Stolen U.S. drone documents found for sale on dark web

Sensitive U.S. military drone blueprints and training documents were recently posted for sale on the dark web, according to Boston-based data analytics and intelligence firm Recorded Future. Analysts with Recorded Future say the stolen drone documents appear to be legitimate, having come from an airman who is currently stationed at a Nevada-based U.S. Air Force facility. The information was apparently breached through a known, outdated router vulnerability that affects a product made by computer networking company NetGear. The stolen documents include the names of active Air Force personnel in addition to other technical information, Recorded Future said. Leaks containing such information — about people involved in a specific military unit — would typically be considered a counterintelligence threat. The drone blueprints provided unclassified yet sensitive information about the MQ-9 Reaper, a drone that is currently used for both surveillance and armed combat operations by the U.S. and its allies. The MQ-9 was originally developed by defense […]

The post Stolen U.S. drone documents found for sale on dark web appeared first on Cyberscoop.

Continue reading Stolen U.S. drone documents found for sale on dark web

Raytheon hires Air Force CISO Peter Kim

The U.S. Air Force’s recently departed Chief Information Security Officer Peter Kim joined the military contracting giant Raytheon as its director of IT security and governance at the company’s subsidiary Raytheon Missile Systems, CyberScoop has learned. Kim left the Air Force on June 1 and joined Raytheon later in the month. Wanda Jones-Heath, formerly the deputy CISO, took over the role. As the name implies, Raytheon Missile Systems develops and produces missile systems for the U.S. military and its allies. Kim will be responsible for protecting information as well as handling incident response and cyber risk while establishing standards across Raytheon’s missile business. Kim spent the last decade working in cybersecurity at the Pentagon. After four years in communications and IT across Europe and Hawaii for the military, in 2006 Kim took over as the commander of the 92nd Information Operations Squadron, the Air Force’s primary blue team. He worked with […]

The post Raytheon hires Air Force CISO Peter Kim appeared first on Cyberscoop.

Continue reading Raytheon hires Air Force CISO Peter Kim

The U.S. Air Force is outsourcing all traditional IT in order to build cybersecurity mission teams

The U.S. Air Force is in the midst of a major technological shift where it is outsourcing virtually all day-to-day IT operations and retooling its workforce for cybersecurity. It’s a years-long process that now includes the biggest Microsoft Office 365 enterprise in the world, a $293 million Oracle cloud system and a $1 billion spend on a mass cloud migration over the next five years. Silicon Valley’s top companies are now running Air Force’s email servers so airman can be placed in Mission Defense Teams, sets of operators who do day-to-day, front line cybersecurity work at bases around the world. “We want our airmen transitioning from running email and boxes to focusing on cyber defense,”said William Marion, the Air Force’s deputy chief of information dominance and deputy chief information officer. “Every time we move to the cloud, the intent is to free up cyber operators for the Mission Defense Teams.” The role switch is described within […]

The post The U.S. Air Force is outsourcing all traditional IT in order to build cybersecurity mission teams appeared first on Cyberscoop.

Continue reading The U.S. Air Force is outsourcing all traditional IT in order to build cybersecurity mission teams

US Air Force Hacked for Good at HackerOne’s Bug Bounty Event

By Uzair Amir
106 Security Flaws Identified in Operationally Significant DoD Websites under
This is a post from HackRead.com Read the original post: US Air Force Hacked for Good at HackerOne’s Bug Bounty Event
Continue reading US Air Force Hacked for Good at HackerOne’s Bug Bounty Event

Bypassing Two-Factor Authentication – Paul’s Security Weekly #539

Former Head of Israeli Air Force CERT & Forensics Team, Senior Security Researcher at Javelin Networks. Eyal Neemany talks about bypassing two-factor authentication on Active Directory. Full Show Notes Subscribe to YouTube Channel
The post Bypassin… Continue reading Bypassing Two-Factor Authentication – Paul’s Security Weekly #539

Matthew Toussain, SANS Institute – Paul’s Security Weekly #533

Matthew Toussain is an active-duty Air Force officer and the founder of Spectrum Information Security. He regularly hunts for vulnerabilities in computer systems and releases tools to demonstrate the effectiveness of attacks and countermeasures. Full Show Notes Subscribe to YouTube Channel

The post Matthew Toussain, SANS Institute – Paul’s Security Weekly #533 appeared first on Security Weekly.

Continue reading Matthew Toussain, SANS Institute – Paul’s Security Weekly #533