During four weeks towards the end of 2019, a total of 60 hackers managed to hack the U.S. Air Force.
Between October 23 and November 20, what was described as "a battalion of hackers" by Dr. Michael Parker, CIO, and deputy chief of U.S. Air Force staff for manpower, personnel and services, took aim at the Air Force Virtual Data Center.
This really is not as bad as it first seems. The hackers were of the white hat variety and taking part in the fourth Hack the Air Force challenge. A challenge, operated in partnership between the U.S. Department of Defense and the HackerOne hacking platform, designed to strengthen security posture rather than weaken it.
Were you following this:
Report on North Korean hacking offers a surprise twist - POLITICO
— U.S. agencies offered a reward for information on North Korean hackers, and revealed some surprising news about how they operate.
— The North Carolina NAACP sued the state and counties for using a voting machine that it contends is vulnerable to cyberattacks.
— Syrian hackers have adopted coronavirus-themed phishing lures, researchers said in a report released today.
Sign up for POLITICO Nightly: Coronavirus Special Edition , your daily update on how the illness is affecting politics, markets, public health and more.
Hacked Zoom accounts, personal information are being sold on the dark web by the thousands | Fox
Zoom CEO Eric Yuan discusses improving Zoom's security amid privacy concerns and reports of 'zoombombing.'
* * *
In fact, one dataset that was sold on a hacker forum included 530,000 Zoom accounts, BleepingComputer first reported.
The dataset was purchased by cybersecurity firm Cyble -- which reportedly started seeing Zoom account information posted on the dark web as early as April 1 -- in order to inform customers of potential breaches, BleepingComputer reported.
Russian state hackers behind San Francisco airport hack | ZDNet
Today's security threats have expanded in scope and seriousness. There can now be millions -- or even billions -- of dollars at risk when information security isn't handled properly.
Hackers believed to be operating on behalf of the Russian government have hacked two websites operated by the San Francisco International Airport, cyber-security firm ESET said today.
According to San Francisco airport officials, hackers breached both websites and planted code that exploited an Internet Explorer bug to steal login credentials.
Other things to check out:
Could Return of Ghost Squad Hackers Signal Rise in ...
The Ghost Squad Hackers (GSH), an offshoot of the hacktivist group Anonymous, has been active during this COVID-19 period after remaining fairly quiet these past couple of years, according to a blog post by cyberthreat intelligence firm Vigilante.
"We think the hacks are probably attempts to undermine public confidence in government at a time of universal unease due to the COVID-19 pandemic," says Adam Darrah, Vigilante's director of intelligence, adding that more such attacks could follow from GSH or other hacktivist groups. "The United States is a highly desirable target, and it would make sense that hacktivists would pour salt on the wounds in a country like Italy, which has had such a hard time."
FBI official says foreign hackers have targeted COVID-19 research - Reuters
WASHINGTON (Reuters) - A senior cybersecurity official with the Federal Bureau of Investigation said on Thursday that foreign government hackers have broken into companies conducting research into treatments for COVID-19, the respiratory illness caused by the coronavirus.
FBI Deputy Assistant Director Tonya Ugoretz told participants in an online panel discussion hosted by the Aspen Institute that the bureau had recently seen state-backed hackers poking around a series of healthcare and research institutions.
Pastebin just made it easier for hackers to avoid detection, researchers say - CyberScoop
Pastebin, a repository where users can post and share raw text files, said on Wednesday it has discontinued a service that charged users a $50 one-time fee to search the site for new data.
Researchers had used the scraping API to scour Pastebin for cybercriminal activity, as hackers frequently posted stolen personal data and malicious code to the site. Pastebin has a lot of legitimate activity, including posts about software tests and blocks of banal code meant for cryptographic network protocols. The malicious activity makes up a fraction of the content, and is difficult to identify without scraping capabilities because of the construction of the site.
500,000 Hacked Zoom Accounts Given Away For Free On The Dark Web
Cyble purchased more than 530,000 on an underground hacking forum for next to nothing. Several of the company's clients were among the stolen credentials, which also included personal meeting URLs and Zoom host keys. Cyble reached out and confirmed that the credentials were indeed valid.
Happening on Twitter
If A Tree Falls…? A Marine with Special Purpose Marine Air-Ground Task Force-Crisis Response-Africa 20.1, @usmcfea… https://t.co/PvgkjUfLpA USMC (from Washington, D.C.) Wed Apr 15 13:00:01 +0000 2020
President Donald Trump's much-touted $4 billion deal with Boeing for two new Air Force One aircraft didn't include… https://t.co/hHVMoxF57K navybook (from Washington, D.C.) Thu Apr 16 13:49:23 +0000 2020
Air National Guard units based in Wisconsin and Alabama have been awarded squadrons of F-35 fighter jets, the U.S.… https://t.co/REt8qHWAmT starsandstripes (from Washington D.C.) Wed Apr 15 20:38:00 +0000 2020
No comments:
Post a Comment