CIA covert intelligence system led to mass arrests of agents

40 minutes ago · 0 comments
post-image

The United States strengthens nuclear weapons systems

48 minutes ago · 0 comments
post-image

Royal extortion attacks: Royal group attacks and demands big money for data decryption

57 minutes ago · 0 comments
post-image
article-image40 minutes ago

CIA covert intelligence system led to mass arrests of agents

article-image48 minutes ago

The United States strengthens nuclear weapons systems

article-image57 minutes ago

Royal extortion attacks: Royal group attacks and demands big money for data decryption

Blog Feed

Popular

Latest

Recent

    • Dangerous combinations of drugs: what you should not consume?

      1. MDMA and DXMMDMA ("Ecstasy") inhibits the body's ability to thermoregulate, often leading to overheating and heat stroke. DXM (dextramethorphan) inhibits the work of the sweat glands and in combination with ecstasy can cause hyperthermia, up to 40-42 degrees. Close to the grave.In addition, MDMA and DXM are both metabolized in the liver by the same enzyme. When both drugs enter the body, the liver can't do its job and can become seriously ill.How to avoid danger? Do not take ecstasy if you have previously taken an antitussive containing dextramethorphan. Do not drink pills bought...

      post-image
    • The researchers described the successor to the Trojan Agent Tesla

      Palo Alto Networks Unit 42 specialists described the inner workings of a malware called OriginLogger, which is positioned as the successor to the RAT "Agent Tesla" infostealer and remote access trojan.In 2021, the information security company Sophos revealed 2 versions of Agent Tesla (versions 2 and 3), which had the ability to steal credentials from web browsers, email applications and VPN clients, and also used the Telegram API as a command and control server (C&C).According to Unit 42 researcher Jeff White, Agent Tesla version 3 is actually an OriginLogger. The starting point of Unit 42's...

      post-image
    • Fake Zoom Sites Spread Vidar Malware

      The malware steals data from Zoom users.Cyble Research and Intelligence Labs (CRIL) researchers have uncovered many fake Zoom sites designed to distribute malware. Sites copy the interface of the original and disguise malware as a legitimate application.After analyzing the malware, experts found out that it was Vidar Stealer, a malware associated with the Arkei infostealer.Vidar targets:Bank data;Saved passwords;IP addresses;Browser history;Login credentials;Crypto wallets.Here is a list of fake Zoom sites to avoid:zoom-download[.]hostzoom-download[.]spacezoom-download[.]funzoomus[.]hostzoomus[.]techzoomus[.]websiteThe infection chain looks like this:Fake sites redirect users to GitHub (https[:]//github[.]com/sgrfbnfhgrhthr/csdvmghfmgfd/raw/main/Zoom.zip) and offer to download malware. After unpacking, two files appear on the victim's...

      post-image
    • 17-year-old hacker linked to GTA 6 leak arrested in UK

      The British police managed to figure out a young man involved in the largest information leak.Law enforcement agencies in the UK said that a 17-year-old hacker, whose name was not disclosed, was detained in Oxfordshire.According to preliminary data, the detained teenager is associated with the LAPSU$ cyber group that attacked Microsoft, Nvidia and Samsung.The National Crime Agency, which specializes in cybercrime, is currently investigating.

      post-image
    • CIA covert intelligence system led to mass arrests of agents

      For 10 years, the CIA has been communicating with informants abroad using a network of websites with hidden communication features.According to a Reuters report, CIA informants used covert features on seemingly ordinary websites to surreptitiously relay information to US agents. However, 885 fake websites were so badly designed that they exposed all CIA informants. According to Reuters, Iranian engineer and Iranian intelligence spy Gholamreza Hosseini was exposed and arrested due to CIA negligence.The CIA-run network consisted of 885 sites, localized in at least 29 languages ​​and intended for viewing in at least 36 countries. The...

