Quantcast
Super Channel: Collections
Browsing latest articles
View live

The 10th CyCon Starts Next Week

$
0
0

Next week, on May 30th the NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE) opens the 10th International Conference on Cyber Conflict, CyCon 2018. The anniversary event focuses on the theme of maximising effects in the cyber domain.


The 10th CyCon Starts Next Week

The 10th CyCon Hosts 700 Cyber Experts in Tallinn

CyCon 2019 Theme is Silent Battle in Cyber Space

Romania to Join the NATO Cooperative Cyber Defence Centre of Excellence in Tallinn

$
0
0

The Prime Minister of Romania, Mrs. Viorica Dăncilă, announced today during her visit to Estonia that Romania looks forward to joining NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE) in 2019. NATO-accredited cyber defence hub in Tallinn welcomes the decision of Romania to become another NATO Ally to join the Centre.

Colonel Jaak Tarien to Become Director of the NATO Cooperative Cyber Defence Centre of Excellence

$
0
0

As of 1 September 2018 Colonel Jaak Tarien, former Commander of Estonian Air Force for the past six years, will assume the role of Director of the NATO Cooperative Cyber Defence Centre of Excellence based in Estonia.

Merle Maigre, current Director of CCDCOE, will take on a new challenge in September by joining CybExer Technologies, an Estonian cyber security company which is rapidly expanding its operations both in Estonia and abroad.

Colonel Jaak Tarien assumes command of NATO CCDCOE

$
0
0

Colonel Jaak Tarien, until recently the long-term Commander of Estonian Air Force, assumed today from Merle Maigre the role of Director of the NATO Cooperative Cyber Defence Centre of Excellence based in Tallinn.

CyCon 2019 Papers are Expected by 1 October

$
0
0

The Call for CyCon 2019 Papers is open until 1 October 2018. The theme for the eleventh International Conference on Cyber Conflict, hosted by the NATO Cooperative Cyber Defence Centre of Excellence, is ‘Silent Battle’. CyCon 2019 will take place in Tallinn, Estonia, from 28 to 31 May 2019.

The International Conference on Cyber Conflict, CyCon, is entering its second decade. Throughout the years, CyCon has established itself as a prominent multidisciplinary conference, introducing keynotes and panels focusing on the technical, legal, policy, strategy and military perspectives of cyber defence and security. This is undoubtedly thanks to the amount of high-quality original academic research presented at the conference. In 2018, the Academic Review Committee selected 22 articles that were presented at the conference and published in the proceedings.


NATO CCDCOE brings improvement through practice

$
0
0

The NATO Cooperative Cyber Defence Centre of Excellence contributes this week to the setup and organisation of NATO’s largest cyber exercise Cyber Coalition 2018 taking place in Tartu, Estonia. This year, the experts of the Centre contributed to the operational and legal part of the exercise scenario, adding respective challenges to the participating cyber experts across the Alliance.

New Study by the CCDCOE: Cyber Security Organisation in Turkey

$
0
0

New Study by the CCDCOE: Cyber Security Organisation in Turkey

A recent report by NATO CCDCOE “National Cyber Security Organisation: Turkey” outlines the current cyber security landscape in Turkey. Being the most recent issue of the NATO CCD COE’s National Cybersecurity Governance series, the report provides a comprehensive overview of the digital ecosystem in Turkey and describes the responsibilities of different national agencies designated to ensure the security in the cyberspace. 

Türkiye captures nearly 3000 Daesh suspects in 10 months - Daily Sabah

$
0
0
... Daesh terrorist group were detained between ... Daesh operates a so-called Khorasan Province (Daesh ... U.S. or European Union member countries, since ...

Google fixed critical Chrome vulnerability CVE-2024-4058

$
0
0

Google addressed a critical Chrome vulnerability, tracked as CVE-2024-4058, that resides in the ANGLE graphics layer engine.

Google addressed four vulnerabilities in the Chrome web browser, including a critical vulnerability tracked as CVE-2024-4058.

The vulnerability CVE-2024-4058 is a Type Confusion issue that resides in the ANGLE graphics layer engine. An attacker can exploit this vulnerability to execute arbitrary code on a victim’s machine.

This critical flaw was reported by Toan (suto) Pham and Bao (zx) Pham of Qrious Secure on 2024-04-02, the researchers have been awarded a $16,000 bounty.

