Cyber Command News | CYBERCOM Or USCYBERCOM Alerts For Cyber Threats
Current News Flashes
Privacy Is Important! Defcon Level Warning System currently highly recommends Express VPN to browse privately & securely. Use This Link to get 30 free days.
Want To Support What We Do? Keeping alerts, intel and news as informative and timely as possible takes a lot of research, time, effort and financial investment for required tools and services. There are many ways you can Contribute or Subscribe to Defcon Level Warning System today, for live email updates, early access for and exclusive news and alerts while supporting our work in the process. No contribution is too small. Thank you!
System Announcement: Share the Defcon Level Warning System alerts platform on your website, social media or to your friends and earn paid access to our alerts platform for free: Referral Link Here
April 26, 2024 - US, Britain Announce Alerts Regarding Cryptocurrency, Money Laundering And Greater Powers To Seize/Freeze/Destroy Cryptoassets. The British government has announced, "greater powers for the National Crime Agency and police to seize, freeze and destroy cryptoassets used by criminals have come into force today". Read more
April 21, 2024 - Chinese Hackers Embedded Malware In US Infrastructure, US Renews Controversial Section 702 Which Allows Data Collection On American Citizens. Declassified Document Show FBI Misused Surveillance Search Tool 278,000 Times. Read more
April 18, 2024 - 911 outages have been reported in at least six cities in four states, including Nevada, South Dakota, Nebraska, and Texas. Read more
March 19, 2024 - Man Arrested At US Border Claiming To Be Hezbollah, Government-Wide Investigation Into China's Efforts To Infiltrate US Infrastructure. Lebanese illegal immigrant Basel Bassel Ebbadi was caught by the US Border Patrol on March 9th near El Paso, Texas and said he was headed to New York. Read more
March 12, 2024 - 2024 Annual Threat Assessment Report And Summary, Defense Budget Briefings. According to the US Intelligence Community, the United States faces a "fragile global order strained by accelerating strategic competition among major powers". Read more
March 4, 2024 - Ukrainian Intelligence Agency Claims It Hacked The Russian Ministry Of Defense, Obtained Sensitive Defense Documents, Blew Up Russian Bridge. The agency said it targeted the railway bridge across the Chapaevka River in the Samara region of Russia. Read more
March 4, 2024 - HGC Global Communications Releases Statement On Cables Cut In Red Sea. The damage to the cables was reported earlier to have been done by the Iranian-backed Houthis which has since denied cutting them. Read more
February 28, 2024 - Joint Cybersecurity Advisories: Routers Compromised By Russian Cyber Actors, Updated Advisory On ALPHV Blackcat. ALPHV Blackcat ransomware affiliates continue to victimize critical infrastructure entities, particularly in the healthcare sector. Read more
February 26, 2024 - Four underwater cables linking Europe to Asia, and China to the West were reportedly targeted by Houthi rebels, according to Israeli media, which reported the cables that were cut belonged to AAE-1, Seacom, EIG, and TGN systems. Read more
February 23, 2024 - Third Solar Flare Erupts From Sun: X6.3, Strongest Of This Solar Cycle. The X6.3 flare was the largest of the three X-class flares that occurred in the past 24 hours, and the strongest of this solar cycle. Read more
February 22, 2024 - US Cellular Network Reports Outages Around The Same Time Multiple X-Class Solar Flares Erupted From Sun. NOAA Says Unlikely Outages Caused By The Solar Flares. Read more
February 14, 2024 - Regarding the national security threat currently being reported: Media reports say Russia intends to deploy nuclear weapons in space, possibly to use against satellites. We're continuing to monitor the situation: Read more
February 14, 2024 - [Developing, this report will be updated as information is released]: The House Intelligence Committee has disclosed that the House Permanent Select Committee on Intelligence has made information available to all Members of Congress on a matter concerning a “serious national security threat”. Read more
February 9, 2024 - Update: CBP officers seize over $9.5 million in hard narcotics at World Trade Bridge After Systems Failure At Mexican Customs Caused Laredo Traffic To Grind To A Halt. Read more
February 8, 2024 - Mexican Customs Systems Failure Causes Traffic Backup In Laredo, Texas: Cause Yet Unknown. The United States did more trade with Mexico than any nation ever in 2023, and Port Laredo became the country’s top port making it a possible high-priority target for cyberattacks. Read more
January 31, 2023 - US Government Disrupts Chinese Botnet Targeting Critical Infrastructure. Chinese hackers have the entire nation in their cross-hairs, posturing themselves to be able to take down vital infrastructure and resources “at a moment’s notice” if conflict breaks out. Read more
December 12, 2023 - Chinese Affiliated Hackers Compromise Critical Infrastructure With Intent To Sow Panic, Chaos, Deploy Future Attacks. Chinese affiliated hackers have compromised water utility companies, at least one oil and gas pipeline, an attempt on the Texas power grid to “sow panic and chaos” and disrupt logistics. Read more
December 8, 2023 - US Senator: Governments Using Push Notification Data To Surveil Smartphone Users. Declassified Report Confirms US Intel Agencies Purchasing Information On American Citizens: Read more
December 4, 2023 - British Government Responds To Media Claims Sellafield Nuclear Site Had Been Cyber-Attacked By Saying "No Such Malware Exists". The Guardian reported that the British nuclear site was infected by sleeper malware that had been detected as far back as 2015. Read more
December 2, 2023 - FBI/CISA/NSA/EPA Releases Joint Report: IRGC-Affiliated Cyber Actors Exploit PLCs in Multiple Sectors, Including U.S. Water and Wastewater Systems Facilities. "IRGC-affiliated cyber actors using the persona “CyberAv3ngers” are actively targeting and compromising Israeli-made Unitronics Vision Series programmable logic controllers (PLCs)." Read more
December 1, 2023 - Strong Geomagnetic Storm To Hit Earth Saturday. The U.S. Space Weather Prediction Center issued an alert that it expects a strong geomagnetic storm to hit the Earth on Saturday after the sun released a powerful coronal mass ejection (CME), adding that it could disrupt communication systems. Read more
November 29, 2023 - US Navy: Iranian UAV Creates Safety-of-Flight Risk to IKE Carrier Strike Group in Arabian Gulf, US AI Task Force Carry Out Manned/Unmanned Naval Live-Fire Drills. "Today, Iranian unmanned aircraft took unsafe and unprofessional actions near USS Dwight D. Eisenhower (CVN 69) (IKE) during the course of routine flight operations in international waters". Read more
November 29, 2023 - Daixin Claims It Hacked The North Texas Municipal Water District, Stole Sensitive Data. The ransomware group claimed that they stole 33,844 files worth of "sensitive data" and threatened to leak the data which it says includes account numbers, and social security numbers. Read more
November 29, 2023 - CISA Releases Alert About Iranian-Backed Hack On Pennsylvania, USA Water Service, and Israeli Water Treatment Centers. CISA: While few details are currently known, according to open-source reporting, on Saturday the Municipal Water Authority of Aliquippa in western Pennsylvania was attacked by an Iranian-backed cyber group known as CyberAv3ngers. Read more
November 27, 2023 - As US Government Prepares For Iranian Cyberattacks, Group Attacks Water Service In Pennsylvania, USA. The hacker group that calls themselves "CyberAv3ngers" has taken responsibility for at least 10 water treatment centers in Israel, as well as a number of other attacks globally. Read more
November 23, 2023 - US, Russia, China Compete For AI Dominance, China Plans To Mass Produce Humanoid Robots By 2025. Russia: Will soon approve AI strategy. The announcement by Russia comes as the US and China both race to implement artificial intelligence into their militaries, and information strategies. Read more
November 10, 2023 - Ransomware Attack Hits China's ICBC Bank, Disrupts US Treasury Market. ICBC: "ICBC FS has been conducting a thorough investigation and is progressing its recovery efforts with the support of its professional team of information security experts." Read more
November 7, 2023 - Fifth US/South Korean Working Group Meeting on North Korean Cyber Threats. US/South Korea Pursuing Wide Range Of Actions To Prevent And Disrupt North Korea’s Cryptocurrency Heists And Other Cyber-Enabled Revenue Generation. Read more
November 1, 2023 - USSCOCOM Awards Contract To Deploy Artificial Intelligence (AI) Tool To Detect Disinformation Threats. What the AI threat detection software Argus does, and its potential to be used as a tool to target Americans Read more
August 17, 2023 - Cyber Criminals Targeting Victims through Mobile Beta-Testing Applications. The malicious apps enable theft of personally identifiable information (PII), financial account access, or device takeover. Read more
August 16, 2023 - Cyber Criminals Targeting Victims through Mobile Beta-Testing Applications. The malicious apps enable theft of personally identifiable information (PII), financial account access, or device takeover. Read more
August 15, 2023 - Milestone In Power Grid Optimization On World’s First Exascale Supercomputer. In the largest simulation of its kind to date, Oak Ridge Lab's Frontier allowed researchers to determine safe and cost-optimal power grid setpoints over 100,000 possible grid failures and weather scenarios in just 20 minutes. Read more
August 11, 2023 - DOD Announces Establishment Of Generative Artificial Intelligence (AI) Task Force. "We must also consider the extent to which our adversaries will employ this technology and seek to disrupt our own use of AI-based solutions". Read more
August 5, 2023 - Cyberattack Hits Medical Facilities In Multiple US States. Hospitals had to go back to using old-fashioned ways of record keeping, such as using pen and paper instead of computers to input and store information on patients. Read more
July 8, 2023 - Increased Truebot Activity Infects U.S. and Canada Based Networks. Truebot is a botnet that has been used by malicious cyber groups like CL0P Ransomware Gang to collect and exfiltrate information from its target victims. Read more
June 15, 2023 - Threat Actors Exploit Vulnerabilities in Multiple U.S. Government Servers. "Analysts determined that multiple cyber threat actors, including an advanced persistent threat (APT) actor, were able to exploit a .NET deserialization vulnerability". Read more
June 3rd, 2023 - The FBI released a joint CSA with our USG and South Korean partners detailing the operations of Kimsuky cyber actors, a subset of DPRK cyber actors. It outlines warning signs of spearphishing campaigns. Read more
˅
˅
US, Britain Announce Alerts Regarding Cryptocurrency, Money Laundering And Greater Powers To Seize/Freeze/Destroy Cryptoassets - The British government has announced, "greater powers for the National Crime Agency and police to seize, freeze and destroy cryptoassets used by criminals have come into force today".
