espionage

  1. Midnight Blizzard's Spear-Phishing: RDP Threats Targeting Governments and NGOs

    The digital landscape is becoming increasingly treacherous as threat actors evolve their tactics. One of the most prominent players in this game, the Russian hacking group known as Midnight Blizzard (also referred to as NOBELIUM), has recently embarked on a large-scale spear-phishing campaign...
  2. APT34 Espionage Intensifies: Iranian Threat Group Targets UAE Government

    In an alarming development, it has been reported that an Iranian threat group known as APT34 is intensifying its espionage activities targeting Gulf state government entities, particularly those in the United Arab Emirates (UAE). This group, which has connections to the Iranian Ministry of...
  3. VIDEO Why There's a CIA Base in the Center of Australia

    :iee:
  4. AA20-301A: North Korean Advanced Persistent Threat Focus: Kimsuky

    Original release date: October 27, 2020 Summary This advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) version 7 framework. See the ATT&CK for Enterprise version 7 for all referenced threat actor tactics and techniques. This joint cybersecurity advisory...
  5. AA20-275A: Potential for China Cyber Response to Heightened U.S.–China Tensions

    Original release date: October 1, 2020 Summary This Alert uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework. See the ATT&CK for Enterprise framework for all referenced threat actor techniques. In light of heightened tensions between the United States and...
  6. AA20-106A: Guidance on the North Korean Cyber Threat

    Original release date: April 15, 2020 | Last revised: June 23, 2020 Summary The U.S. Departments of State, the Treasury, and Homeland Security, and the Federal Bureau of Investigation are issuing this advisory as a comprehensive resource on the North Korean cyber threat for the international...
  7. AA20-106A: Guidance on the North Korean Cyber Threat

    Original release date: April 14, 2020 | Last revised: April 15, 2020 Summary The U.S. Departments of State, the Treasury, and Homeland Security, and the Federal Bureau of Investigation are issuing this advisory as a comprehensive resource on the North Korean cyber threat for the international...
  8. VIDEO Chris Cuomo to John Yoo : How is that espionage ?

    Sent from my 8063 using Tapatalk
  9. VIDEO U.S. Military & Intelligence Officials Keeping Ops Hidden From Donald Trump For Fear He'll Talk!

    🇺🇸 :shocked:
  10. Why I have never nor will I ever purchase something from Huawei

    For one they are a Chinese company and Chinese and tech you're just asking for data theft and espionage . Indictment coverage https://www.cnn.com/2019/01/29/tech/us-indictment-huawei-takeaways/index.html Actual DOJ Indictment Link Removed
  11. VIDEO Detained American's twin denies espionage claims

    :usa::eek:
  12. TA18-106A: Russian State-Sponsored Cyber Actors Targeting Network Infrastructure Devices

    Original release date: April 16, 2018 Systems Affected Generic Routing Encapsulation (GRE) Enabled Devices Cisco Smart Install (SMI) Enabled Devices Simple Network Management Protocol (SNMP) Enabled Network Devices Overview This joint Technical Alert (TA) is the result of analytic efforts...
  13. VIDEO Rosenstein: Russians paid off, recruited Americans

    :usa::eek:
  14. NEWS Russia organized 2 sides of a Texas protest and encouraged 'both sides to battle in the streets'

    Russian trolls organized a protest and a counterprotest in the same place at the same time in May 2016, the chairman of the Senate Intelligence Committee, Sen. Richard Burr, said on Wednesday. The revelation shows how far Russia was willing to go to foment unrest and division in the US in the...
  15. VIDEO Intel Officer: What Jared Kushner Did Could Be Considered Espionage

    :usa::eek:
  16. VIDEO Israel and the United States have emerged as the prime suspects behind the Stuxnet worm attack

    Confirmed: US and Israel created Stuxnet, lost control of it . Stuxnet was never meant to propagate in the wild. In 2011, the US government rolled out its "International Strategy for Cyberspace," which reminded us that "interconnected networks link nations more closely, so an attack on one...
  17. Who Is Killing Iran's Nuclear Scientists?

    Regardless of who is killing Iran's nuclear scientists -- the Israelis, the Americans or the Iranians themselves -- there's no question that researchers and officials linked to Iran's alleged nuclear weapons program keep turning up dead Read Full Story: Who Is Killing Iran's Nuclear...
  18. Any avid readers here?

    Just looking for anyone who would like to share some information regarding recent or maybe old favorite books or authors that they enjoyed and might consider recommending. I don't really want to limit the scope of this thread but my particular interests lie mostly along the mystery, thriller...
  19. Spies, Lies and Damned Help Desks

    By now everyone has heard about the alleged secret agents arrested in the USA. If you haven't had a chance to read the criminal complaint against them, you're missing out on some interesting revelations. Revelation 1: Mission Completely Possible Unlike James Bond (or, heck. Austin Powers)...
  20. B

    Windows XP Best Software to Monitor Your Child's Internet Activities Safely

    hey, im not trying to be a hacker or spy on someone. i'm just worried about my son who just recently has been getting packages through the mail and im pretty sure its linked to how he's getting ahold of the things he is.. such as brass knuckles and throwing knives. i just want to know the best...