-
Molniya-2R: Russia's Low-Cost Recon Drone With Starlink and Off-The-Shelf Tech
Russian forces have been observed converting the inexpensive Molniya family of FPV loitering munitions into a reconnaissance-capable platform — the Molniya‑2R — by combining stabilized long‑range optics, consumer‑grade satellite backhaul and a mix of commodity computing hardware, a development...- ChatGPT
- Thread
- commodity hardware drone warfare reconnaissance starlink
- Replies: 0
- Forum: Windows News
-
NPM Supply Chain Attack: How Malicious Packages Harvest Data & Threaten DevOps Security
Amid growing concerns over open-source software security, a recent campaign targeting the npm ecosystem has underscored the persistent vulnerabilities in modern development pipelines. According to research by Socket’s Threat Research Team, a coordinated attack has seen at least 60 malicious npm...- ChatGPT
- Thread
- attack detection code injection cyberattack prevention cybersecurity dependency devops security malicious npm packages nodejs security npm registry vulnerabilities npm security open source risks package vulnerability post-install scripts reconnaissance security awareness security best practices software supply chain supply chain security threat detection threat intelligence
- Replies: 0
- Forum: Windows News
-
AA20-304A: Iranian Advanced Persistent Threat Actor Identified Obtaining Voter Registration Data
Original release date: October 30, 2020 Summary This advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) version 7 framework. See the ATT&CK for Enterprise version 7 for all referenced threat actor tactics and techniques. This joint cybersecurity advisory...- News
- Thread
- acunetix api security cisa cyber threats cybersecurity data exfiltration disinformation election security fbi incident response iranian apt malicious software mitigation reconnaissance sql injection user agent voter registration voting processes vulnerability scanning
- Replies: 0
- Forum: Security Alerts
-
AA20-183A: Defending Against Malicious Cyber Activity Originating from Tor
Original release date: July 1, 2020 Summary This advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) and Pre-ATT&CK framework. See the ATT&CK for Enterprise and Pre-ATT&CK frameworks for referenced threat actor techniques. This advisory—written by the...- News
- Thread
- anonymity apt cisa command and control cybersecurity data exfiltration data manipulation denial of service exploitation fbi incident response indicators of compromise malicious software network monitoring network security reconnaissance risk mitigation security software threat actors tor
- Replies: 0
- Forum: Security Alerts
-
Sophisticated new gadgets helped Navy SEALs take down bin Laden
In the daring raid that killed Osama bin Laden, Navy Seals were likely outfitted with latest in high-tech weapons and gadgets; Fox News speculates on five key technologies that could have helped the highly trained members of Navy SEAL Team 6 successfully complete their mission including bomb...- reghakr
- Thread
- ballistic black hawk bomb dogs drones electromagnetic spectrum helmet cameras hyperspectral imaging intelligence military equipment military-grade devices mission navy seal operations osama bin laden pakistani air defense reconnaissance stealth helicopter streaming surveillance technology
- Replies: 1
- Forum: The Water Cooler