FBI/IC3/BRITISH GOVERNMENT - Both the US Federal Bureau Of Investigation (FB), Internet Crime Complaint Center (IC3) and the British Government have released statements concerning Cryptocurrency, with the British government announcing "greater powers for the National Crime Agency and police to seize, freeze and destroy cryptoassets used by criminals have come into force today". Read Report | Read All Alerts.
Not subscribed? We have two subscription platforms, one for immediate alerts and one for our more refined news and intel. We separate them as breaking alerts are dynamic and developing stories tend to change quickly as information is initially released. Upgrade your experience and get alerts first straight to your email with access to our Defcon Alerts Platform, and SJ News/Intel Platform.
Why Subscribe? Subscribers get alerts before they are posted on this website. Our alerts platform and news/intel platform include accurate alerts, intel, and news updates not included on this website sent straight to your email. They also include full conversation transcripts, official statements, exclusive research, screenshots, images, documents, videos, notes, data and more.
New updates to alerts not posted on this website may also be posted on our paid platforms. "We give straight and accurate professional-grade threat alerts, world news, and intelligence updates without the agendas, fluff, or exaggeration".
Chinese Hackers Embedded Malware In US Infrastructure, US Renews Controversial Section 702 - Chinese Hackers Embedded Malware In US Infrastructure, US Renews Controversial Section 702 Which Allows Data Collection On American Citizens. Declassified Document Show FBI Misused Surveillance Search Tool 278,000 Times. Read Full Report | Read All Reports.
Section 702 allows for data to be collected on Americans who are in communication with people who are located overseas.
NASHVILLE, TENNESSEE - According to the Director of the FBI, Chinese state-sponsored hackers have hidden exploits within key U.S. infrastructure and are just waiting “for the right moment to deal a devastating blow”.
According to FBI Director Chris Wray, the risks posed by the Chinese government to the United States previously spoken of in previous reports are no longer “over the horizon” but are “upon us now”.
“I'm talking about everything from indiscriminate hacking to economic espionage to transnational repression to fentanyl and the precursor chemicals that are coming out of China and ending up in our communities.
What we're facing today is the CCP [Chinese Communist Party] throwing its whole government into undermining the security of the rule-of-law world,” Wray said.
The threat posed by China is not just in one area, but “a combined counterintelligence, cybersecurity, and criminal threat,” he added, and said, “Part of that threat is driven by the CCP's aspirations to wealth and power”.
Wray said that China has no reservations about “stealing their way to the top”, hitting just about every U.S. industry including: Biotech Industry; Aviation Field; Advanced Technologies; Artificial Intelligence (AI); Healthcare Industry; Agricultural Industry; Intellectual Property; Technology Industry; Research Industry.
“You could close your eyes and pull an industry or sector out of a hat and, chances are, Beijing has targeted it,” Wray said.
US Senate Reauthorizes Section 702 Of The Foreign Intelligence Surveillance Act. Section 702 Allows Data Collection On American Citizens Under Certain Conditions, Has Been Abused: Read Full Report | Read All Reports.
Not subscribed? We have two subscription platforms, one for immediate alerts and one for our more refined news and intel. We separate them as breaking alerts are dynamic and developing stories tend to change quickly as information is initially released. Upgrade your experience and get alerts first straight to your email with access to our Defcon Alerts Platform, and SJ News/Intel Platform.
Why Subscribe? Subscribers get alerts before they are posted on this website. Our alerts platform and news/intel platform include accurate alerts, intel, and news updates not included on this website sent straight to your email. They also include full conversation transcripts, official statements, exclusive research, screenshots, images, documents, videos, notes, data and more.
New updates to alerts not posted on this website may also be posted on our paid platforms. "We give straight and accurate professional-grade threat alerts, world news, and intelligence updates without the agendas, fluff, or exaggeration".
911 Outages Across Multiple US States - UNITED STATES - 911 outages have been reported in at least six cities in four states, including Nevada, South Dakota, Nebraska, and Texas.
Henderson Police Department: We're experiencing a 911 outage impacting your ability to make calls from landlines and cell phones to our dispatchers. Read Full Alert | Read All Reports.
FAA Issued Advisory On Alaskan Airlines, NORAD Carried Out Exercises - Alaska Airlines said that it was due to an issue while performing a systems upgrade.
FAA Issued Advisory On Alaskan Airlines, NORAD Carried Out Exercises - Alaska Airlines said that it was due to an issue while performing a systems upgrade.
ALASKA - The Federal Aviation Administration (FAA) released an “Alaska Airlines Ground Stop” advisory on April 17th for one hour which included “All Alaska mainline and subcarrier flights" but did not include Skywest, the advisory has since been canceled.
While the FAA did not disclose the reason for the Ground Stop, Alaska Airlines said that it was due to an issue while performing a systems upgrade which caused the airlines to ask the FAA " to pause the airline's mainline departures nationwide”.
Alaska Airlines said later in a statement, "This morning we experienced an issue while performing an upgrade to the system that calculates our weight and balance”.
One day earlier, the North American Aerospace Defense Command (NORAD) reported that they would be carrying out a planned live-fly air defense exercise over the National Capital Region and Houston on April 16th. Statement By NORAD On April 16th Exercises: Read Full Report | Read All Reports.
Not subscribed? We have two subscription platforms, one for immediate alerts and one for our more refined news and intel. We separate them as breaking alerts are dynamic and developing stories tend to change quickly as information is initially released. Upgrade your experience and get alerts first straight to your email with access to our Defcon Alerts Platform, and SJ News/Intel Platform.
Why Subscribe? Subscribers get alerts before they are posted on this website. Our alerts platform and news/intel platform include accurate alerts, intel, and news updates not included on this website sent straight to your email. They also include full conversation transcripts, official statements, exclusive research, screenshots, images, documents, videos, notes, data and more.
New updates to alerts not posted on this website may also be posted on our paid platforms. "We give straight and accurate professional-grade threat alerts, world news, and intelligence updates without the agendas, fluff, or exaggeration".
Man Arrested At US Border Claiming To Be Hezbollah, Government-Wide Investigation Into China's Efforts To Infiltrate US Infrastructure - Lebanese illegal immigrant Basel Bassel Ebbadi was caught by the US Border Patrol on March 9th near El Paso, Texas and said he was headed to New York.
US/SOUTHERN BORDER - An illegal immigrant caught at the U.S. southern border claiming to be a Hezbollah terrorist coincided with a new government-wide investigation into China's "ongoing efforts to infiltrate and influence the United States" and achieve global domination including addressing the following threats to the United States:
Chemical warfare, namtely the growing amount of fentanyl coming over the southern border, Influence in education, Technology warfare (Space, Energy, Infrastructure), Political warfare, Economic warfare (business, technology, agriculture, research), Infiltration of environmental sector, Media and Communications Warfare, Money laundering, corporate espionage, Influence in the space industry including work being done by NASA, And more.
Lebanese Illegal Immigrant Caught At Border Claiming To Be Hezbollah Terrorist Planning To Make Bomb, Was Headed To New York, Full Investigation Report On China: Read Full Report | Read All Reports On China.
