Automated Threat Recognition Algorithm With Machine Learning Capability

Automated Threat Recognition Algorithm With Machine Learning Capability

Neutral Explosives Detection Algorithm in Development In order to upgrade and improve airport security systems, the U.S. government and airport security experts are working to develop vendor-neutral software for explosives detection in baggage-screening systems at airports and other ports of entry. The idea is to develop explosives detection algorithms able to run on a variety…

Report: North Korea-Sponsored Lazarus Hacks Comprise 65 Percent = $571 Million of Total Crypto Stolen Since Early 2017

Report: North Korea-Sponsored Lazarus Hacks Comprise 65 Percent = $571 Million of Total Crypto Stolen Since Early 2017

Hacker group “Lazarus,” reportedly funded by North Korea, has stolen a staggering $571 million in cryptocurrencies since early 2017, a study conducted by cybercrime company Group-IB reveals. Key takeaways from the study were published Tuesday, Oct. 16, alongside the full annual report, entitled “Hi-Tech Crime Trends.” The report, dedicated to hacks in 2017 and 2018,…

The Answer To Battlefield Logistics Problems Could Be IoT – Secured By Blockchain For Network Integrity

The Answer To Battlefield Logistics Problems Could Be IoT – Secured By Blockchain For Network Integrity

Soldiers assigned to 101st Sustainment Brigade “Lifeliners,” 101st Airborne Division, assist in response and recovery missions, Sept. 19 at Burgaw, North Carolina. Fort Campbell Soldiers are deployed to N.C. this week to support U.S. Department of Defense (DoD) efforts in assisting Federal Emergency Management Agency (FEMA) and other agencies as requested during the Army response…

ExoWarfare Talks at USSOCOM / SOFWERX on 04 DEC 2018

ExoWarfare Talks at USSOCOM / SOFWERX on 04 DEC 2018

Radical Speaker Series: Countering Weaponized Information 4 December 2018 Request to Attend Deadline: 23 November    On 4 December, SOFWERX, in collaboration with USSOCOM/J5 Donovan Group, will host a Radical Speaker Series covering weaponized information. Mass influence operations, deep fakes, and social media metrics have been used by state and non-state actors in attempts to influence everything…

Take a VideoTour of Facebook’s 20-Person US Election Security War Room

Take a VideoTour of Facebook’s 20-Person US Election Security War Room

Beneath an American flag, 20 people packed tight into a beige conference room are Facebook’s, and so too the Internet’s, first line of defense for democracy. This is Facebook’s election security war room. Screens visualize influxes of foreign political content and voter suppression attempts as high-ranking team members from across divisions at Facebook, Instagram, and…

How Hacked Water Heaters Could Trigger Mass Blackouts

How Hacked Water Heaters Could Trigger Mass Blackouts

A new study found that just 42,000 of those hacked home devices could be enough to leave a country of 38 million people in the dark.   When the cybersecurity industry warns about the nightmare of hackers causing blackouts, the scenario they describe typically entails an elite team of hackers breaking into the inner sanctum…

Pentagon Hacked Again: Cyber Breach of Travel Records

Pentagon Hacked Again: Cyber Breach of Travel Records

The Pentagon on Friday said there has been a cyber breach of Defense Department travel records that compromised the personal information and credit card data of U.S. military and civilian personnel. According to a U.S. official familiar with the matter, the breach could have affected as many as 30,000 workers, but that number may grow…

Over Nine Million Cameras And DVRs Open To APTs, Botnet Herders, And Voyeurs

Over Nine Million Cameras And DVRs Open To APTs, Botnet Herders, And Voyeurs

Conceptual diagram of a PDoS attack: 1) Attack sponsor hires botnet herder. 2) Botnet herder uses server to manage recruitment. 3) Malware scans for vulnerable IoT devices and begins cascading infection. 4) Botnet herder uses devices (e.g., HVAC controllers) to deplete bandwidth of a cyber-physical service (e.g., electrical power).  APT: Advanced Persistent Threats (advanced hacking,…

AI Camera Can Spot Guns And Alert Law Enforcement: 99% Accurate

AI Camera Can Spot Guns And Alert Law Enforcement: 99% Accurate

The company says it’s accurate 99 percent of the time.   Athena Security has developed a camera system that uses artificial intelligence and cloud technology to spot guns and alert authorities. The company says that because the system can recognize weapons and notify police quickly, casualties may be prevented in places where the system is…

US DoJ Charges 7 Russian Intelligence Officers With Crypto-Funded Hacking Attacks

US DoJ Charges 7 Russian Intelligence Officers With Crypto-Funded Hacking Attacks

Using the same IP for Bitcoin mining and transactions AND as an identifiable source of hacks DOES frequently allow to point the finger at the correct individuals (and their employers, obviously). The U.S. Department of Justice (DoJ) has charged seven officers from Russia’s Main Intelligence Directorate (GRU) with cryptocurrency-funded global hacking and related disinformation operations.…

Thomas Melle in München: Die Mensch-Maschine

Thomas Melle in München: Die Mensch-Maschine

(Theater)   Wir dachten schon, wir wüssten alles von und über Thomas Melle. Wie kaum einer hat der deutsche Schriftsteller sein mehrschichtiges Innenleben und seine bipolare Störung offengelegt, hat bis ins peinlichste Detail hinein von seinem manisch-depressiven Leiden vor sich selber schaudernd erzählt. Vor Augen haben wir noch seine eindringlich beschriebene “lasche Körperhaltung, die hängenden…

[UPDATED] China Snuck A Tiny Microchip Inside US Top Secret Servers Used By The DoD And CIA — NSA Struggles To Assess Risk

[UPDATED] China Snuck A Tiny Microchip Inside US Top Secret Servers Used By The DoD And CIA — NSA Struggles To Assess Risk

[UPDATED SEVERAL TIMES FROM DIFFERENT SOURCES – SCROLL DOWN You find all relevant reporting on the matter on this page; including the implant built into the server’s Ethernet connector at a US Telecom company.]   The Chinese military surreptitiously inserted tiny microchips no larger than single grains of rice into servers on local assembly lines in order to…

Israel Securities Authority Turns to Blockchain for Improving Cybersecurity

Israel Securities Authority Turns to Blockchain for Improving Cybersecurity

Israel’s national securities regulator is now using blockchain to improve data integrity for its messaging system, online voting, and critical reports storage.   The Israel Securities Authority (ISA) has started to use blockchain to improve the cybersecurity of its messaging system, online newspaper Times of Israel reports today, October 3. The government regulator has reportedly…

Telegram Leaks User IP Addresses

Telegram Leaks User IP Addresses

Huge impact in the Blockchain space, where Telegram is so popular: recon made easy. Having the IP allows for much easier wallet- and crypto-jacking hacks / attacks (also sad: with a $2 billion ICO, this is the best quality they can offer?).   A vulnerability in Telegram Desktop results in the end-user public and private…