Six months ago the Islamic State propaganda wing Al-Hayat Media Center warned it’s followers about mass infiltration of Ghost Security… Read more Caliphate Cyber Shield Warns ISIS Supporters to Stay Away from Ghost Security Group™
Author: Ghost Security Group™
Dragonblood: Analysing Vulnerabilities in WPA3’s Dragonfly Handshake
“Currently, all modern Wi-Fi networks use WPA2 to protect transmitted data. However, because WPA2 is more than 14 years old,… Read more Dragonblood: Analysing Vulnerabilities in WPA3’s Dragonfly Handshake
Wave of orchestrated ISIS terrorist retaliation attacks around the globe: overview and assessment – The Meir Amit Intelligence and Terrorism Information Center
During four days, between April 8 and 11, 2019, the various ISIS provinces in Syria, Iraq and around the globe… Read more Wave of orchestrated ISIS terrorist retaliation attacks around the globe: overview and assessment – The Meir Amit Intelligence and Terrorism Information Center
NSA publicly releases their GHIDRA software reverse-engineering tool on GitHub
The National Security Agency has posted the latest release with complete source code of the GHIDRA software reverse engineering tool… Read more NSA publicly releases their GHIDRA software reverse-engineering tool on GitHub
Bots and botnets in 2018 | Securelist
Statistics on botnet attacks on clients of organizations Due to the wide media coverage of incidents involving Mirai and other… Read more Bots and botnets in 2018 | Securelist
UNSC adopts landmark anti-terror financing resolution [ UNSCR 2462 ]
(MENAFN – Kuwait News Agency (KUNA)) NEW YORK, March 28 (KUNA) — The UN Security Council unanimously adopted on Thursday… Read more UNSC adopts landmark anti-terror financing resolution [ UNSCR 2462 ]
New research reveals that the bloatware preinstalled on many new Android phones is invasive and largely unchecked.
The process of how a particular set of apps end up packaged together in the firmware of a device is not transparent, and various isolated cases reported over the last few years suggest that it lacks end-to-end control mechanisms to guarantee that shipped firmware is free from vulnerabilities or potentially malicious and unwanted apps.
Nearly Half of ICS Devices Protected by Kaspersky Targeted in 2018
Nearly half of the industrial control system (ICS) computers protected by Kaspersky Lab were targeted by malware and other threats… Read more Nearly Half of ICS Devices Protected by Kaspersky Targeted in 2018
Donald Trump orders EMP protection
President Trump has ordered federal government agencies to harden the nation’s infrastructure against potentially devastating attacks by a nuclear-bomb-produced electromagnetic… Read more Donald Trump orders EMP protection
Ex-NSA man to plead guilty in historic data-theft case – Canindia News
Prosecutors described him as a hoarder who took home a whopping 50 terabytes of files, including a number of classified… Read more Ex-NSA man to plead guilty in historic data-theft case – Canindia News
You must be logged in to post a comment.