Not subscribed? We have two subscription platforms, one for immediate alerts and one for our more refined news and intel. We separate them as breaking alerts are dynamic and developing stories tend to change quickly as information is initially released. Upgrade your experience and get alerts first straight to your email with access to our Defcon Alerts Platform, and SJ News/Intel Platform.
Why Subscribe? Subscribers get alerts before they are posted on this website. Our alerts platform and news/intel platform include accurate alerts, intel, and news updates not included on this website sent straight to your email. They also include full conversation transcripts, official statements, exclusive research, screenshots, images, documents, videos, notes, data and more.
New updates to alerts not posted on this website may also be posted on our paid platforms. "We give straight and accurate professional-grade threat alerts, world news, and intelligence updates without the agendas, fluff, or exaggeration".
2024 Annual Threat Assessment Report And Summary, Defense Budget Briefings - According to the US Intelligence Community, the United States faces a "fragile global order strained by accelerating strategic competition among major powers".
PENTAGON - The U.S. Intelligence Community has released the 2024 Annual Threat Assessment, and the U.S. Department of Defense held defense budget briefings.
According to the report, “During the next year, the United States faces an increasingly fragile global order strained by accelerating strategic competition among major powers, more intense and unpredictable transnational challenges, and multiple regional conflicts with far-reaching implications”.
The regional conflicts the report refers to include “An ambitious but anxious China, a confrontational Russia, some regional powers, such as Iran, and more capable non-state actors are challenging longstanding rules of the international system as well as U.S. primacy within it,” adding also the Gaza crisis, and attack on Israel by the Hamas terrorist organization. Read Full Report | Read All Reports.
Not subscribed? We have two subscription platforms, one for immediate alerts and one for our more refined news and intel. We separate them as breaking alerts are dynamic and developing stories tend to change quickly as information is initially released. Upgrade your experience and get alerts first straight to your email with access to our Defcon Alerts Platform, and SJ News/Intel Platform.
Why Subscribe? Subscribers get alerts before they are posted on this website. Our alerts platform and news/intel platform include accurate alerts, intel, and news updates not included on this website sent straight to your email. They also include full conversation transcripts, official statements, exclusive research, screenshots, images, documents, videos, notes, data and more.
New updates to alerts not posted on this website may also be posted on our paid platforms. "We give straight and accurate professional-grade threat alerts, world news, and intelligence updates without the agendas, fluff, or exaggeration".
Ukrainian Intelligence Agency Claims It Hacked Russian Ministry Of Defense, Obtained Sensitive Defense Documents, Blew Up Russian Bridge - KYIV - The Ukrainian military intelligence agency (HUR) has claimed that it carried out a hack on the Russian Ministry of Defense and targeted the railway bridge across the Chapaevka River in the Samara region of Russia, blowing up its "power structures" and causing it to be disabled.
The statement by the Ukrainian intelligence agency stated, "The railway branch was used by the aggressor state to transport military cargo, in particular engineering ammunition, produced by JSC "Polimer" plant in the city of Chapaevsk, Samara region". Read Full Report | Read All Reports.
The agency added, "Given the nature of the damage to the railway bridge, its use will be impossible for a long time".
HGC Global Communications Releases Statement On Cables Cut In Red Sea - Statement: "Among 15+ submarine cables in the Red Sea, 4 of them (Seacom, TGN, AAE-1, EIG) are cut which we estimated impact 25% of traffic".
HONG KONG/RED SEA - HGC Global Communications (formerly known as Hutchison Global Communications Limited) has released a statement on the damage to the underwater telecommunications cables in the Red Sea which was reported earlier to have been done by the Iranian-backed Houthis which has since denied cutting them. Read Alert | Read Full Report
Not subscribed? We have two subscription platforms, one for immediate alerts and one for our more refined news and intel. We separate them as breaking alerts are dynamic and developing stories tend to change quickly as information is initially released. Upgrade your experience and get alerts first straight to your email with access to our Defcon Alerts Platform, and SJ News/Intel Platform.
Why Subscribe? Subscribers get alerts before they are posted on this website. Our alerts platform and news/intel platform include accurate alerts, intel, and news updates not included on this website sent straight to your email. They also include full conversation transcripts, official statements, exclusive research, screenshots, images, documents, videos, notes, data and more.
New updates to alerts not posted on this website may also be posted on our paid platforms. "We give straight and accurate professional-grade threat alerts, world news, and intelligence updates without the agendas, fluff, or exaggeration".
Joint Cybersecurity Advisories: Routers Compromised By Russian Cyber Actors, Updated Advisory On ALPHV Blackcat - ALPHV Blackcat ransomware affiliates continue to victimize critical infrastructure entities, particularly in the healthcare sector.
Federal Bureau Of Investigation (FBI) Joint Advisory: The FBI and its partners have released a joint Cybersecurity Advisory warning of Russian state-sponsored cyber actors’ use of compromised Ubiquiti Edge Routers to facilitate malicious cyber operations worldwide.
ALPHV Blackcat ransomware affiliates also continue to victimize critical infrastructure entities, particularly in the healthcare sector.
Russian Cyber Actors Use Compromised Routers to Facilitate Cyber Operations: FORT MEADE, Md. – The National Security Agency (NSA) has joined the Federal Bureau of Investigation (FBI) and other co-sealers to publish a Cybersecurity Advisory (CSA), “Russian Cyber Actors Use Compromised Routers to Facilitate Cyber Operations,” outlining observed tactics, techniques, and procedures (TTPs), indicators of compromise (IOCs), and mitigation recommendations for EdgeRouter users and other network defenders.
The Russian General Staff Main Intelligence Directorate (GRU) 85th Main Special Service Center, also known as APT28, Fancy Bear, and Forest Blizzard, has used compromised Ubiquiti EdgeRouters to harvest credentials, collect digests, proxy network traffic, and host spearphishing landing pages and custom tools. Academic and research institutions, embassies, defense contractors, and political parties are among the victims. Read Advisories | Read All Cyber/Tech Alerts.
Not subscribed? We have two subscription platforms, one for immediate alerts and one for our more refined news and intel. We separate them as breaking alerts are dynamic and developing stories tend to change quickly as information is initially released. Upgrade your experience and get alerts first straight to your email with access to our Defcon Alerts Platform, and SJ News/Intel Platform.
Why Subscribe? Subscribers get alerts before they are posted on this website. Our alerts platform and news/intel platform include accurate alerts, intel, and news updates not included on this website sent straight to your email. They also include full conversation transcripts, official statements, exclusive research, screenshots, images, documents, videos, notes, data and more.
New updates to alerts not posted on this website may also be posted on our paid platforms. "We give straight and accurate professional-grade threat alerts, world news, and intelligence updates without the agendas, fluff, or exaggeration".
Four International Underwater Telecommunications Cables Cut By Houthi Rebels - EUROPE/ASIA - Four underwater cables linking Europe to Asia, and China to the West were reportedly targeted by Houthi rebels, according to Israeli media, which reported the cables that were cut belonged to AAE-1, Seacom, EIG, and TGN systems.
“This is a serious disruption of communication between Europe and Asia, where the main damage will be absorbed mainly by communication activities in the Gulf countries and in India,” a translated portion of the report stated. The Cables Were Targeted About Three Months After Houthi Attacks On Merchant Vessels Began In The Red Sea: Read Full Report | Read All Reports.
Not subscribed? We have two subscription platforms, one for immediate alerts and one for our more refined news and intel. We separate them as breaking alerts are dynamic and developing stories tend to change quickly as information is initially released. Upgrade your experience and get alerts first straight to your email with access to our Defcon Alerts Platform, and SJ News/Intel Platform.
Why Subscribe? Subscribers get alerts before they are posted on this website. Our alerts platform and news/intel platform include accurate alerts, intel, and news updates not included on this website sent straight to your email. They also include full conversation transcripts, official statements, exclusive research, screenshots, images, documents, videos, notes, data and more.
New updates to alerts not posted on this website may also be posted on our paid platforms. "We give straight and accurate professional-grade threat alerts, world news, and intelligence updates without the agendas, fluff, or exaggeration".
Third Solar Flare Erupts From Sun: X6.3, Strongest Of This Solar Cycle - The X6.3 flare was the largest of the three X-class flares that occurred in the past 24 hours, and the strongest of this solar cycle.
Read Report | Read All Reports.Space Weather Prediction Center: "Another X-class flare from Region 3590 peaked at approximately 1734 EST on Feb. 22, 2024. The X6.3 flare was the largest of the three X-class flares that occurred in the past 24 hours, and the strongest of this solar cycle.
While impressive, this event still poses no significant threat to the general public."
Not subscribed? We have two subscription platforms, one for immediate alerts and one for our more refined news and intel. We separate them as breaking alerts are dynamic and developing stories tend to change quickly as information is initially released. Upgrade your experience and get alerts first straight to your email with access to our Defcon Alerts Platform, and SJ News/Intel Platform.
