settles allegations it faked infosec compliance for $11 million
If this makes you feel sick, knowing this happened before ransomware actors started targeting medical info may help First seen on theregister.com Jump to article: www.theregister.com/2025/02/19/decadeold_healthcare_security_snafu_settled/
-
$10 Infostealers Are Breaching Critical US Security: Military and Even the FBI Hit
A new report reveals how cheap Infostealer malware is exposing US military and defense data, putting national security at risk. Hackers exploit human error to gain access. First seen on hackread.com Jump to article: hackread.com/infostealers-breach-us-security-military-fbi-hit/
-
US Military, Defense Contractors Infected with Infostealers: Hudson Rock
A report by cybersecurity firm Hudson Rock says hundreds of computers from the U.S. Army and Navy and defense contractors like Honeywell and Boeing are infected with infostealer malware, endangering the security of the systems and threatening third-party players. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/02/us-military-defense-contractors-infected-with-infostealers-hudson-rock/
-
The Security Interviews: Yevgeny Dibrov, Armis
Armis CEO Yevgeny Dibrov talks about how his military service and intelligence work opened the door into the world of cyber security entrepreneurship First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366618690/The-Security-Interviews-Yevgeny-Dibrov-Armis
-
Privacy Roundup: Week 7 of Year 2025
Tags: access, antivirus, api, apple, attack, breach, business, cctv, cve, cybersecurity, data, data-breach, detection, email, exploit, firmware, flaw, google, group, law, leak, malware, microsoft, military, network, password, phishing, privacy, router, scam, service, software, technology, threat, tool, update, virus, vpn, vulnerability, windows, zero-dayThis is a news item roundup of privacy or privacy-related news items for 9 FEB 2025 – 15 FEB 2025. Information and summaries provided here are as-is for warranty purposes. Note: You may see some traditional “security” content mixed-in here due to the close relationship between online privacy and cybersecurity – many things may overlap;…
-
The Murky Ad-Tech World Powering Surveillance of US Military Personnel
A Florida data broker told a US senator it obtained sensitive data on US military members in Germany from a Lithuanian firm, which denies involvement”, revealing the opaque nature of online ad surveillance. First seen on wired.com Jump to article: www.wired.com/story/rtb-location-data-us-military/
-
Russian hacking group targets critical infrastructure in the US, the UK, and Canada
Tags: access, attack, blizzard, computer, control, cyber, cyberattack, cybersecurity, data, espionage, exploit, fortinet, group, hacker, hacking, infrastructure, intelligence, international, microsoft, military, network, ransomware, russia, software, strategy, supply-chain, threat, tool, ukraine, update, vulnerability, zero-trustWeaponizing IT software against global enterprises: Since early 2024, the hackers have exploited vulnerabilities in widely used IT management tools, including ConnectWise ScreenConnect (CVE-2024-1709) and Fortinet FortiClient EMS (CVE-2023-48788). By compromising these critical enterprise systems, the group has gained undetected access to networks, Microsoft warned.”Seashell Blizzard’s specialized operations have ranged from espionage to information operations…
-
Italian Government Denies It Spied on Journalists and Migrant Activists Using Paragon Spyware
The Italian government denied it hacked seven cellphones with military-grade surveillance technology from Paragon Solutions. The post Italian Government Denies It Spied on Journalists and Migrant Activists Using Paragon Spyware appeared first on SecurityWeek. First seen on securityweek.com Jump to article: www.securityweek.com/italian-government-denies-it-spied-on-journalists-and-migrant-activists-using-paragon-spyware/
-
This Ad-Tech Company Is Powering Surveillance of US Military Personnel
In a letter to a US senator, a Florida-based data broker says it obtained sensitive data on US military members in Germany from a Lithuanian firm, revealing the global nature of online ad surveillance. First seen on wired.com Jump to article: www.wired.com/story/rtb-location-data-us-military/
-
The Rise of Typhoon Cyber Groups
Tags: access, attack, breach, communications, control, cyber, cyberattack, cybersecurity, data, defense, dns, endpoint, espionage, exploit, finance, government, group, infrastructure, intelligence, iot, military, monitoring, network, phone, resilience, supply-chain, tactics, threat, tool, vulnerability, zero-day -
Russian military hackers deploy malicious Windows activators in Ukraine
The Sandworm Russian military cyber-espionage group is targeting Windows users in Ukraine with trojanized Microsoft Key Management Service (KMS) activators and fake Windows updates. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/russian-military-hackers-deploy-malicious-windows-activators-in-ukraine/
-
British military drops basic training to fast track recruitment of ‘cyber warriors’
The British government is dropping the traditional fitness and weapons training for specialist cyber military recruits in order to address a cyber skills shortage within His Majesty’s Armed Forces, including in its arm for offensive operations in the National Cyber Force. First seen on therecord.media Jump to article: therecord.media/british-military-drops-basic-training-to-fast-track-cyber-recruits
-
The Rise of the Drone Boats
Tags: militarySwarms of weaponized unmanned surface vessels have proven formidable weapons in the Black and Red Seas. Can the US military learn the right lessons from it? First seen on wired.com Jump to article: www.wired.com/story/the-rise-of-the-drone-boats/
-
UK Military Fast-Tracks Cybersecurity Recruitment
The UK MoD has announced it is fast-tracking the recruitment of specialist cybersecurity roles, with recruits offered a starting salary of above £40,000 First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/uk-military-cybersecurity/
-
Russia’s intelligence recruits Ukrainians for terror attacks via messaging apps
Russia’s intelligence recruits Ukrainians for terror attacks via messaging apps and forums, offering quick pay, Ukraine’s law enforcement warns. According to Ukraine’s law enforcement, Russian intelligence is using messaging apps and forums to recruit Ukrainians for terrorist attacks, offering quick pay. Ukrainian authorities have recently seen a rise in terrorist attacks on police, military centers,…
-
Paragon Spyware Allegedly Ends Spyware Contract with Italy
Paragon Solutions, an Israeli cybersecurity firm, has reportedly ended its spyware contract with Italy. The termination comes in the wake of revelations that its military-grade hacking software, Graphite, was allegedly used to target 90 individuals, including journalists and activists, across two dozen countries. This includes three Italian figures critical of the government’s policies. The spyware…
-
Spanish Police Arrest Suspected NATO and US Army Hacker
Spain’s National Police force has arrested a suspected data thief who targeted government and military victims First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/spanish-police-arrest-nato-us-army/

