BigBrother Blog News(1326)  -   2024  2023  2022  2021  2020  2019  2018

APT blog  Attack blog  BigBrother blog  BotNet blog  Cyber blog  Cryptocurrency blog  Exploit blog  Hacking blog  ICS blog  Incident blog  IoT blog  Malware blog  OS Blog  Phishing blog  Ransom blog  Safety blog  Security blog  Social blog  Spam blog  Vulnerebility blog

DATE

NAME

Info

CATEG.

WEB

21.12.24

Malicious Life Podcast: Operation Snow White, Part 2

Scientology spies were trained in all covert operations techniques: surveillance, recruiting agents, infiltrating enemy lines, and blackmail. However, a suspicious librarian and a determined FBI agent brought the largest single spy operation in US government history to an end.

BigBrother blog

Cybereason

21.12.24

Malicious Life Podcast: Operation Snow White, Part 1

In 1963, the FDA raided the headquarters of a budding new and esoteric religion - The Church of Scientology. In response to this and similar incidents to come, the church's founder - an eccentric science fiction author named L. Ron Hubbard - would go on to lead the single largest known government infiltration operation in United States history.

BigBrother blog

Cybereason

21.12.24

Safeguarding Election Integrity: Threat Hunting for the U.S. Elections

With 2024 being a major election year globally, the stakes for election security were and remain high. More than 60 countries, including the United States, Mexico, India, and Indonesia, held elections and engaged nearly 2 billion voters. The U.S. general election on November 5th, 2024, drew significant attention due to concerns over potential interference and cybersecurity threats.

BigBrother blog

Trelix

21.12.24

Hacktivist Groups: The Shadowy Links to Nation-State Agendas

The recent conflicts between Ukraine and the Middle East have seen a surge in hacktivist activity, with groups aligned with both sides engaging in cyberattacks. In this blog we will cover a large set of Hacktivist groups.

BigBrother blog

Trelix

2.11.24

UAT-5647 targets Ukrainian and Polish entities with RomCom malware variantsCisco Talos has observed a new wave of attacks active since at least late 2023, from a Russian speaking group we track as “UAT-5647”, against Ukrainian government entities and unknown Polish entitiesBigBrother blogCisco Blog

2.11.24

Operation MiddleFloor: Disinformation campaign targets Moldova ahead of presidential elections and EU membership referendumBeginning in early August, Check Point Research observed a cyber-enabled disinformation campaign primarily targeting Moldova’s government and education sectors. Acting ahead of Moldova’s elections on October 20th, attackers behind this campaign likely seek to foster negative perceptions of European values and the EU membership process in addition to Moldova’s current pro-European leadership, with the intent of influencing the outcome of the upcoming fall elections and national referendum. BigBrother blogCheckpoint

2.11.24

Cyber Threats Targeting the US Government During the Democratic National ConventionTrellix global sensors detected increased threat activities during the days that the Democratic National Convention (DNC) was held in August 2024, culminating into a massive spike in detections halfway through the convention. Our data indicate that these threat activities targeted a wide range of US government organizations, including regional democratic causes, state legislative offices, legislative data centers, election boards, local law enforcement agencies, and public transportation networks.BigBrother blogTrelix

2.11.24

Mind the (air) gap: GoldenJackal gooses government guardrailsESET Research analyzed two separate toolsets for breaching air-gapped systems, used by a cyberespionage threat actor known as GoldenJackalBigBrother blog

Eset

28.9.24

Cyberespionage the Gamaredon way: Analysis of toolset used to spy on Ukraine in 2022 and 2023ESET Research has conducted a comprehensive technical analysis of Gamaredon’s toolset used to conduct its cyberespionage activities focused in UkraineBigBrother blog

Eset

21.9.24

FBI, CISA warning over false claims of hacked voter data – Week in security with Tony AnscombeWith just weeks to go before the US presidential election, the FBI and the CISA are warning about attempts to sow distrust in the electoral processBigBrother blog

Eset

7.9.24

TIDRONE Targets Military and Satellite Industries in TaiwanOur research reveals that an unidentified threat cluster we named TIDRONE have shown significant interest in military-related industry chains, particularly in the manufacturers of drones.BigBrother blog

Trend Micro

10.8.24

Sustained Campaign Using Chinese Espionage Tools Targets TelcosAttackers were heavily focused on telecoms operators in a single Asian country.BigBrother blogSymantec

27.7.24

Cuckoo Spear – the latest Nation-state Threat Actor targeting Japanese companies

Highly sophisticated, well-funded, and strategically motivated nation-state cybersecurity threats are complex and challenging, requiring advanced cybersecurity measures, threat intelligence, and international cooperation.

BigBrother blog

Cybereason

13.7.24

Euro 2024’s impact on Internet traffic: a closer look at finalists Spain and EnglandHere we examine how UEFA Euro 2024 football matches have influenced Internet traffic patterns in participating countries, with a special focus on the two finalists, Spain and England, on their journey to the final... BigBrother blogCloudflare

13.7.24

French elections: political cyber attacks and Internet traffic shiftsCheck the dynamics of the 2024 French legislative elections, the surprising election results’ impact on Internet traffic changes, and the cyber attacks targeting political parties... BigBrother blogCloudflare

13.7.24

UK election day 2024: traffic trends and attacks on political partiesHere, we explore the dynamics of Internet traffic and cybersecurity during the UK’s 2024 general election, highlighting late-day traffic changes and a post-vote attack on a political party... BigBrother blogCloudflare

18.5.24

Talos joins CISA to counter cyber threats against non-profits, activists and other at-risk communitiesCommercial spyware tools can threaten democratic values by enabling governments to conduct covert surveillance on citizens, undermining privacy rights and freedom of expression.BigBrother blogCisco Blog
6.4.24THE ILLUSION OF PRIVACY: GEOLOCATION RISKS IN MODERN DATING APPSDating apps often use location data, to show users nearby and their distances. However, openly sharing distances can lead to security issues. Techniques like trilateration allow attackers to determine user coordinates using distance information.BigBrother blogCheckpoint
25.2.24PSYOP campaigns targeting Ukraine – Week in security with Tony AnscomberComing in two waves, the campaign sought to demoralize Ukrainians and Ukrainian speakers abroad with disinformation messages about war-related subjectsBigBrother blogEset
18.2.24Deepfakes in the global election year of 2024: A weapon of mass deception?As fabricated images, videos and audio clips of real people go mainstream, the prospect of a firehose of AI-powered disinformation is a cause for mounting concernBigBrother blogEset