Why Subscribe? Subscribers get alerts before they are posted on this website. Our alerts platform and news/intel platform include accurate alerts, intel, and news updates not included on this website sent straight to your email. They also include full conversation transcripts, official statements, exclusive research, screenshots, images, documents, videos, notes, data and more.
New updates to alerts not posted on this website may also be posted on our paid platforms. "We give straight and accurate professional-grade threat alerts, world news, and intelligence updates without the agendas, fluff, or exaggeration".
Two Strong X-Class Solar Flares Erupt From Sun, Solar Eruption Event As Cellular Network Reports Outages - SPACE/SUN - Event: Strong X-class solar flare eruption from the sun. Effects: Users of high-frequency (HF) radio signals may experience temporary degradation or complete loss of signal on much of the sunlit side of the earth.
Space Weather Prediction Center: "Solar flares of this magnitude are not frequent, but the general public need not be concerned about the event".
"X1.8 and X1.7 flares from Region 3590 occurred at 21/2307 UTC and 22/0632 UTC. This region continues to exhibit strong magnetic complexity and is currently classified as a Beta-Gamma-Delta."
"No apparent CMEs (Coronal Mass Ejections) resulting from these events have been observed as of the time of this writing."
What is a Coronal Mass Ejection? Cellular Carrier Reports Outatges Around The Same Time, Solar Activity Data And More Information: Read Initial Alert | Read Full Report.
House Intelligence Committee On "Serious National Security Threat" - WASHINGTON - [Developing, this report will be updated as information is released]: The House Intelligence Committee has disclosed that the House Permanent Select Committee on Intelligence has made information available to all Members of Congress on a matter concerning a “serious national security threat”.
.Chairman Mike Turner said in a statement, “I am requesting that President Biden declassify all information relating to this threat so that Congress, the Administration, and our allies can openly discuss the actions necessary to respond to this threat”.
A White House correspondent is reporting that the threat has to do with Russian capabilities and space. The House Intelligence Committee has released the following statement by Chairman Mike Turner concerning a "serious national security threat": Media reports say Russia intends to deploy nuclear weapons in space, possibly to use against satellites but that the device has not been launched into space yet. Information Concerning Serious National Security Threat, Further Updates: Read Full Alert | Read All Alerts
Not subscribed? We have two subscription platforms, one for immediate alerts and one for our more refined news and intel. We separate them as breaking alerts are dynamic and developing stories tend to change quickly as information is initially released. Upgrade your experience and get alerts first straight to your email with access to our Defcon Alerts Platform, and SJ News/Intel Platform.
Why Subscribe? Subscribers get alerts before they are posted on this website. Our alerts platform and news/intel platform include accurate alerts, intel, and news updates not included on this website sent straight to your email. They also include full conversation transcripts, official statements, exclusive research, screenshots, images, documents, videos, notes, data and more.
New updates to alerts not posted on this website may also be posted on our paid platforms. "We give straight and accurate professional-grade threat alerts, world news, and intelligence updates without the agendas, fluff, or exaggeration".
Update: CBP officers seize over $9.5 million in hard narcotics at World Trade Bridge After Systems Failure At Mexican Customs Caused Laredo Traffic To Grind To A Halt - After The World Trade Bridge in Laredo experienced heavy traffic congestion and the city has mobilized all of its assets to reduce commercial congestion on Loop 20 and IH-35, Update: CBP officers seized over $9.5 million in hard narcotics at World Trade Bridge.
LAREDO, Texas—U.S. Customs and Border Protection, Office of Field Operations officers assigned to the World Trade Bridge seized hard narcotics that totaled over $9,500,000 in street value. Read Initial ALert On Defcon Alerts | Read Full Report On SJ News.
Not subscribed? We have two subscription platforms, one for immediate alerts and one for our more refined news and intel. We separate them as breaking alerts are dynamic and developing stories tend to change quickly as information is initially released. Upgrade your experience and get alerts first straight to your email with access to our Defcon Alerts Platform, and SJ News/Intel Platform.
Why Subscribe? Subscribers get alerts before they are posted on this website. Our alerts platform and news/intel platform include accurate alerts, intel, and news updates not included on this website sent straight to your email. They also include full conversation transcripts, official statements, exclusive research, screenshots, images, documents, videos, notes, data and more.
New updates to alerts not posted on this website may also be posted on our paid platforms. "We give straight and accurate professional-grade threat alerts, world news, and intelligence updates without the agendas, fluff, or exaggeration".
Mexican Customs Systems Failure Causes Traffic Backup In Laredo, Texas: Cause Yet Unknown - The United States did more trade with Mexico than any nation ever in 2023, and Port Laredo became the country’s top port making it a possible high-priority target for cyberattacks.
LAREDO, TEXAS - The World Trade Bridge in Laredo has experienced heavy traffic congestion and the city has mobilized “all of its assets to reduce commercial congestion on Loop 20 and IH-35,” according to a statement by the Laredo Mayor after what is being described as a “glitch” or a “system failure” in the Mexican Customs system over on the Mexican side of the border.
The Laredo Police Department advised noncommercial vehicles to take alternate routes from the Bob Bullock Loop. “Use caution and expect significant delays! If you are not a commercial motor vehicle, it is advisable to stay off the Loop and stick to the access roads,” the LPD statement said. Read On Defcon Alerts | Read On SJ News.
Not subscribed? We have two subscription platforms, one for immediate alerts and one for our more refined news and intel. We separate them as breaking alerts are dynamic and developing stories tend to change quickly as information is initially released. Upgrade your experience and get alerts first straight to your email with access to our Defcon Alerts Platform, and SJ News/Intel Platform.
Why Subscribe? Subscribers get alerts before they are posted on this website. Our alerts platform and news/intel platform include accurate alerts, intel, and news updates not included on this website sent straight to your email. They also include full conversation transcripts, official statements, exclusive research, screenshots, images, documents, videos, notes, data and more.
New updates to alerts not posted on this website may also be posted on our paid platforms. "We give straight and accurate professional-grade threat alerts, world news, and intelligence updates without the agendas, fluff, or exaggeration".
US Government Disrupts Chinese Botnet Targeting Critical Infrastructure. FBI: Chinese Hackers Have Entire Nation In Crosshairs - Chinese hackers have the entire nation in their cross-hairs, posturing themselves to be able to take down vital infrastructure and resources “at a moment’s notice” if conflict breaks out.
WASHINGTON - The U.S. Government has reported that it disrupted a botnet network used by the Chinese hacker group “Volt Typhoon” by wiping malware from infected routers.
In a court-authorized operation that the U.S. Justice Department says began in December of 2023, U.S.-based small office and home office (SOHO) routers that were hijacked by the People’s Republic of China (PRC) state-sponsored hackers were wiped of the KV Botnet nationwide.
“The hackers, known to the private sector as “Volt Typhoon,” used privately-owned SOHO routers infected with the “KV Botnet” malware to conceal the PRC origin of further hacking activities directed against U.S. and other foreign victims,” a statement by the Justice Department said.
It added, “These further hacking activities included a campaign targeting critical infrastructure organizations in the United States and elsewhere that was the subject of a May 2023 FBI, National Security Agency, Cybersecurity and Infrastructure Security Agency (CISA), and foreign partner advisory.” Vast Majority Of Routers Vulnerable As They Had Reached “End Of Life” Status And No Longer Receiving Updates: Read Full Report | Read All Cyber Reports
Not subscribed? We have two subscription platforms, one for immediate alerts and one for our more refined news and intel. We separate them as breaking alerts are dynamic and developing stories tend to change quickly as information is initially released. Upgrade your experience and get alerts first straight to your email with access to our Defcon Alerts Platform, and SJ News/Intel Platform.
Why Subscribe? Subscribers get alerts before they are posted on this website. Our alerts platform and news/intel platform include accurate alerts, intel, and news updates not included on this website sent straight to your email. They also include full conversation transcripts, official statements, exclusive research, screenshots, images, documents, videos, notes, data and more.
New updates to alerts not posted on this website may also be posted on our paid platforms. "We give straight and accurate professional-grade threat alerts, world news, and intelligence updates without the agendas, fluff, or exaggeration".
Chinese Affiliated Hackers Compromise Critical Infrastructure With Intent To Sow Panic, Chaos, Deploy Future Attacks - Chinese affiliated hackers have compromised water utility companies, at least one oil and gas pipeline, an attempt on the Texas power grid to “sow panic and chaos” and disrupt logistics.
.WASHINGTON - Chinese affiliated hackers have compromised over two dozen “critical entities” within the United States, including critical infrastructure such as water utility companies, at least one oil and gas pipeline, an attempt on the Texas power grid to “sow panic and chaos” and disrupt logistics, official stated.