The IT giant also fixed a high-severity flaw tracked as CVE-2024-4059. The flaw is an Out of bounds read that resides in the in V8 API. The vulnerability was discovered by Eirik on 2024-04-08.

Google also fixed another high-severity flaw tracked as CVE-2024-4060. The flaw is Use after free in Dawn, which is an open-source and cross-platform implementation of the WebGPU standard. The vulnerability was reported by wgslfuzz on 2024-04-09.

The Stable channel has been updated to 124.0.6367.78/.79 for Windows and Mac. Linux version 124.0.6367.78 will be rolled out over the coming days/weeks.

Pierluigi Paganini

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

(SecurityAffairs – hacking, Google)

[ED] Defenseless against NK hackers - The Korea Times

$
0
0
North Korean hacking groups were found to have infiltrated the internal networks of South Korea's defense companies and stolen technical data over ...

These Issues Are Testing the U.S.-China Thaw - The New York Times

$
0
0
Secretary of State Antony J. Blinken is in China this week as tensions have risen over trade, security, Russia's war on Ukraine and the Middle ...

NY Post Cover for April 25, 2024

$
0
0
New York Post · See All Covers. Breaking News. Slack co-founder's teen reported missing ... You can set your browser to block or alert you ... You can set ...

China Cyber Security Market Size: 2031 Overview - LinkedIn

$
0
0
The China Cyber Security Market size was valued at USD xx.x Billion in 2023 and is projected to reach USD xx.

How crypto heists help North Korea fund its nuclear program - Times of India

$
0
0
"A second member state reported that 40% of the weapons of mass destruction programs of the DPRK are funded by illicit cybermeans," the report stated.

Cisco says hackers subverted its security devices to spy on governments - Reuters

$
0
0
Cybersecuritycategory · North Korea hacking teams hack South Korea defence contractors - police. April 22, 2024. Projection of cyber code on hooded ...

'Sophisticated' nation-state crew exploiting Cisco firewalls • The Register - Theregister

$
0
0
... Cyber Security Centre, and the UK's National Cyber Security Centre (NCSC). ... The disclosures, however, come as both Russian and China-backed hacking ...

The Long Arm of China's Security Services - The Cipher Brief

$
0
0
SUBSCRIBER+ EXCLUSIVE REPORTING — When Chinese President Xi Jinping came to San Francisco last November to meet with President Joe Biden, ...

Head of Belgian Foreign Affairs Committee says she was hacked by China | Reuters

$
0
0
Beijing has denied all such accusations. Van Hoof found out about the cyber attack last month, three years after the incident had taken place, via a ...

Lessons Learned Fron the LastPass Hack - ChurchLeaders

$
0
0
Once the bad actors had access to the computer, they were able to steal encrypted backups of LastPass user's password vaults. While there are a lot of ...

Apple's censorship in China is just the tip of the iceberg - Columbia Journalism Review

$
0
0
An anonymous source told the Journal that the Chinese Cyberspace Administration asked Apple to remove WhatsApp and Threads because both are home to ...

Deputy PM Oliver Dowden seeks to ease fears on cyber threat from China

$
0
0
MPs raised a number of issues in the Commons including over a Government-contracted 'supercomputer' from a Chinese firm.

DOJ arrested the founders of crypto mixer Samourai for facilitating $2 Billion in illegal transactions

$
0
0

The U.S. Department of Justice (DoJ) announced the arrest of two co-founders of a cryptocurrency mixer Samourai.

The U.S. Department of Justice (DoJ) has arrested two co-founders of the cryptocurrency mixer Samourai and seized the service. The allegations include claims of facilitating over $2 billion in illicit transactions and laundering more than $100 million in criminal proceeds.

The duo, Keonne Rodriguez (35) and William Lonergan Hill (65), are charged with operating Samourai Wallet, which DoJ states is an unlicensed money-transmitting business.

Keonne Rodriguez was the Chief Executive Officer of Samourai Wallet (“Samourai”), while William Lonergan Hill was the company’s Chief Technology Officer.

“These charges arise from the defendants’ development, marketing, and operation of a cryptocurrency mixer that executed over $2 billion in unlawful transactions and facilitated more than $100 million in money laundering transactions from illegal dark web markets, such as Silk Road and Hydra Market” reads the press release published by the DoJ.

RODRIGUEZ was arrested and is set to appear before a U.S. Magistrate Judge in the Western District of Pennsylvania. HILL was also arrested yesterday in Portugal following U.S. criminal charges. The United States aims to extradite HILL to face trial in the country.

