Cyberattack Targets Israeli Organizations, Displays Pro-Palestinian Message
ESET reported a cyberattack targeting Israeli organizations, replacing desktop backgrounds with a pro-Palestinian message and corrupting files; the attackers are using RDP and geolocation verification, potentially linking it to the Handala hacking group.
Cyberattack Targets Israeli Organizations, Displays Pro-Palestinian Message
ESET reported a cyberattack targeting Israeli organizations, replacing desktop backgrounds with a pro-Palestinian message and corrupting files; the attackers are using RDP and geolocation verification, potentially linking it to the Handala hacking group.
Progress
40% Bias Score
US Sanctions Chinese Entities for Cyberattacks Targeting Top Officials
The Biden administration imposed sanctions on a Chinese tech firm and an individual for allegedly orchestrating cyberattacks that targeted US telecommunication companies and the Treasury Department, compromising sensitive information belonging to senior US officials, including President-elect Trump ...
US Sanctions Chinese Entities for Cyberattacks Targeting Top Officials
The Biden administration imposed sanctions on a Chinese tech firm and an individual for allegedly orchestrating cyberattacks that targeted US telecommunication companies and the Treasury Department, compromising sensitive information belonging to senior US officials, including President-elect Trump ...
Progress
40% Bias Score
EU 5G Networks: Persistent Chinese Presence Despite Security Strategy
Despite a 2019 EU strategy to limit high-risk 5G vendors, 34% of EU radio access networks remained Chinese by late 2024, with variation among member states; Italy's share dropped to 35% due to Golden Power measures, while Germany's remained at 59%.
EU 5G Networks: Persistent Chinese Presence Despite Security Strategy
Despite a 2019 EU strategy to limit high-risk 5G vendors, 34% of EU radio access networks remained Chinese by late 2024, with variation among member states; Italy's share dropped to 35% due to Golden Power measures, while Germany's remained at 59%.
Progress
52% Bias Score
German Security Agency Warns Against Solar Power Grid Plan Due to Cybersecurity Risks
Germany's plan to use internet-capable Chinese-made inverters in solar power plants to stabilize the grid faces strong opposition from the BSI due to significant security risks, as these inverters could be remotely controlled by the manufacturers or hackers, potentially impacting the entire European...
German Security Agency Warns Against Solar Power Grid Plan Due to Cybersecurity Risks
Germany's plan to use internet-capable Chinese-made inverters in solar power plants to stabilize the grid faces strong opposition from the BSI due to significant security risks, as these inverters could be remotely controlled by the manufacturers or hackers, potentially impacting the entire European...
Progress
44% Bias Score
Cryptojacking Scam Targets Job Seekers
Job seekers are targeted in a new phishing scam using emails that appear to be from recruiters; clicking a link downloads a malicious application that secretly mines cryptocurrency, slowing down the victim's computer.
Cryptojacking Scam Targets Job Seekers
Job seekers are targeted in a new phishing scam using emails that appear to be from recruiters; clicking a link downloads a malicious application that secretly mines cryptocurrency, slowing down the victim's computer.
Progress
40% Bias Score
Star Blizzard Uses WhatsApp QR Code Phishing to Target Government Officials
Russian state-linked hackers, Star Blizzard, used phishing emails with QR codes to target WhatsApp accounts of government officials worldwide, aiming to undermine trust in politics and exfiltrate data.
Star Blizzard Uses WhatsApp QR Code Phishing to Target Government Officials
Russian state-linked hackers, Star Blizzard, used phishing emails with QR codes to target WhatsApp accounts of government officials worldwide, aiming to undermine trust in politics and exfiltrate data.
Progress
12% Bias Score
Hidden Malware in Emails Bypasses Security: 29,000 Victims
New malware campaigns, VIP Keylogger and 0bj3ctivityStealer, hide malicious code in email images, bypassing security; one image was viewed 29,000 times, resulting in credential and financial data theft.
Hidden Malware in Emails Bypasses Security: 29,000 Victims
New malware campaigns, VIP Keylogger and 0bj3ctivityStealer, hide malicious code in email images, bypassing security; one image was viewed 29,000 times, resulting in credential and financial data theft.
Progress
32% Bias Score
California Wildfires Fuel Surge in Phishing Scams
Following the California wildfires, Veriti discovered numerous phishing websites mimicking fire-relief organizations within 72 hours, exploiting the disaster for fraudulent financial gain and personal information theft; a separate GoFundMe scam used a victim's Ring video of their burning home to dec...
California Wildfires Fuel Surge in Phishing Scams
Following the California wildfires, Veriti discovered numerous phishing websites mimicking fire-relief organizations within 72 hours, exploiting the disaster for fraudulent financial gain and personal information theft; a separate GoFundMe scam used a victim's Ring video of their burning home to dec...
Progress
36% Bias Score
Noem's CISA Restructuring: A Return to Technical Focus Amidst Hybrid Threat Concerns
Kristi Noem's confirmation as CISA director signals a return to core technical cybersecurity, eliminating involvement in disinformation and election interference; however, this contradicts a recent executive order expanding CISA's mission, potentially leaving gaps in national security.
Noem's CISA Restructuring: A Return to Technical Focus Amidst Hybrid Threat Concerns
Kristi Noem's confirmation as CISA director signals a return to core technical cybersecurity, eliminating involvement in disinformation and election interference; however, this contradicts a recent executive order expanding CISA's mission, potentially leaving gaps in national security.
Progress
40% Bias Score
Suspected Chinese Ship Damages Taiwan-US Undersea Cable
Taiwanese authorities suspect a Chinese-crewed, Cameroonian-flagged ship, the Shunxing-39, of damaging an undersea cable connecting Taiwan to the US on January 4th, 2024, near Keelung harbor; high seas prevented its apprehension, and the vessel escaped to South Korea.
Suspected Chinese Ship Damages Taiwan-US Undersea Cable
Taiwanese authorities suspect a Chinese-crewed, Cameroonian-flagged ship, the Shunxing-39, of damaging an undersea cable connecting Taiwan to the US on January 4th, 2024, near Keelung harbor; high seas prevented its apprehension, and the vessel escaped to South Korea.
Progress
52% Bias Score
The Hacker's Night": A Novel on Technology and Authoritarian Regimes
Yishaï Sarid's "The Hacker's Night" follows Ziv, a traumatized Israeli hacker, as he unknowingly aids authoritarian regimes through his work for a cybersecurity firm, revealing the ethical complexities of technological advancements and their use in political oppression.
The Hacker's Night": A Novel on Technology and Authoritarian Regimes
Yishaï Sarid's "The Hacker's Night" follows Ziv, a traumatized Israeli hacker, as he unknowingly aids authoritarian regimes through his work for a cybersecurity firm, revealing the ethical complexities of technological advancements and their use in political oppression.
Progress
48% Bias Score
Netherlands Imposes Mandatory Security Screenings on Sensitive Technology Researchers
The Netherlands will conduct mandatory security screenings for all master's students and researchers in sensitive technology studies to counter espionage and theft of vital information by foreign powers, impacting thousands of students across Europe, following warnings of such activities from securi...
Netherlands Imposes Mandatory Security Screenings on Sensitive Technology Researchers
The Netherlands will conduct mandatory security screenings for all master's students and researchers in sensitive technology studies to counter espionage and theft of vital information by foreign powers, impacting thousands of students across Europe, following warnings of such activities from securi...
Progress
60% Bias Score