Tag: military
-
10 promising cybersecurity startups CISOs should know about
Tags: access, ai, attack, automation, business, ceo, ciso, cloud, compliance, container, control, cybersecurity, data, deep-fake, defense, detection, endpoint, exploit, finance, gartner, google, governance, government, grc, ibm, identity, linux, malicious, microsoft, military, monitoring, network, open-source, ransomware, RedTeam, risk, saas, software, startup, supply-chain, technology, threat, tool, vulnerability, vulnerability-management, zero-trust2. Chainguard: Category: Software supply chain securityWhy they’re here: Founded in 2021 by Dan Lorenc (formerly at Microsoft and Google), Chainguard offers a Linux-based platform for securely building applications. The company has raised more than $600M and is valued at $3.5B. In fiscal year 2025, Chainguard reached a $40M annual run rate and by the…
-
Cyber-espionage campaign mirroring Sandworm TTPs hit Russian and Belarusian military
A spear-phishing campaign aimed to compromise Russian and Belarusian military personnel by using military-themed documents as a lure has been flagged by Cyble and Seqrite … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/11/03/russian-belarusian-military-spear-phishing/
-
Hacktivists increasingly target industrial control systems, Canada Cyber Centre warns
Tags: authentication, control, cyber, cybersecurity, data, data-breach, government, hacker, infrastructure, Internet, leak, mfa, military, service, technology, vpn, vulnerabilityHacked fuel tank gauges can lead to dangerous situations: In another incident reported by the Canadian Centre for Cyber Security, attackers accessed an internet-exposed automated tank gauge (ATG) belonging to a Canadian oil and gas company and manipulated its values, triggering false alarms.ATGs are used to monitor fuel level, pressure, and temperature inside fuel tanks.…
-
Hacktivists increasingly target industrial control systems, Canada Cyber Centre warns
Tags: authentication, control, cyber, cybersecurity, data, data-breach, government, hacker, infrastructure, Internet, leak, mfa, military, service, technology, vpn, vulnerabilityHacked fuel tank gauges can lead to dangerous situations: In another incident reported by the Canadian Centre for Cyber Security, attackers accessed an internet-exposed automated tank gauge (ATG) belonging to a Canadian oil and gas company and manipulated its values, triggering false alarms.ATGs are used to monitor fuel level, pressure, and temperature inside fuel tanks.…
-
Cyble Detects Advanced Backdoor Targeting Defense Systems via Belarus Military Lure
Cyble Research and Intelligence Labs (CRIL) have uncovered a cyber-espionage operation that used a weaponized ZIP archive to infiltrate defense-sector systems. The malicious file”, disguised as a Belarusian military document titled “ТЛГ на убытие на переподготовку.pdf” (“TLG for departure for retraining.pdf”)”, delivered a highly advanced backdoor capable of establishing covert access through SSH and Tor. First seen on thecyberexpress.com Jump to article: thecyberexpress.com/belarus-military-hit-by-ssh-tor-backdoor/
-
Cyble Detects Advanced Backdoor Targeting Defense Systems via Belarus Military Lure
Cyble Research and Intelligence Labs (CRIL) have uncovered a cyber-espionage operation that used a weaponized ZIP archive to infiltrate defense-sector systems. The malicious file”, disguised as a Belarusian military document titled “ТЛГ на убытие на переподготовку.pdf” (“TLG for departure for retraining.pdf”)”, delivered a highly advanced backdoor capable of establishing covert access through SSH and Tor. First seen on thecyberexpress.com Jump to article: thecyberexpress.com/belarus-military-hit-by-ssh-tor-backdoor/
-
Operation SkyCloak Targets Russian/Belarusian Military With LNK Exploit and OpenSSH Over Tor Backdoor
The post Operation SkyCloak Targets Russian/Belarusian Military With LNK Exploit and OpenSSH Over Tor Backdoor appeared first on Daily CyberSecurity. First seen on securityonline.info Jump to article: securityonline.info/operation-skycloak-targets-russian-belarusian-military-with-lnk-exploit-and-openssh-over-tor-backdoor/
-
Operation SkyCloak Targets Russian/Belarusian Military With LNK Exploit and OpenSSH Over Tor Backdoor
The post Operation SkyCloak Targets Russian/Belarusian Military With LNK Exploit and OpenSSH Over Tor Backdoor appeared first on Daily CyberSecurity. First seen on securityonline.info Jump to article: securityonline.info/operation-skycloak-targets-russian-belarusian-military-with-lnk-exploit-and-openssh-over-tor-backdoor/
-
China kann Busse in Norwegen still legen; Israel zieht China-Autos wegen Spionage-Gefahr ein
Ich fasse mal zwei Meldungen zusammen, die mir gerade auf den Tisch kamen. Das israelische Militär zieht chinesische PKWs ihrer Soldaten ein, weil der Verdacht besteht, dass diese Fahrzeuge für Spionage eingesetzt werden. Und in Norwegen hat ein geheimer Test … First seen on borncity.com Jump to article: www.borncity.com/blog/2025/11/03/china-kann-busse-in-norwegen-still-legen-israel-zieht-china-autos-wegen-spionage-gefahr-ein/
