Microsoft seizes internet domains linked to GRU cyberattacks against Ukraine

Strontium — a group linked to Russian military intelligence — was using the domains to target Ukrainian institutions, Microsoft said.

The post Microsoft seizes internet domains linked to GRU cyberattacks against Ukraine appeared first on CyberScoop.

Continue reading Microsoft seizes internet domains linked to GRU cyberattacks against Ukraine

A Department of Defense bulletin on a ‘leaking’ sinkhole has baffled cybersecurity experts

In mid-April, an obscure agency housed under the Department of Defense issued a bulletin that a little-known, Chinese-linked hacking group is likely responsible for some suspicious activity aimed at defense contractors in the U.S. But how the Defense Counterintelligence and Security Agency (DCSA) came to that conclusion is complicated. The alert, sent to 38 contractors, says DCSA detected the group was making “inbound and outbound connections” with contractors’ facilities as of Feb. 1. The targeting, which appeared to have stopped by March 25, was directed at several critical infrastructure sectors, including aerospace, health care and maritime, according to a copy of the bulletin obtained by CyberScoop. A DCSA official tells CyberScoop the document was meant to raise awareness among the contractors, but numerous sources tell CyberScoop that it is more confusing than clarifying. The bulletin, which was first reported by Politico, has raised questions about the attributed hacking group and if the actions described […]

The post A Department of Defense bulletin on a ‘leaking’ sinkhole has baffled cybersecurity experts appeared first on CyberScoop.

Continue reading A Department of Defense bulletin on a ‘leaking’ sinkhole has baffled cybersecurity experts

1,000-Year-Old Pristine Mayan Artifacts Found in Sealed ‘Jaguar God’ Cave

The cave was first discovered by local farmers in 1966, but was walled off until last year for unknown reasons. Continue reading 1,000-Year-Old Pristine Mayan Artifacts Found in Sealed ‘Jaguar God’ Cave

Intentional security holes

Sinkholes and watering holes are two words not automatically associated with computer security, yet they are in use to describe two tactics that are used in this field. Categories: Cybercrime
Social engineeringTags: Pieter Arntzsinkholesinkholesthe mo… Continue reading Intentional security holes