The systems being compromised by China appear to be a part of a future trojan horse operation not only being used to inflict panic and chaos within the general public but also positioning themselves within critical U.S. systems to deploy them at a later date and time of their choosing in the event of a conflict arising between the United States and China. Read Full Report | Read All Cyber Alerts
Not subscribed? We have two subscription platforms, one for immediate alerts and one for our more refined news and intel. We separate them as breaking alerts are dynamic and developing stories tend to change quickly as information is initially released. Upgrade your experience and get alerts first straight to your email with access to our Defcon Alerts Platform, and SJ News/Intel Platform.
Why Subscribe? Subscribers get alerts before they are posted on this website. Our alerts platform and news/intel platform include accurate alerts, intel, and news updates not included on this website sent straight to your email. They also include full conversation transcripts, official statements, exclusive research, screenshots, images, documents, videos, notes, data and more.
New updates to alerts not posted on this website may also be posted on our paid platforms. "We give straight and accurate professional-grade threat alerts, world news, and intelligence updates without the agendas, fluff, or exaggeration".
US Senator: Governments Using Push Notification Data To Surveil Smartphone Users - Push notifications allow those who choose to subscribe to them via smartphone apps or web pages access to instant alerts on their phones or PCs. Although they can be sent by third-party apps, pages, or programs, the data also runs through servers owned and operated by Google and Apple.
WASHINGTON - Both U.S. and foreign governments are demanding data on users gathered from both Google and Apple's push notifications. Senator Wyden: Staff Investigating Matter For Over A Year After Receiving A Tip Government Agencies Were Demanding Push Notification Records. Apple And Google Respond, Declassified Report Confirms US Intel Agencies Purchasing Information On American Citizens: Read Report | Read All Reports
Not subscribed? We have two subscription platforms, one for immediate alerts and one for our more refined news and intel. We separate them as breaking alerts are dynamic and developing stories tend to change quickly as information is initially released. Upgrade your experience and get alerts first straight to your email with access to our Defcon Alerts Platform, and SJ News/Intel Platform.
Why Subscribe? Subscribers get alerts before they are posted on this website. Our alerts platform and news/intel platform include accurate alerts, intel, and news updates not included on this website sent straight to your email. They also include full conversation transcripts, official statements, exclusive research, screenshots, images, documents, videos, notes, data and more.
New updates to alerts not posted on this website may also be posted on our paid platforms. "We give straight and accurate professional-grade threat alerts, world news, and intelligence updates without the agendas, fluff, or exaggeration".
British Government Responds To Media Claims Sellafield Nuclear Site Had Been Cyber-Attacked By Saying "No Such Malware Exists" - The Guardian reported that the British nuclear site was infected by sleeper malware that had been detected as far back as 2015.
LONDON - After The Guardian news outlet released an article claiming that the Sellafield nuclear site had been cyber-attacked by state actors mostly linked to Russia and China, the British government released a statement saying that the claims were false and that they have no records or evidence to suggest that Sellafield Ltd networks had been attacked by state-actors "in the way described by the Guardian".
The statement added that the agency is "confident that no such malware exists" on their system.
The Guardian report claimed that the site was infected by sleeper malware that had been detected as far back as 2015, but said that the authorities don't know when it was first compromised, and it is not known if the malware has been eradicated. Read Full Report | Read All Alerts.
Not subscribed? We have two subscription platforms, one for immediate alerts and one for our more refined news and intel. We separate them as breaking alerts are dynamic and developing stories tend to change quickly as information is initially released. Upgrade your experience and get alerts first straight to your email with access to our Defcon Alerts Platform, and SJ News/Intel Platform.
Why Subscribe? Subscribers get alerts before they are posted on this website. Our alerts platform and news/intel platform include accurate alerts, intel, and news updates not included on this website sent straight to your email. They also include full conversation transcripts, official statements, exclusive research, screenshots, images, documents, videos, notes, data and more.
New updates to alerts not posted on this website may also be posted on our paid platforms. "We give straight and accurate professional-grade threat alerts, world news, and intelligence updates without the agendas, fluff, or exaggeration".
FBI/CISA/NSA/EPA: IRGC-Affiliated Cyber Actors Exploit PLCs in Multiple Sectors, Including U.S. Water and Wastewater Systems Facilities - FBI/CISA/NSA/EPA Releases Joint Report: IRGC-Affiliated Cyber Actors Exploit PLCs in Multiple Sectors, Including U.S. Water and Wastewater Systems Facilities. "IRGC-affiliated cyber actors using the persona “CyberAv3ngers” are actively targeting and compromising Israeli-made Unitronics Vision Series programmable logic controllers (PLCs)."
.FBI/CISA/NSA/EPA JOINT STATEMENTS: Today, CISA, the Federal Bureau of Investigation (FBI), the National Security Agency (NSA), the Environmental Protection Agency (EPA), and the Israel National Cyber Directorate (INCD) released a joint Cybersecurity Advisory (CSA) IRGC-Affiliated Cyber Actors Exploit PLCs in Multiple Sectors in response to the active exploitation of Unitronics programmable logic controllers (PLCs) in multiple sectors, including U.S. Water and Wastewater Systems (WWS) facilities, by Iranian Government Islamic Revolutionary Guard Corps (IRGC)-affiliated advanced persistent threat (APT) cyber actors.
IRGC-affiliated cyber actors using the persona “CyberAv3ngers” are actively targeting and compromising Israeli-made Unitronics Vision Series PLCs that are publicly exposed to the internet, through the use of default passwords. The PLCs may be rebranded and appear as different manufacturers and company names. Full Joint Statement, Security Alerts For The Attacks: Read Report | Initial Report On Attacks
Not subscribed? We have two subscription platforms, one for immediate alerts and one for our more refined news and intel. We separate them as breaking alerts are dynamic and developing stories tend to change quickly as information is initially released. Upgrade your experience and get alerts first straight to your email with access to our Defcon Alerts Platform, and SJ News/Intel Platform.
Why Subscribe? Subscribers get alerts before they are posted on this website. Our alerts platform and news/intel platform include accurate alerts, intel, and news updates not included on this website sent straight to your email. They also include full conversation transcripts, official statements, exclusive research, screenshots, images, documents, videos, notes, data and more.
New updates to alerts not posted on this website may also be posted on our paid platforms. "We give straight and accurate professional-grade threat alerts, world news, and intelligence updates without the agendas, fluff, or exaggeration".
Strong Geomagnetic Storm To Hit Earth Saturday - NORTHERN HEMISPHERE - The U.S. Space Weather Prediction Center issued an alert that it expects a strong geomagnetic storm to hit the Earth on Saturday after the sun released a powerful coronal mass ejection (CME), adding that it could disrupt communication systems.
The Space Weather Prediction Center reported a Moderate Radio Blackout Event on November 28th, 2023 when an M9.8 solar flare occurred. An M9.8 is only a few percentage points away from an X-class, which is the most powerful type of solar flare that is known to cause radio blackouts.
At that time it was reported that the effects might be "temporary degradation or complete loss of High Frequency (HF) radio signals on some of the sunlight side of the Earth" at the time.
Coronal Mass Ejections are "large expulsions of plasma and magnetic field from the Sun’s corona," according to the U.S. Space Weather Prediction Center. Such expulsions can inject "billions of tons of coronal material and carry an embedded magnetic field (frozen in flux) that is stronger than the background solar wind interplanetary magnetic field (IMF) strength," the agency states. Read Full Report | Read Space/Nuclear Alerts.
Not subscribed? We have two subscription platforms, one for immediate alerts and one for our more refined news and intel. We separate them as breaking alerts are dynamic and developing stories tend to change quickly as information is initially released. Upgrade your experience and get alerts first straight to your email with access to our Defcon Alerts Platform, and SJ News/Intel Platform.
Why Subscribe? Subscribers get alerts before they are posted on this website. Our alerts platform and news/intel platform include accurate alerts, intel, and news updates not included on this website sent straight to your email. They also include full conversation transcripts, official statements, exclusive research, screenshots, images, documents, videos, notes, data and more.
New updates to alerts not posted on this website may also be posted on our paid platforms. "We give straight and accurate professional-grade threat alerts, world news, and intelligence updates without the agendas, fluff, or exaggeration".
US Navy: Iranian UAV Creates Safety-of-Flight Risk to IKE Carrier Strike Group in Arabian Gulf, US AI Task Force Carry Out Manned/Unmanned Naval Live-Fire Drills - "Today, Iranian unmanned aircraft took unsafe and unprofessional actions near USS Dwight D. Eisenhower (CVN 69) (IKE) during the course of routine flight operations in international waters".
MANAMA, Bahrain November 29th Statement - Statement from the commander of U.S. Naval Forces Central Command, Vice Adm. Brad Cooper, and US Navy statement on manned and unmanned live-fire drills carried out by the U.S. Naval Forces Central Command.