-
China kann Busse in Norwegen still legen; Israel zieht China-Autos wegen Spionage-Gefahr ein
Ich fasse mal zwei Meldungen zusammen, die mir gerade auf den Tisch kamen. Das israelische Militär zieht chinesische PKWs ihrer Soldaten ein, weil der Verdacht besteht, dass diese Fahrzeuge für Spionage eingesetzt werden. Und in Norwegen hat ein geheimer Test … First seen on borncity.com Jump to article: www.borncity.com/blog/2025/11/03/china-kann-busse-in-norwegen-still-legen-israel-zieht-china-autos-wegen-spionage-gefahr-ein/
-
Sandworm APT Attacks Belarus Military With LNK Exploit and OpenSSH Over Tor obfs4 Backdoor
The post Sandworm APT Attacks Belarus Military With LNK Exploit and OpenSSH Over Tor obfs4 Backdoor appeared first on Daily CyberSecurity. First seen on securityonline.info Jump to article: securityonline.info/sandworm-apt-attacks-belarus-military-with-lnk-exploit-and-openssh-over-tor-obfs4-backdoor/
-
Sandworm APT Attacks Belarus Military With LNK Exploit and OpenSSH Over Tor obfs4 Backdoor
The post Sandworm APT Attacks Belarus Military With LNK Exploit and OpenSSH Over Tor obfs4 Backdoor appeared first on Daily CyberSecurity. First seen on securityonline.info Jump to article: securityonline.info/sandworm-apt-attacks-belarus-military-with-lnk-exploit-and-openssh-over-tor-obfs4-backdoor/
-
Hackers Hide SSHTor Backdoor Inside Weaponized Military Documents
In October 2025, cybersecurity researchers at Cyble Research and Intelligence Labs (CRIL) uncovered a sophisticated malware campaign distributing weaponized ZIP archives disguised as military documents. The attack specifically targeted Belarusian military personnel through a lure document titled >>ТЛГ на убытие на переподготовку.pdf
-
Transnational Organized Crime Gang Steals $1 Million from Ontario Couple
Today my LinkedIn feed and Google News filter is showing me several stories that illustrate how we are failing to stop online scammers from stealing from our elderly. It starts with the headlines. CTVNews: Ontario seniors GIVE AWAY MORE THAN $1 MILLION to scammers.CTVNews: Ontario couple LOSES MORE THAN $1 MILLION DOLLARS to fraud.Toronto Only:…
-
Step aside, SOC. It’s time to ROC
Tags: attack, breach, business, communications, corporate, cyber, cybersecurity, data, defense, exploit, finance, framework, government, infrastructure, insurance, intelligence, military, monitoring, network, resilience, risk, risk-assessment, soc, strategy, threat, vpn, vulnerability, zero-dayWhat is a ROC?: At its core, the Resilience Risk Operations Center (ROC) is a proactive intelligence hub. Think of it as a fusion center in which cyber, business and financial risk come together to form one clear picture.While the idea of a ROC isn’t entirely new, versions of it have existed across government and…
-
Step aside, SOC. It’s time to ROC
Tags: attack, breach, business, communications, corporate, cyber, cybersecurity, data, defense, exploit, finance, framework, government, infrastructure, insurance, intelligence, military, monitoring, network, resilience, risk, risk-assessment, soc, strategy, threat, vpn, vulnerability, zero-dayWhat is a ROC?: At its core, the Resilience Risk Operations Center (ROC) is a proactive intelligence hub. Think of it as a fusion center in which cyber, business and financial risk come together to form one clear picture.While the idea of a ROC isn’t entirely new, versions of it have existed across government and…
-
Civilian Airport OT: the US Military’s Soft Underbelly
Airport Baggage Carousels Are Weapons, in the Right Hands. Consider the airport baggage carousel. It’s big, clunky and tedious to wait by. But look at it like a war planner does, and it’s suddenly very different: An almost certainly poorly secured technology system that foreign adversaries could exploit to disrupt military mobilization across the United…
-
TransparentTribe Targets Linux Systems in Indian Military to Deploy DeskRAT
In July 2025, cybersecurity firm CYFIRMA uncovered an active phishing campaign targeting Linux-based operating systems used by Indian government and military organisations. This operation, attributed to TransparentTribe (also known as APT36 or Operation C-Major), is the latest in a series of ongoing cyber espionage campaigns supporting Pakistan’s strategic interests. TransparentTribe, a Pakistani-nexus threat group active…
-
TransparentTribe Targets Linux Systems in Indian Military to Deploy DeskRAT
In July 2025, cybersecurity firm CYFIRMA uncovered an active phishing campaign targeting Linux-based operating systems used by Indian government and military organisations. This operation, attributed to TransparentTribe (also known as APT36 or Operation C-Major), is the latest in a series of ongoing cyber espionage campaigns supporting Pakistan’s strategic interests. TransparentTribe, a Pakistani-nexus threat group active…
-
