Please RT for reach: I’m trying to #FOIA records on computer intrusions into DOD systems during first Gulf War (1990), I have a GAO report which gives a high level summary but am looking for more.
Does anyone know what DOD department might have investigated #hacking back then?
Hacked: The Secrets Behind Cyber Attacks by Jessica Barker, 2024
In this book, cybersecurity expert Jessica Barker uncovers how hackers are weaponizing cutting-edge tactics and technologies to target individuals and organizations, before showing how you can safeguard yourself against any potential attacks and how to react if you do become a target.
Do I have any followers who know a little bit of Chinese? I am curious if the characters give any hint about this mystery PCB or its little IC on the other side. It uses inductive(?) and or capacitive touch sensing of three buttons and controls RGBW brightness.
Windows vulnerability reported by the NSA exploited to install Russian malware
Kremlin-backed hackers have been exploiting a critical Microsoft vulnerability for four years in attacks that targeted a vast array of organizations with a previously undocumented tool, the software maker disclosed
North Korean hackers crack DMARC to spoof emails from trusted sources
North Korean state-sponsored threat actors are abusing misconfigurations in DMARC to send convincing phishing emails and gather vital intelligence from Western targets~impersonating journalists, officials have warned.
Ascension healthcare takes systems offline after cyberattack
Ascension, one of the largest private healthcare systems in the United States, has taken some of its systems offline to investigate what it describes as a "cyber security event."
Just submitted a #FOIA to the #FBI to try and see if they did have any investigation into potential retaliation for the sentencing of the "Atlanta 3" hackers who were linked to Legion of Doom. #hacking#hackers#history
Hackbat: This Raspberry Pi hacking tool is what the Flipper One could have been
The whole thing runs off of a Raspberry Pi RP2040 and open-source code. It has modules for NFC, SD card, and Wi-Fi communication, plus it features a miniature display so you can tell what it’s doing. If you want to make your own, the Hackster page f ...continues
Tut man nicht den anderen die Schuld zuweisen um selber nicht schuldig angesehen zu werden und auch sich selbst, anhand gegenüber dem Gegenangriffe, zu rechtfertigen? Dies ist mMn sogar min Europa weit so (ähnlich).
»Kommentar zur Debatte über IT-Sicherheit – "Die Empörten sind nackt":
Deutschlands Politik beschwert sich über russische Hacker. Zurecht – aber handeln müsste sie selbst. […]«
– von @fsteiner auf @heiseonline