While the threat of militarized terrorism is important to monitor (i.e. lone wolves and sleeper cells), the larger threats to… Read more Asynchronous Warfare part 3: How Conventional Strategies and Tactics Are Applied to Cyberwarfare
Month: April 2019
Court Filings for Mark Steven Domingo – Foiled L.A. Terror Plot
The FBI Monday said the agency had foiled a domestic terror plot by an American military veteran, who was aiming… Read more Court Filings for Mark Steven Domingo – Foiled L.A. Terror Plot
Hacker Finds He Can Remotely Kill Car Engines After Breaking Into GPS Tracking Apps
By reverse engineering ProTrack and iTrack’s Android apps, L&M said he realized that all customers are given a default password… Read more Hacker Finds He Can Remotely Kill Car Engines After Breaking Into GPS Tracking Apps
FINTEAM: Trojanized TeamViewer Against Government Targets – Check Point Research
Introduction Recently, Check Point researchers spotted a targeted attack against officials within government finance authorities and representatives in several embassies… Read more FINTEAM: Trojanized TeamViewer Against Government Targets – Check Point Research
FBI’s Crime Complaint Center (IC3) 2018 Internet Crime Report
The 2018 Internet Crime Report emphasizes the IC3’s efforts in monitoring trending scams such as Business Email Compromise (BEC), Extortion,… Read more FBI’s Crime Complaint Center (IC3) 2018 Internet Crime Report
Analyzing lone-actor terrorism in context
This article is published courtesy of the Center for Research and Evidence on Security Threats (CREST) Assessing and managing the risk of lone-actor terrorism… Read more Analyzing lone-actor terrorism in context
Gmail first to follow new SMTP standards
SMTP TLS ReportingA number of protocols exist for establishing encrypted channels between SMTP Mail Transfer Agents (MTAs), including STARTTLS, DNS-Based… Read more Gmail first to follow new SMTP standards
Caliphate Cyber Shield Warns ISIS Supporters to Stay Away from Ghost Security Group™
Six months ago the Islamic State propaganda wing Al-Hayat Media Center warned it’s followers about mass infiltration of Ghost Security… Read more Caliphate Cyber Shield Warns ISIS Supporters to Stay Away from Ghost Security Group™
Dragonblood: Analysing Vulnerabilities in WPA3’s Dragonfly Handshake
“Currently, all modern Wi-Fi networks use WPA2 to protect transmitted data. However, because WPA2 is more than 14 years old,… Read more Dragonblood: Analysing Vulnerabilities in WPA3’s Dragonfly Handshake
Wave of orchestrated ISIS terrorist retaliation attacks around the globe: overview and assessment – The Meir Amit Intelligence and Terrorism Information Center
During four days, between April 8 and 11, 2019, the various ISIS provinces in Syria, Iraq and around the globe… Read more Wave of orchestrated ISIS terrorist retaliation attacks around the globe: overview and assessment – The Meir Amit Intelligence and Terrorism Information Center
You must be logged in to post a comment.