US Navy: Today, Iranian unmanned aircraft took unsafe and unprofessional actions near USS Dwight D. Eisenhower (CVN 69) (IKE) during the course of routine flight operations in international waters, on Nov. 28. Carrier Strike Group Was Conducting Routine Flight Operations When It Detected An Unmanned Aerial Vehicle: Read Full Report | Read Mideast Alerts.
Daixin Claims It Hacked The North Texas Municipal Water District, Stole Sensitive Data - The ransomware group claimed that they stole 33,844 files worth of "sensitive data" and threatened to leak the data which it says includes account numbers, and social security numbers.
TEXAS - A hacker group that calls themselves Diaxin has claimed that it hacked the government-run North Texas Municipal Water District which "provides wholesale water, wastewater, and solid waste management to 2 million people.
The ransomware group claimed that they stole 33,844 files worth of "sensitive data" and threatened to leak the data which it says includes account numbers, social security numbers, and medical information of patients. Read Report | Read Cyber/Tech Alerts.
CISA Releases Alert About Iranian-Backed Hack On Pennsylvania, USA Water Service, and Israeli Water Treatment Centers - CISA: While few details are currently known, according to open-source reporting, on Saturday the Municipal Water Authority of Aliquippa in western Pennsylvania was attacked by an Iranian-backed cyber group known as CyberAv3ngers.
The authority reported the actors were able to gain control of a remote booster station serving two townships, but stressed there is no known risk to the drinking water or water supply. Read Full Report | Read Cyber/Tech Alerts.
Not subscribed? We have two subscription platforms, one for immediate alerts and one for our more refined news and intel. We separate them as breaking alerts are dynamic and developing stories tend to change quickly as information is initially released. Upgrade your experience and get alerts first straight to your email with access to our Defcon Alerts Platform, and SJ News/Intel Platform.
Why Subscribe? Subscribers get alerts before they are posted on this website. Our alerts platform and news/intel platform include accurate alerts, intel, and news updates not included on this website sent straight to your email. They also include full conversation transcripts, official statements, exclusive research, screenshots, images, documents, videos, notes, data and more.
New updates to alerts not posted on this website may also be posted on our paid platforms. "We give straight and accurate professional-grade threat alerts, world news, and intelligence updates without the agendas, fluff, or exaggeration".
As US Government Prepares For Iranian Cyberattacks, Group Attacks Water Service In Pennsylvania, USA - The hacker group that calls themselves "CyberAv3ngers" has taken responsibility for at least 10 water treatment centers in Israel, as well as a number of other attacks globally.
ALIQUIPPA, PENNSYLVANIA - As the U.S. government prepares for Iranian cyberattacks in retaliation for its support of Israel during its conflict with the Hamas terrorist organization, the Municipal Water Authority of Aliquippa, Pennsylvania reported on Saturday that it had been targeted by an Iranian-backed hacker group called "CyberAv3ngers". Read Report | Read Cyber Alerts.
Not subscribed? We have two subscription platforms, one for immediate alerts and one for our more refined news and intel. We separate them as breaking alerts are dynamic and developing stories tend to change quickly as information is initially released. Upgrade your experience and get alerts first straight to your email with access to our Defcon Alerts Platform, and SJ News/Intel Platform.
Why Subscribe? Subscribers get alerts before they are posted on this website. Our alerts platform and news/intel platform include accurate alerts, intel, and news updates not included on this website sent straight to your email. They also include full conversation transcripts, official statements, exclusive research, screenshots, images, documents, videos, notes, data and more.
New updates to alerts not posted on this website may also be posted on our paid platforms. "We give straight and accurate professional-grade threat alerts, world news, and intelligence updates without the agendas, fluff, or exaggeration".
US, Russia, China Compete For AI Dominance, China Plans To Mass Produce Humanoid Robots By 2025 - Russia: Will soon approve AI strategy. The announcement by Russia comes as the US and China both race to implement artificial intelligence into their militaries, and information strategies.
The announcement by Russia comes as the United States and China both race to implement artificial intelligence into their own military and emerging digital information strategies, including ways to both regulate and harness the technology, with both the United States and China forming agreements with various countries on both its uses and restrictions. Russia Claims It Currently Leads Global AI Race, Says Proposals Developed For Updating National AI Strategy. US, China Race For AI Dominance: Read Report | Read Cyber Reports.
Not subscribed? We have two subscription platforms, one for immediate alerts and one for our more refined news and intel. We separate them as breaking alerts are dynamic and developing stories tend to change quickly as information is initially released. Upgrade your experience and get alerts first straight to your email with access to our Defcon Alerts Platform, and SJ News/Intel Platform.
Why Subscribe? Subscribers get alerts before they are posted on this website. Our alerts platform and news/intel platform include accurate alerts, intel, and news updates not included on this website sent straight to your email. They also include full conversation transcripts, official statements, exclusive research, screenshots, images, documents, videos, notes, data and more.
New updates to alerts not posted on this website may also be posted on our paid platforms. "We give straight and accurate professional-grade threat alerts, world news, and intelligence updates without the agendas, fluff, or exaggeration".
Ransomware Attack Hits China's ICBC Bank, Disrupts US Treasury Market - ICBC: "ICBC FS has been conducting a thorough investigation and is progressing its recovery efforts with the support of its professional team of information security experts."
ICBC - A ransomware attack hit China's largest bank disrupting US Treasury market trading. The extent of the disruption on the US Treasury market has been limited.
A notice posted on the ICBC website said, "On November 8, 2023, U.S. Eastern Time (November 9, 2023, Beijing Time), ICBC Financial Services (FS) experienced a ransomware attack that resulted in disruption to certain FS systems. Immediately upon discovering the incident, ICBC FS disconnected and isolated impacted systems to contain the incident. Read Report | Read All Reports.
Not subscribed? We have two subscription platforms, one for immediate alerts and one for our more refined news and intel. We separate them as breaking alerts are dynamic and developing stories tend to change quickly as information is initially released. Upgrade your experience and get alerts first straight to your email with access to our Defcon Alerts Platform, and SJ News/Intel Platform.
Why Subscribe? Subscribers get alerts before they are posted on this website. Our alerts platform and news/intel platform include accurate alerts, intel, and news updates not included on this website sent straight to your email. They also include full conversation transcripts, official statements, exclusive research, screenshots, images, documents, videos, notes, data and more.
New updates to alerts not posted on this website may also be posted on our paid platforms. "We give straight and accurate professional-grade threat alerts, world news, and intelligence updates without the agendas, fluff, or exaggeration".
Fifth US/South Korean Working Group Meeting on North Korean Cyber Threats - US State Department: On November 6 and 7, the United States hosted the Fifth U.S.-Republic of Korea (ROK) Working Group to counter cyber threats posed by the Democratic People’s Republic of Korea (DPRK).
Led by Deputy Special Representative for the DPRK Dr. Jung Pak and ROK Ministry of Foreign Affairs Director-General for North Korean Nuclear Affairs Lee Jun-il, the meeting underscored the close collaboration between the U.S. and ROK governments to disrupt the DPRK’s ability to generate revenue through malicious cyber activity, crypto thefts, and IT workers, which it uses to fund its unlawful WMD and ballistic missile programs.
US/South Korea Pursuing Wide Range Of Actions To Prevent And Disrupt North Korea’s Cryptocurrency Heists And Other Cyber-Enabled Revenue Generation: Read Report | Read All Reports.
Not subscribed? We have two subscription platforms, one for immediate alerts and one for our more refined news and intel. We separate them as breaking alerts are dynamic and developing stories tend to change quickly as information is initially released. Upgrade your experience and get alerts first straight to your email with access to our Defcon Alerts Platform, and SJ News/Intel Platform.
Why Subscribe? Subscribers get alerts before they are posted on this website. Our alerts platform and news/intel platform include accurate alerts, intel, and news updates not included on this website sent straight to your email. They also include full conversation transcripts, official statements, exclusive research, screenshots, images, documents, videos, notes, data and more.
New updates to alerts not posted on this website may also be posted on our paid platforms. "We give straight and accurate professional-grade threat alerts, world news, and intelligence updates without the agendas, fluff, or exaggeration".
USSCOCOM Awards Contract To Deploy AI Tool To Detect Disinformation Threats - Accrete states that Argus is capable of countering misinformation, detecting insider threats, supply chain influence, anti-money laundering, competitive intelligence, and background checking.
NEW YORK - After U.S. Special Operations Command (USSOCOM) awarded Accrete with a five-year multi-million dollar Other Transaction Production (OT-P) software licensing contract for a duel-use open-source anomaly/threat detection software called Argus in 2021, the company has now been awarded a new contract to deploy the AI detection software to detect "disinformation threats" on social media, and other online platforms.
