Remove Metadata Remove Military Remove Security
article thumbnail

Cisco addressed Webex flaws used to compromise German government meetings

Security Affairs

In March, the German authorities admitted the hack by Russia-linked actors of a military meeting where participants discussed giving military support to Ukraine. Cisco notified customers who experienced observable attempts to access meeting information and metadata. ” reads the advisory published by the company. .

article thumbnail

Ukraine intelligence doxed 5 FSB Officers that are members of Gamaredon APT Group

Security Affairs

Ukraine’s premier law enforcement and counterintelligence disclosed the real identities of five alleged members of the Russia-linked APT group Gamaredon (aka Primitive Bear, Armageddon, Winterflounder, or Iron Tilden) that are suspected to be components of the Russian Federal Security Service (FSB). ” concludes the announcement.

Military 349
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Experts spotted two Android spyware used by Indian APT Confucius

Security Affairs

Researchers at mobile security firm Lookout have provided details about two recently discovered Android spyware families, dubbed Hornbill and SunBird, used by an APT group named Confucius. The two malware were used to spy on personnel linked to Pakistan’s military, nuclear authorities, and Indian election officials in Kashmir.

Metadata 359
article thumbnail

NK-linked InkySquid APT leverages IE exploits in recent attacks

Security Affairs

APT37 has been active since at least 2012, it mainly targeted government, defense, military, and media organizations in South Korea. Supports: Win7 IE, Win10 IE, Edge, Chrome, and Naver Whale Recursively search a path and upload file metadata (timestamps, size, and full path). ” reads the post published by Volexity.

Metadata 300
article thumbnail

Swiss army asks its personnel to use the Threema instant-messaging app

Security Affairs

We got an FBI training doc on obtaining data from secure messaging apps, and shared it w/ @AndyKroll / @RollingStone. Anyway, depending on the single encrypted messaging apps, law enforcement could extract varying metadata that could allow unmasking the end-users. FOIA [link] — PropertyOfThePeople (@PropOTP) November 29, 2021.

FOIA 308
article thumbnail

GUEST ESSAY: How tech tricks used by Amazon, Netflix aid Ukraine in repelling Russia’s invasion

The Last Watchdog

Accessing video-based intelligence at the right time and place is a very effective method for gaining information about the constantly changing military landscape. Value of protocols Technological innovations have widely been credited for helping Ukraine even the odds against Russia’s military might.

Metadata 130
article thumbnail

Latest Turla backdoor leverages email PDF attachments as C&C mechanism

Security Affairs

“Importantly, our own investigation has determined that, beyond this much-publicized security breach, the group has leveraged the same backdoor to open a covert access channel to the foreign offices of another two European countries, as well as to the network of a major defense contractor.” Pierluigi Paganini.

Metadata 176