The cryptocurrency mixer operated from about 2015 through February 2024, the DoJ states that both defendants were aware that a substantial portion of the funds that the service processed were criminal proceeds passed through Samourai for purposes of concealment. 

“While offering Samourai as a “privacy” service, the defendants knew that it was a haven for criminals to engage in large-scale money laundering and sanctions evasion.” continues the DoJ. “Indeed, as the defendants intended and well knew, a substantial portion of the funds that Samourai processed were criminal proceeds passed through Samourai for purposes of concealment.”

Rodriguez and Hill implemented features in the platform aimed at aiding individuals involved in criminal activities to obscure the origin of their proceeds. One feature, “Whirlpool,” offers a cryptocurrency mixing service that batches cryptocurrency exchanges among users to hinder law enforcement tracing on the Blockchain. Another feature, “Ricochet,” adds unnecessary intermediate transactions (“hops”) when sending cryptocurrency to obscure its origin.

Both features are aimed at evading detection by law enforcement and making investigations in illicit transactions more difficult.

“Similarly, RODRIGUEZ and HILL possessed and transmitted to potential investors marketing materials that discussed how Samourai’s customer base was intended to include criminals seeking privacy or the subversion of safeguards and reporting requirements by financial institutions.” continues the press release. “For example, in Samourai’s marketing materials, RODRIGUEZ and HILL similarly acknowledge that the individuals most likely to use a service like Samourai include individuals engaged in criminal activities, including “Restricted Markets.”

The DoJ also shared an excerpt from Samourai’s marketing materials showing the founders acknowledging that its revenues will be derived from “Dark/Grey Market participants” seeking to “swap their bitcoins with multiple parties” to avoid detection:

Samourai mixer

Since the launch of Whirlpool in 2019 and Ricochet in 2017, the mixer processed over 80,000 BTC (equivalent to over $2 billion), generating approximately $3.4 million in fees for Whirlpool transactions and $1.1 million for Ricochet transactions.

The joint operation conducted by US authorities with the help of Europol and law enforcement authorities in Iceland, and Portugal, led to the seizure of Samourai’s web servers and domain (https://samourai.io/).  The police also issued a seizure warrant for Samourai’s mobile application on the Google Play Store, the app was removed from the Google Play Store in the United States.

The authorities charged the defendants with one count of conspiracy to commit money laundering, which carries a maximum sentence of 20 years in prison, and one count of conspiracy to operate an unlicensed money transmitting business, which carries a maximum sentence of five years in prison. 

Pierluigi Paganini

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

(SecurityAffairs – hacking, mixer)

CISA adds Microsoft Windows Print Spooler flaw to its Known Exploited Vulnerabilities catalog

$
0
0

U.S. CISA added the Windows Print Spooler flaw CVE-2022-38028 to its Known Exploited Vulnerabilities catalog.

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added the CVE-2022-38028 Microsoft Windows Print Spooler Privilege Escalation vulnerability to its Known Exploited Vulnerabilities (KEV) catalog.

Cisa added the flaw to the KEV catalog after Microsoft reported that the Russia-linked APT28 group (aka “Forest Blizzard”, “Fancybear” or “Strontium” used a previously unknown tool, dubbed GooseEgg, to exploit the Windows Print Spooler flaw CVE-2022-38028.

Since at least June 2020, and possibly earlier, the cyberespionage group has used the tool GooseEgg to exploit the CVE-2022-38028 vulnerability. This tool modifies a JavaScript constraints file and executes it with SYSTEM-level permissions. Microsoft has observed APT28 using GooseEgg in post-compromise activities against various targets, including government, non-governmental, education, and transportation sector organizations in Ukraine, Western Europe, and North America.

While GooseEgg is a simple launcher application, threat actors can use it to execute other applications specified at the command line with elevated permissions. In a post-exploitation scenario, attackers can use the tool to carry out a broad range of malicious activities such as remote code execution, installing backdoors, and moving laterally through compromised networks.

The vulnerability CVE-2022-38028 was reported by the U.S. National Security Agency and Microsoft addressed it with the release of Microsoft October 2022 Patch Tuesday security updates.

APT28 deployed GooseEgg to gain elevated access to target systems and steal credentials and sensitive information.