TransparentTribe Targets Linux Systems in Indian Military to Deploy DeskRAT
In July 2025, cybersecurity firm CYFIRMA uncovered an active phishing campaign targeting Linux-based operating systems used by Indian government and military organisations. This operation, attributed to TransparentTribe (also known as APT36 or Operation C-Major), is the latest in a series of ongoing cyber espionage campaigns supporting Pakistan’s strategic interests. TransparentTribe, a Pakistani-nexus threat group active…
-
Cyberangriff auf Jaguar ist teuerster in britischer Geschichte
Der Hackerangriff auf den Autobauer Jaguar Land Rover hat die britische Regierung viel Geld gekostet.Der Cyberangriff auf den britischen Autobauer Jaguar Land Rover war nach Einschätzung von Experten der wirtschaftlich schädlichste in der Geschichte des Landes. Die Einbußen durch den wochenlangen erzwungenen Produktionsstopp belaufen sich demnach auf geschätzte 1,9 Milliarden Pfund (knapp 2,2 Milliarden Euro). Die…
-
Cyberangriff auf Jaguar ist teuerster in britischer Geschichte
Der Hackerangriff auf den Autobauer Jaguar Land Rover hat die britische Regierung viel Geld gekostet.Der Cyberangriff auf den britischen Autobauer Jaguar Land Rover war nach Einschätzung von Experten der wirtschaftlich schädlichste in der Geschichte des Landes. Die Einbußen durch den wochenlangen erzwungenen Produktionsstopp belaufen sich demnach auf geschätzte 1,9 Milliarden Pfund (knapp 2,2 Milliarden Euro). Die…
-
Bitter APT Exploiting Old WinRAR Vulnerability in New Backdoor Attacks
South Asian hacking group Bitter (APT-Q-37) is deploying a C# backdoor using two new methods: a WinRAR flaw and malicious Office XLAM files, targeting government and military sectors. First seen on hackread.com Jump to article: hackread.com/bitter-apt-winrar-vulnerability-backdoor-attacks/
-
Dead-Drop Resolvers: Malware’s Quiet Rendezvous and Why Adaptive Defense Matters
At this weekend’s BSides NYC, Dr. Jonathan Fuller, CISO of the U.S. Military Academy at West Point, delivered an extremely clear talk on how modern malware hides its command-and-control (C2) infrastructure through dead-drop resolvers. Fuller, who co-authored Georgia Tech’s VADER project, described how adversaries increasingly use public platforms-GitHub, Dropbox, Pastebin, even blockchain transactions-as-covert meeting points…
-
Britisches Militär von Cyberattacke getroffen
Großbritannien wird immer häufiger Ziel von schwerwiegenden Cyberangriffen. Jetzt hat es das Militär getroffen.Laut einem Bericht der britischen Zeitung Daily Mail ist es russischen Hackern gelungen, Hunderte sensibler Militärdokumente zu ergaunern. Darunter befinden sich demnach Informationen zu acht Stützpunkten der Royal Air Force und der Royal Navy.Der von der Boulevardzeitung als ‘katastrophal” bezeichnete Sicherheitsvorfall geht auf…
-
Britisches Militär von Cyberattacke getroffen
Großbritannien wird immer häufiger Ziel von schwerwiegenden Cyberangriffen. Jetzt hat es das Militär getroffen.Laut einem Bericht der britischen Zeitung Daily Mail ist es russischen Hackern gelungen, Hunderte sensibler Militärdokumente zu ergaunern. Darunter befinden sich demnach Informationen zu acht Stützpunkten der Royal Air Force und der Royal Navy.Der von der Boulevardzeitung als ‘katastrophal” bezeichnete Sicherheitsvorfall geht auf…
-
Vets Will Test UK Digital ID Plan”¯
As the UK tests digital ID cards for military veterans ahead of a 2027 nationwide rollout, privacy concerns and cybersecurity warnings are growing. Experts caution that without strong zero-trust principles, encryption, and PAM enforcement, the program could expose citizens and government systems to new risks. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/10/vets-will-test-uk-digital-id-plan/
-
Vets Will Test UK Digital ID Plan”¯
As the UK tests digital ID cards for military veterans ahead of a 2027 nationwide rollout, privacy concerns and cybersecurity warnings are growing. Experts caution that without strong zero-trust principles, encryption, and PAM enforcement, the program could expose citizens and government systems to new risks. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/10/vets-will-test-uk-digital-id-plan/
-
Russian Lynk group leaks sensitive UK MoD files, including info on eight military bases
Russian hackers stole and leaked MoD files on eight RAF and Navy bases, exposing staff data in a “catastrophic” cyberattack via Dodd Group breach. Russian cybercrime group Lynx breached Dodd Group, a contractor for the UK Ministry of Defence, stealing and leaking hundreds of sensitive files on eight RAF and Royal Navy bases. The incident…
-
UK Ministry of Defense Probes Military Contractor Data Leak
Ransomware Group Lynx Reportedly Stole 4TB of Data. The U.K. Ministry of Defense is investigating an apparent data breach by Russian-speaking ransomware hackers of a building facilities contractor with ties to the military. The Lynx ransomware group posted on its darkweb site samples of what it says is 4 terabytes of data stolen from the…

