Click any tag below to further narrow down your results
Links
This article reviews significant policy changes under the Trump administration that undermine cybersecurity, free speech, and anti-corruption efforts. It highlights actions targeting dissent, relaxing regulation on cryptocurrency, and increasing surveillance on American citizens and foreign visitors. The piece also discusses the implications of these moves for national security and civil liberties.
Protei, a Russian telecom company specializing in surveillance technology, was hacked, resulting in data theft and website defacement. The breach exposed around 182 gigabytes of files, including sensitive emails, and was linked to the company's involvement with deep packet inspection systems used for censorship. The hacker's identity remains unknown.
Over 40,000 security cameras worldwide are accessible via the internet, allowing potential hackers to exploit them for spying and other malicious activities. The cybersecurity firm Bitsight warns that these cameras, often used in homes and small offices, are at risk due to inadequate security measures, making them targets for cyberattacks. Users are advised to implement stronger security practices to protect their devices.
The Sinaloa drug cartel hired a cybercriminal to track and kill FBI informants, leveraging compromised devices and access to critical infrastructure. An audit revealed significant surveillance vulnerabilities in the FBI's operations, prompting concerns about the agency's response to these threats and the need for improved management and training against technological surveillance.
Team82 has revealed four vulnerabilities in Axis Communications' video surveillance products, which could allow attackers to execute remote code on both the Axis Device Manager and Axis Camera Station. The exploit chain targets the proprietary Axis.Remoting protocol, potentially exposing thousands of organizations to significant security risks. Axis Communications has responded promptly with patches to address these vulnerabilities.