According to Accrete, Argus is a "real-time" and "continuously learning" AI threat detection software with the ability to "learn from sparse data" and configurable to be used for social media intelligence, reverse engineering, and logistics disruption for both governmental uses, as well as commercial. What The AI Threat Detection Software Does, And Its Potential To Be Used As A Tool To Target Americans: Read Full Report.
Not subscribed? We have two subscription platforms, one for immediate alerts and one for our more refined news and intel. We separate them as breaking alerts are dynamic and developing stories tend to change quickly as information is initially released. Upgrade your experience and get alerts first straight to your email with access to our Defcon Alerts Platform, and SJ News/Intel Platform.
Why Subscribe? Subscribers get alerts before they are posted on this website. Our alerts platform and news/intel platform include accurate alerts, intel, and news updates not included on this website sent straight to your email. They also include full conversation transcripts, official statements, exclusive research, screenshots, images, documents, videos, notes, data and more.
New updates to alerts not posted on this website may also be posted on our paid platforms. "We give straight and accurate professional-grade threat alerts, world news, and intelligence updates without the agendas, fluff, or exaggeration".
Cyber Criminals Targeting Victims through Mobile Beta-Testing Applications - The malicious apps enable theft of personally identifiable information (PII), financial account access, or device takeover.
Federal Bureau of Investigation (FBI): The FBI is warning the public that cybercriminals are embedding malicious code in mobile beta-testing applications (apps) to defraud potential victims.
Beta-testing apps are online services for testing of mobile apps prior to official release. The beta apps typically are not subject to mobile operating systems review processes.
Apps Enable Theft Of Personal Information, Financial Account Access, Device Takeover: The malicious apps enable theft of personally identifiable information (PII), financial account access, or device takeover. The apps may appear legitimate by using names, images, or descriptions similar to popular apps. Read Full Statement.
Not subscribed? We have two subscription platforms, one for immediate alerts and one for our more refined news and intel. We separate them as breaking alerts are dynamic and developing stories tend to change quickly as information is initially released. Upgrade your experience and get alerts first straight to your email with access to our Defcon Alerts Platform, and SJ News/Intel Platform.
Why Subscribe? Subscribers get alerts before they are posted on this website. Our alerts platform and news/intel platform include accurate alerts, intel, and news updates not included on this website sent straight to your email. They also include full conversation transcripts, official statements, exclusive research, screenshots, images, documents, videos, notes, data and more.
New updates to alerts not posted on this website may also be posted on our paid platforms. "We give straight and accurate professional-grade threat alerts, world news, and intelligence updates without the agendas, fluff, or exaggeration".
Cyber Criminals Targeting Victims through Mobile Beta-Testing Applications - The malicious apps enable theft of personally identifiable information (PII), financial account access, or device takeover.
Federal Bureau of Investigation (FBI): The FBI is warning the public that cybercriminals are embedding malicious code in mobile beta-testing applications (apps) to defraud potential victims.
Beta-testing apps are online services for testing of mobile apps prior to official release. The beta apps typically are not subject to mobile operating systems review processes.
Apps Enable Theft Of Personal Information, Financial Account Access, Device Takeover: The malicious apps enable theft of personally identifiable information (PII), financial account access, or device takeover. The apps may appear legitimate by using names, images, or descriptions similar to popular apps.
Cybercriminals often use phishing or romance scams to establish communications with the victim, then direct the victim to download a mobile beta-testing app housed within a mobile beta-testing app environment, promising incentives such as large financial payouts. Read Full Report
Not subscribed? We have two subscription platforms, one for immediate alerts and one for our more refined news and intel. We separate them as breaking alerts are dynamic and developing stories tend to change quickly as information is initially released. Upgrade your experience and get alerts first straight to your email with access to our Defcon Alerts Platform, and SJ News/Intel Platform.
Why Subscribe? Subscribers get alerts before they are posted on this website. Our alerts platform and news/intel platform include accurate alerts, intel, and news updates not included on this website sent straight to your email. They also include full conversation transcripts, official statements, exclusive research, screenshots, images, documents, videos, notes, data and more.
New updates to alerts not posted on this website may also be posted on our paid platforms. "We give straight and accurate professional-grade threat alerts, world news, and intelligence updates without the agendas, fluff, or exaggeration".
Milestone In Power Grid Optimization On World’s First Exascale Supercomputer - Lawrence Livermore National Laboratory (LLNL): In the largest simulation of its kind to date, Oak Ridge Lab's Frontier allowed researchers to determine safe and cost-optimal power grid setpoints over 100,000 possible grid failures and weather scenarios in just 20 minutes.
Ensuring the nation’s electrical power grid can function with limited disruptions in the event of a natural disaster, catastrophic weather or a manmade attack is a key national security challenge.
Compounding the challenge of grid management is the increasing amount of renewable energy sources such as solar and wind that are continually added to the grid, and the fact that solar panels and other means of distributed power generation are hidden to grid operators.
To advance the modeling and computational techniques needed to develop more efficient grid-control strategies under emergency scenarios, a multi-institutional team has used a Lawrence Livermore National Laboratory (LLNL)-developed software capable of optimizing the grid’s response to potential disruption events under different weather scenarios, on Oak Ridge National Laboratory (ORNL)’s Frontier supercomputer.
Reaching A Milestone: Exascale Speeds Of More Than One Quintilian Calculations Per Second: Read Full Report.
Not subscribed? We have two subscription platforms, one for immediate alerts and one for our more refined news and intel. We separate them as breaking alerts are dynamic and developing stories tend to change quickly as information is initially released. Upgrade your experience and get alerts first straight to your email with access to our Defcon Alerts Platform, and SJ News/Intel Platform.
Why Subscribe? Subscribers get alerts before they are posted on this website. Our alerts platform and news/intel platform include accurate alerts, intel, and news updates not included on this website sent straight to your email. They also include full conversation transcripts, official statements, exclusive research, screenshots, images, documents, videos, notes, data and more.
New updates to alerts not posted on this website may also be posted on our paid platforms. "We give straight and accurate professional-grade threat alerts, world news, and intelligence updates without the agendas, fluff, or exaggeration".
DOD Announces Establishment Of Generative Artificial Intelligence (AI) Task Force - "We must also consider the extent to which our adversaries will employ this technology and seek to disrupt our own use of AI-based solutions".
Department of Defense: Today, the Department of Defense (DoD) announced the establishment of a generative artificial intelligence (AI) task force, an initiative that reflects the DoD's commitment to harnessing the power of artificial intelligence in a responsible and strategic manner. Read More.
Not subscribed? We have two subscription platforms, one for immediate alerts and one for our more refined news and intel. We separate them as breaking alerts are dynamic and developing stories tend to change quickly as information is initially released. Upgrade your experience and get alerts first straight to your email with access to our Defcon Alerts Platform, and SJ News/Intel Platform.
Why Subscribe? Subscribers get alerts before they are posted on this website. Our alerts platform and news/intel platform include accurate alerts, intel, and news updates not included on this website sent straight to your email. They also include full conversation transcripts, official statements, exclusive research, screenshots, images, documents, videos, notes, data and more.
New updates to alerts not posted on this website may also be posted on our paid platforms. "We give straight and accurate professional-grade threat alerts, world news, and intelligence updates without the agendas, fluff, or exaggeration".
Cyberattack Hits Medical Facilities In Multiple US States - UNITED STATES - A cyberattack hit over a hundred medical facilities in five different U.S. states Friday, including sixteen hospitals, forcing them to close down emergency rooms and redirect ambulances.
After ransomware was found on the computer systems of Prospect Medical Holdings, which is a company that owns hospitals and at least 165 outpatient facilities in Connecticut, California, Pennsylvania, and Rhode Island, the company chose to take its national computer system offline on Tuesday according to Nina Kruse, who is a spokesperson for Eastern Connecticut Health Network, owned by Prospect.
Kruse said that as a result of the cyberattack, the hospitals have had to go back to using old-fashioned ways of record keeping, such as using pen and paper instead of computers to input and store information on patients. Read More
Not subscribed? We have two subscription platforms, one for immediate alerts and one for our more refined news and intel. We separate them as breaking alerts are dynamic and developing stories tend to change quickly as information is initially released. Upgrade your experience and get alerts first straight to your email with access to our Defcon Alerts Platform, and SJ News/Intel Platform.
Why Subscribe? Subscribers get alerts before they are posted on this website. Our alerts platform and news/intel platform include accurate alerts, intel, and news updates not included on this website sent straight to your email. They also include full conversation transcripts, official statements, exclusive research, screenshots, images, documents, videos, notes, data and more.
New updates to alerts not posted on this website may also be posted on our paid platforms. "We give straight and accurate professional-grade threat alerts, world news, and intelligence updates without the agendas, fluff, or exaggeration".