According to Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities, FCEB agencies have to address the identified vulnerabilities by the due date to protect their networks against attacks exploiting the flaws in the catalog.

Experts recommend also private organizations review the Catalog and address the vulnerabilities in their infrastructure.

CISA orders federal agencies to fix this vulnerability by May 14, 2024.

Pierluigi Paganini

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

(SecurityAffairs – hacking, CISA)

China Creates 'Neucyber,' Its Version of a Neuralink Brain Chip | PCMag

$
0
0
China has reportedly developed a brain-computer interface chip called Neucyber that allows a monkey to control a robotic arm with only its ...

Solved Final Exam25. What does SovCits stand for?q,26. | Chegg.com

$
0
0
True or False The Islamic State of Iraq and the Levant, the Islamic State of Iraq and Syria are also known by its Arabic acronym Daesh. Final Exam. 2 ...

Cyber Security Headlines: Chinese keyboard flaws, hacked news story, TikTok on the clock

$
0
0
Last year, researchers at Citizen Lab found that the popular Sogou Chinese keyboard app failed to use TLS when sending keystroke data to the cloud ...

China's version of Neuralink unveiled at tech forum - Reuters

$
0
0
A Chinese state-backed company on Thursday unveiled a brain chip similar to the technology developed by Elon Musk's startup Neuralink.

Another Belgian MP falls victim to Chinese cyberattack - The Brussels Times

$
0
0
Another Belgian MP has fallen victim to a Chinese cyberattack. Els Van Hoof (CD&V) was targeted in the same round of attacks as Samuel Cogolati ...

The growing threat of Chinese cyberattacks - Bewley Recruitment

$
0
0
The growing threat of Chinese cyberattacks. Posted by Nigel Ling. true 25 April 2024. Share this article. Cyber Attacks ... While the article focuses on ...

Threat Actor Offers Database of Coppel for Sale - Daily Dark Web

$
0
0
Daily Dark Web. No Result. View All Result. Home Data Breaches. Threat Actor ... Daily Dark Web© 2024. No Result. View All Result. Contact · Home ...

Jason Haddix Joins Flare as Field CISO - Newswire

$
0
0
With its advanced technology, Flare offers a proactive approach to cybersecurity, scanning the online world, including the clear and dark web, to ...

Tor: From the Dark Web to the Future of Privacy | Hacker News

$
0
0
Tor: From the Dark Web to the Future of Privacy (direct.mit.edu). 67 points by bauruine 13 hours ago | hide | past | favorite | 30 comments ...

DOJ Arrests Founders of Crypto Mixer Samourai for $2 Billion in Illegal Transactions

$
0
0
Samourai conducted spear-phishing campaigns as well as laundered money from dark-web illegal sites. The spear-phishing campaigns targeted several ...

NIMC risks penalties as NDPC investigates breach that exposed NIN of 100 million people

$
0
0
... dark web. While NIMC often denies these incidents, several reports have alleged worrying vulnerabilities at the agency. “Whoever is responsible ...

ALIEN LABS Brands - Shop Cannabis Products | Pineapple Ex...

$
0
0
Topicals. Sort. Filter (1). ALIEN LABS. Sort. Filter. DARK WEB - 3.5G. Hybrid. ALIEN LABSDARK WEB - 3.5G1/8 oz. THC: 32.73%. $60. SPACE FACE LR ...

KnowBe4 Set to Acquire Egress - SC Media UK

$
0
0
NHS Scotland Patient Data Found on Dark Web· Interview ...

Security Council ISIL (Da'esh) and Al-Qaida Sanctions Committee Amends One Entry on Its ...

$
0
0
... Islamic State of Iraq and the Levant - Khorasan (ISIL - K) (QDe.161). Information Technology Expert. Father's name: Abdul Jabbar. Grandfather's ...

Volkswagen hit by cyberattack originating in China, threatening global EV industry - teiss

$
0
0
Volkswagen, a prominent automotive manufacturer, has been targeted in a sophisticated cyberattack originating from China, raising concerns about ...

Protonmail lanciert Dark Web Monitoring | Netzwoche

$
0
0
Protonmail bietet ein Dark Web Monitoring gegen Zugangsdaten-Lecks für Kunden mit einem kostenpflichtigen Proton-Pl.

The Candyman | The Dark Web 4/4 | True Story Documentary Channel - YouTube

$
0
0
The Candyman | The Dark Web 4/4 | True Story Documentary Channel.

