Remove Military Remove Security Remove Training
article thumbnail

US adds Tencent to the list of companies supporting Chinese military

Security Affairs

US adds Chinese multinational technology and entertainment conglomerate Tencent to the list of companies supporting the Chinese military. The US Department of Defense has added Chinese multinational technology and entertainment conglomerate Tencent to its “Chinese military company” list under the Section 1260 requirement.

Military 175
article thumbnail

A phishing campaign targets Ukrainian military entities with drone manual lures

Security Affairs

A phishing campaign targets Ukrainian military entities using drone manuals as lures to deliver the post-exploitation toolkit Merlin. The campaign, codenamed STARK#VORTEX by Securonix, targets Ukrainian military entities and CERT-UA attributed it to a threat actor tracked as UAC-0154. ” concludes the report.

Military 335
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Experts warn of China-linked APT’s Raptor Train IoT Botnet

Security Affairs

Researchers warn of a new IoT botnet called Raptor Train that already compromised over 200,000 devices worldwide. Cybersecurity researchers from Lumen’s Black Lotus Labs discovered a new botnet, named Raptor Train, composed of small office/home office (SOHO) and IoT devices. “This botnet has targeted entities in the U.S.

IoT 345
article thumbnail

US Cyber Command and Australian IWD to develop shared cyber training range

Security Affairs

US Cyber Command and the Information Warfare Division (IWD) of the Australian Defense Force to develop a virtual cyber training platform. The United States and Australia have signed a first-ever cyber agreement to develop a virtual cyber training platform, the project will be designed by the U.S. Australian cooperation.

Military 296
article thumbnail

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 34

Security Affairs

Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape. Military & Defense Sector: A Cybersecurity Disaster in the Making Analyzing ELF/Sshdinjector.A!

Security 166
article thumbnail

Russia-linked APT28 targets govt bodies with fake NATO training docs

Security Affairs

Russia-linked cyberespionage group APT28 uses fake NATO training documents as bait in attacks aimed at government bodies. The malicious code was distributed using fake NATO training materials as bait and had a very low detection rate of 3/61 on VirusTotal. ” reads the report published QuoIntelligence. Pierluigi Paganini.

Military 296
article thumbnail

US Govt kicked off ‘Hack the Army 3.0’ bug bounty program

Security Affairs

. “Bug bounty programs are a unique and effective ‘force multiplier’ for safeguarding critical Army networks, systems and data, and build on the efforts of our Army and DoD security professionals,” said Brig. There is only one way to secure our connected society, together, and the U.S. Volant, U.S.

Military 360