Increased Truebot Activity Infects U.S. and Canada Based Networks - Truebot is a botnet that has been used by malicious cyber groups like CL0P Ransomware Gang to collect and exfiltrate information from its target victims.. Read More On Patreon | Read On Defcon Alerts.
CISA/FBI/MS-ISAC/CCCS - The Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), the Multi-State Information Sharing and Analysis Center (MS-ISAC), and the Canadian Center for Cyber Security (CCCS) are releasing this joint Cybersecurity Advisory (CSA) in response to cyber threat actors leveraging newly identified Truebot malware variants against organizations in the United States and Canada.
Not subscribed? We have two subscription platforms, one for immediate alerts and one for our more refined news and intel. We separate them as breaking alerts are dynamic and developing stories tend to change quickly as information is initially released. Upgrade your experience and get alerts first straight to your email with access to our Defcon Alerts Platform, and SJ News/Intel Platform.
Why Subscribe? Subscribers get alerts before they are posted on this website. Our alerts platform and news/intel platform include accurate alerts, intel, and news updates not included on this website sent straight to your email. They also include full conversation transcripts, official statements, exclusive research, screenshots, images, documents, videos, notes, data and more.
New updates to alerts not posted on this website may also be posted on our paid platforms. "We give straight and accurate professional-grade threat alerts, world news, and intelligence updates without the agendas, fluff, or exaggeration".
Threat Actors Exploit Progress Telerik Vulnerabilities in Multiple U.S. Government IIS Servers - Cybersecurity and Infrastructure Security Agency (CISA) Joint Cybersecurity Advisory: "From November 2022 through early January 2023, the Cybersecurity and Infrastructure Security Agency (CISA) and authoring organizations identified the presence of indicators of compromise (IOCs) at a federal civilian executive branch (FCEB) agency. Read More On Patreon | Read More On Defcon Alerts.
Analysts determined that multiple cyber threat actors, including an advanced persistent threat (APT) actor, were able to exploit a .NET deserialization vulnerability (CVE-2019-18935) in Progress Telerik user interface (UI) for ASP.NET AJAX, located in the agency’s Microsoft Internet Information Services (IIS) web server.
Successful exploitation of this vulnerability allows for remote code execution. According to Progress Software, Telerik UI for ASP.NET AJAX builds before R1 2020 (2020.1.114) are vulnerable to this exploit.
Update June 15, 2023:
As of April 2023, forensic analysis conducted at an additional FCEB agency identified exploitation of CVE-2017-9248 in the agency’s IIS server by unattributed APT actors—specifically within the Telerik UI for ASP.NET AJAX DialogHandler component. This specific analysis is provided as context for existing vulnerabilities within Telerik UI for ASP.NET AJAX.
Actions to take today to mitigate malicious cyber activity: Implement a patch management solution to ensure compliance with the latest security patches. Validate output from patch management and vulnerability scanning against running services to check for discrepancies and account for all services. Limit service accounts to the minimum permissions necessary to run services.
CISA, the Federal Bureau of Investigation (FBI), and the Multi-State Information Sharing and Analysis Center (MS-ISAC) are releasing this joint Cybersecurity Advisory (CSA) to provide IT infrastructure defenders with tactics, techniques, and procedures (TTPs), IOCs, and methods to detect and protect against similar exploitation.
Not subscribed? We have two subscription platforms, one for immediate alerts and one for our more refined news and intel. We separate them as breaking alerts are dynamic and developing stories tend to change quickly as information is initially released. Upgrade your experience and get alerts first straight to your email with access to our Defcon Alerts Platform, and SJ News/Intel Platform.
Why Subscribe? Subscribers get alerts before they are posted on this website. Our alerts platform and news/intel platform include accurate alerts, intel, and news updates not included on this website sent straight to your email. They also include full conversation transcripts, official statements, exclusive research, screenshots, images, documents, videos, notes, data and more.
New updates to alerts not posted on this website may also be posted on our paid platforms. "We give straight and accurate professional-grade threat alerts, world news, and intelligence updates without the agendas, fluff, or exaggeration".
North Korea Using Social Engineering to Enable Hacking of Think Tanks, Academia, and Media - FBI - "The FBI released a joint CSA with our USG and South Korean partners detailing the operations of Kimsuky cyber actors, a subset of DPRK cyber actors. It outlines warning signs of spearphishing campaigns". Read Full Advisory PDF Document
"North Korean cyber actors are known to conduct spearphishing campaigns posing as real journalists, academics, or other individuals with credible links to North Korean policy circles".
"The Federal Bureau of Investigation (FBI), the U.S. Department of State, and the National Security Agency (NSA), together with the Republic of Korea’s National Intelligence Service (NIS), National Police Agency (NPA), and the Ministry of Foreign Affairs (MOFA), are jointly issuing this advisory to highlight the use of social engineering by the Democratic People’s Republic of Korea (DPRK a.k.a. North Korea) state-sponsored cyber actors to enable computer network exploitation (CNE) globally against individuals employed by research centers and think tanks, academic institutions, and news media organizations.
These North Korean cyber actors are known to conduct spearphishing campaigns posing as real journalists, academics, or other individuals with credible links to North Korean policy circles.
The DPRK employs social engineering to collect intelligence on geopolitical events, foreign policy strategies, and diplomatic efforts affecting its interests by gaining illicit access to the private documents, research, and communications of their targets".
Not subscribed? We have two subscription platforms, one for immediate alerts and one for our more refined news and intel. We separate them as breaking alerts are dynamic and developing stories tend to change quickly as information is initially released. Upgrade your experience and get alerts first straight to your email with access to our Defcon Alerts Platform, and SJ News/Intel Platform.
Why Subscribe? Subscribers get alerts before they are posted on this website. Our alerts platform and news/intel platform include accurate alerts, intel, and news updates not included on this website sent straight to your email. They also include full conversation transcripts, official statements, exclusive research, screenshots, images, documents, videos, notes, data and more.
New updates to alerts not posted on this website may also be posted on our paid platforms. "We give straight and accurate professional-grade threat alerts, world news, and intelligence updates without the agendas, fluff, or exaggeration".
Chinese "Web Shell" Malware From "Volt Typhoon" Hacker Group Detected In US Infrastructure In Guam And US - GUAM/US - A Chinese hacker group named "Volt Typhoon" injected malware code into telecommunications infrastructure in Guam and other locations within the United States. Read On Patreon | Read On Substack
Volt Typhoon targeted organizations involved in: communications, manufacturing, utility, transportation, construction, maritime, government, information technology, as well as education.
Not subscribed? We have two subscription platforms, one for immediate alerts and one for our more refined news and intel. We separate them as breaking alerts are dynamic and developing stories tend to change quickly as information is initially released. Upgrade your experience and get alerts first straight to your email with access to our Defcon Alerts Platform, and SJ News/Intel Platform.
Why Subscribe? Subscribers get alerts before they are posted on this website. Our alerts platform and news/intel platform include accurate alerts, intel, and news updates not included on this website sent straight to your email. They also include full conversation transcripts, official statements, exclusive research, screenshots, images, documents, videos, notes, data and more.
New updates to alerts not posted on this website may also be posted on our paid platforms. "We give straight and accurate professional-grade threat alerts, world news, and intelligence updates without the agendas, fluff, or exaggeration".
Fake Nuclear Strike Alert Went Out To Russians - There is a seemingly fake nuclear alert that went out alerting Russians about a nuclear strike. The alert looks to be a cyber-attack. The graphics are sleek, meant for visual effects, and have fabricated distortion. This is not something you'd likely find in a legitimate broadcast. See All Alerts
UPDATE - Russian Interfax has confirmed it was a "false air raid warning" due to "server hacking". The fake alert told Russians to take anti-radiation (potassium iodide) pills and head to the nearest bomb shelter.
The Russian Emergencies Ministry said that the message was due to a false alarm as a result of a cyberattack. This is the third cyberattack on Russian stations in the past month, but it is the first that gave instructions to Russians to take anti-radiation pills.
Not subscribed? We have two subscription platforms, one for immediate alerts and one for our more refined news and intel. We separate them as breaking alerts are dynamic and developing stories tend to change quickly as information is initially released. Upgrade your experience and get alerts first straight to your email with access to our Defcon Alerts Platform, and SJ News/Intel Platform.
Why Subscribe? Subscribers get alerts before they are posted on this website. Our alerts platform and news/intel platform include accurate alerts, intel, and news updates not included on this website sent straight to your email. They also include full conversation transcripts, official statements, exclusive research, screenshots, images, documents, videos, notes, data and more.
New updates to alerts not posted on this website may also be posted on our paid platforms. "We give straight and accurate professional-grade threat alerts, world news, and intelligence updates without the agendas, fluff, or exaggeration".