Chinese Keyboard Apps Open 1B People to Eavesdropping - Dark Reading

$
0
0
Eight out of nine apps that people use to input Chinese characters into mobile devices have security vulnerabilities that allow a passive ...

Dark Web Monitoring: What It Is and Why It's Important - Nuspire

$
0
0
Often a hotbed for cybercrime, various forums and marketplaces on the dark web offer privacy for threat actors and budding cybercriminals looking to ...

Samourai Wallet Founders Keonne Rodriguez and William Hill Could Get 25 Year Sentence ...

$
0
0
They are also accused of laundering over $100 million from dark web markets. The pair are now facing a maximum sentence of 25 years each. However ...

AG Ellison, 22 attorney generals direct UnitedHealth Group to take action in ransomware attack

$
0
0
At the time of the breach, it was unknown if stolen data had made its way to the dark web. However, this week officials indicated that 22 screenshots ...

Pakistanis Trapped in Cambodia's China-Run Cyber Slave Ring Targeting US - Reddit

$
0
0
Even Chinese citizens have been trapped by this. It's an ever growing global human trafficking issue. Pakistan, India, China, Nepal, etc. all have ...

Lidar: Another emerging technology brought to you by China - Defense News

$
0
0
The exponential growth in connected and automated systems has increased the demand for the sensor technology necessary to make them operate safely ...

Eagle Forum speaks to nation's largest Turning Point USA chapter at Gulf Shores High School

$
0
0
It can now be ordered online on the dark web and sent directly to your home. Don't do that!" Chapter sponsor Austin Boyd said the school has 102 ...

Europol swoops on antique book thieves in Georgia and Latvia - Ghana News Agency

$
0
0
Europol:International dark web drugs marketplace shut down. Amsterdam, May 2, (dpa/GNA) – Police in nine countries on both sides of the Atlantic ...

The Xi files: how China spies | The Spectator

$
0
0
Most states spy. In principle there's nothing to stop them. But China's demand for intelligence on the rest of the world goes far beyond anything ...

Israeli strikes on Rafah kill 18, mostly children, as US advances aid package - ABC NewsGoogle Alert - "abort!" OR "abort " OR allah OR brother OR jihad +("plan" OR jihad OR "repeat" OR "allah" OR "trust" OR brother)

$
0
0
Israeli strikes on Rafah kill 18, mostly children, as US advances aid package ... Those killed include three militants from the Islamic Jihad group and ...

Any tips on blocking dark web from teen son? : r/nordvpn - Reddit

$
0
0
Caught my son on dark web. Trying to think of all ways to block him with new nord vpn. Maybe some specific websites? Thanks for any advice.

State Spies Exploited Cisco Zero-Days to Intrude Government Networks

$
0
0
... Dark Web. Next article Ransomware Group BlackBasta Targets TRUE Solicitors ... BSNL Leaked Data Resurfaces with 2.9 Million Records Exposed on Dark Web.

One Kitsune gets hunted by a deep web cult (not helldivers) - amphion_vt on Twitch

$
0
0
Just one second... · One Kitsune gets hunted by a deep web cult (not helldivers) · One Kitsune devours the world (not helldivers) · One kitsune decides ...

Almost a billion users' keystrokes possibly leaked by Chinese keyboard apps | SC Media

$
0
0
Input method editor Tencent QQ Pinyin could be impacted by a CBC padding oracle attack facilitating plaintext recovery, while Baidu IME and iFlytek ...

- Dark Web #1 - ComicHub::Stores

$
0
0
Dark Web #1. USD $4.99. DUSK! The two most famous clones ever are back to take what's theirs. Ben Reilly and Madelyne Pryor have had enough and ...

Keeper - Dark web scans can help you identify whether your... - Facebook

$
0
0
Dark web scans can help you identify whether your private information has ended up on the dark web. Curious to learn more about dark web scans ...

Dark web : r/InternetPH - Reddit

$
0
0
Dark web. Any trusted dark web sites with prepaided card? Upvote 0. Downvote 0 ...
Browsing latest articles
View live




Latest Images

Vimeo 10.7.0 by Vimeo.com, Inc.

Vimeo 10.7.0 by Vimeo.com, Inc.

HANGAD

HANGAD

MAKAKAALAM

MAKAKAALAM

Doodle Jump 3.11.30 by Lima Sky LLC

Doodle Jump 3.11.30 by Lima Sky LLC