      post-image
    • The United States strengthens nuclear weapons systems

      The U.S. Accounts Chamber said that the IT systems of U.S. nuclear weapons could become targets of cyberattacks.According to a new report, the National Nuclear Security Administration (NNSA) and its contractors have increased their use of advanced computers and digital systems to:integration of information systems into nuclear weapons;automation of production equipment;computer simulation in the development of weapons.Therefore, NNSA needs to implement cybersecurity risk management as these systems can become targets of cyberattacks.The United States Accounts Office (GAO) report notes that federal law and policy defines 6 methods for a cybersecurity management program:assign cybersecurity roles and...

      post-image
    • Royal extortion attacks: Royal group attacks and demands big money for data decryption

      The ransom amount starts from $250,000 and goes up to $2 million.The previously silent and inconspicuous grouping Royal emerged from the shadows, actively attacking the victims. Attackers use a callback phishing attack: they send emails to users in which they pretend to be representatives of food or subscription software suppliers and invite the victim to call the phone number specified in the email.If the victim follows the email and calls the specified number, the hackers use social engineering techniques to convince them to download software that will give them remote access to the victim's desktop,...

      post-image
    • Anonymous declares cyberwar on Iran over protests

      On September 21, Anonymous hackers launched the OpIran (Operation Iran) campaign against Iran due to ongoing protests in the country. During the protests in the country, several times there were disruptions to the Internet and the complete shutdown of the mobile network.Anonymous has declared war on the Iranian government and launched cyberattacks on government websites, including those of the Iranian intelligence and police. At the moment, the sites of departments are already closed.“Dear Iranian government! You turned off the Internet - we will turn you off! - wrote hackers on Twitter, referring to the government.The...

      post-image
    • CIA covert intelligence system led to mass arrests of agents

      For 10 years, the CIA has been communicating with informants abroad using a network of websites with hidden communication features.According to a Reuters report, CIA informants used covert features on seemingly ordinary websites to surreptitiously relay information to US agents. However, 885 fake websites were so badly designed that they exposed all CIA informants. According to Reuters, Iranian engineer and Iranian intelligence spy Gholamreza Hosseini was exposed and arrested due to CIA negligence.The CIA-run network consisted of 885 sites, localized in at least 29 languages ​​and intended for viewing in at least 36 countries. The...

      post-image
    • The United States strengthens nuclear weapons systems

      The U.S. Accounts Chamber said that the IT systems of U.S. nuclear weapons could become targets of cyberattacks.According to a new report, the National Nuclear Security Administration (NNSA) and its contractors have increased their use of advanced computers and digital systems to:integration of information systems into nuclear weapons;automation of production equipment;computer simulation in the development of weapons.Therefore, NNSA needs to implement cybersecurity risk management as these systems can become targets of cyberattacks.The United States Accounts Office (GAO) report notes that federal law and policy defines 6 methods for a cybersecurity management program:assign cybersecurity roles and...

      post-image
    • Royal extortion attacks: Royal group attacks and demands big money for data decryption

      The ransom amount starts from $250,000 and goes up to $2 million.The previously silent and inconspicuous grouping Royal emerged from the shadows, actively attacking the victims. Attackers use a callback phishing attack: they send emails to users in which they pretend to be representatives of food or subscription software suppliers and invite the victim to call the phone number specified in the email.If the victim follows the email and calls the specified number, the hackers use social engineering techniques to convince them to download software that will give them remote access to the victim's desktop,...

      post-image
    • Anonymous declares cyberwar on Iran over protests

      On September 21, Anonymous hackers launched the OpIran (Operation Iran) campaign against Iran due to ongoing protests in the country. During the protests in the country, several times there were disruptions to the Internet and the complete shutdown of the mobile network.Anonymous has declared war on the Iranian government and launched cyberattacks on government websites, including those of the Iranian intelligence and police. At the moment, the sites of departments are already closed.“Dear Iranian government! You turned off the Internet - we will turn you off! - wrote hackers on Twitter, referring to the government.The...

      post-image
Read all posts

Friday, 30 September

Comments Feed