Articles tagged with "cybersecurity"
Ukrainian hackers claim to have destroyed servers of Russian drone maker
Ukrainian hacktivist group BO Team, in collaboration with the Ukrainian Cyber Alliance and Ukraine’s military intelligence, claimed to have successfully hacked into and disrupted the network of the Russian drone manufacturer Gaskar Group. According to their announcement, the cyberattack involved seizing the entire network and server infrastructure, collecting sensitive information on current and future unmanned aerial vehicles (UAVs), and subsequently destroying data and disabling the company’s systems. The group reported destroying over 250 systems, including 46 virtual servers and more than 200 workstations, while wiping 47 terabytes of company data and 10 terabytes of backups. Additionally, the hackers stated they stole personal data of Gaskar Group employees, such as home addresses and family information. This attack is significant given the extensive use of drones by both Ukrainian and Russian forces since the full-scale invasion of Ukraine in 2022, highlighting the strategic importance of drone technology in the conflict. Gaskar Group had not responded to requests for comment
robotdronescybersecurityunmanned-aerial-vehiclesmilitary-technologycyberattackhackingNew ultra-secure SSD can self-destruct to protect sensitive data
Taiwanese company TeamGroup has introduced the P250Q-M80, a new internal SSD designed for ultra-secure data protection by featuring a self-destruction mechanism. Targeted at sectors such as defense, industrial automation, AI development, and cryptocurrency storage, this drive can erase sensitive data either through a software-level wipe or a hardware-level kill switch. The software wipe can be interrupted and resumed automatically, while the hardware kill switch, activated by holding an external red button for 5 to 10 seconds, sends a high-voltage surge to physically destroy the NAND flash chips, rendering the drive permanently unusable and data irrecoverable. This irreversible destruction can also be triggered remotely via a wired external button, making it suitable for high-risk environments requiring immediate data elimination. Beyond its security features, the P250Q-M80 offers robust performance and durability. It uses a PCIe Gen4x4 interface with NVMe 1.4 protocol, delivering read speeds up to 7,000
materialsdata-storageSSDcybersecurityindustrial-automationNAND-flashPCIe-Gen4Jack Dorsey says his ‘secure’ new Bitchat app has not been tested for security
Block CEO and Twitter co-founder Jack Dorsey recently launched Bitchat, a decentralized messaging app that uses Bluetooth and end-to-end encryption, aiming to provide secure communication in environments where internet access is restricted or monitored. Dorsey emphasized that Bitchat’s design prioritizes security, but he has openly admitted that the app has not undergone any external security reviews or testing. A disclaimer was added to Bitchat’s GitHub page warning users not to rely on the app’s security or use it for production until it has been properly vetted. Security researchers quickly identified significant vulnerabilities in Bitchat. Notably, Alex Rodocea discovered a critical flaw in the app’s identity authentication system, allowing attackers to impersonate contacts by intercepting digital identity keys, undermining the app’s core security feature of verifying trusted contacts (“Favorites”). Additionally, another potential buffer overflow vulnerability was reported, which could lead to data compromises. Rodocea cautioned that users should not trust Bitchat’s security
IoTBluetoothsecure-messagingdecentralized-append-to-end-encryptioncybersecuritydigital-identityThe EU Proposes New Rules to Govern the European Space Race
The European Commission has proposed new legislation, dubbed the EU Space Act, to address the fragmented and nationally varied space regulations within the eurozone. With an estimated 11,000 satellites currently orbiting Earth and projections of at least 50,000 more launches in the next decade, the Commission aims to streamline regulatory procedures, protect assets in orbit, and foster a level playing field for European companies. The regulation focuses on three pillars: safety—by improving tracking of space debris and ensuring satellite disposal; resilience—by mandating risk assessments and cybersecurity standards for space operators; and sustainability—by establishing standards to manage resources, emissions, and waste from space activities. Recognizing the significant costs compliance may impose on the industry, the Commission plans support measures to assist particularly startups and SMEs, including enhanced technical capabilities, access to testing facilities, and help with authorization processes. The broader strategy to boost Europe’s space economy includes over 40 actions to strengthen the bloc’s global market participation, autonomy, and technological edge.
IoTsatellite-technologyspace-regulationcybersecurityspace-debris-managementsustainabilityEuropean-space-economyAI can see whatever you want with US engineers' new attack technique
US engineers have developed a novel attack technique called RisingAttacK that can manipulate AI computer vision systems to control what the AI "sees." This method targets widely used vision models in applications such as autonomous vehicles, healthcare, and security, where AI accuracy is critical for safety. RisingAttacK works by identifying key visual features in an image and making minimal, targeted changes to those features, causing the AI to misinterpret or fail to detect objects that remain clearly visible to humans. For example, an AI might recognize a car in one image but fail to do so in a nearly identical altered image. The researchers tested RisingAttacK against four popular vision AI models—ResNet-50, DenseNet-121, ViTB, and DEiT-B—and found it effective in manipulating all of them. The technique highlights vulnerabilities in deep neural networks, particularly in the context of adversarial attacks where input data is subtly altered to deceive AI systems. The team is now exploring the applicability of this
robotAI-securityautonomous-vehiclescomputer-visionadversarial-attacksartificial-intelligencecybersecurityPro-Israel hacktivist group claims responsibility for alleged Iranian bank hack
The pro-Israel hacktivist group Predatory Sparrow (also known as Gonjeshke Darande) claimed responsibility for a cyberattack that allegedly targeted and disrupted Iran’s Bank Sepah. The group stated on social media platform X that they destroyed data belonging to Bank Sepah, which they accuse of helping the Islamic Revolutionary Guard Corps (IRGC) circumvent international sanctions and finance Iran’s ballistic missile, nuclear, and proxy activities. Reports from Iran International indicated widespread banking disruptions, including branch closures and customers being unable to access accounts, with images circulating of ATMs displaying error messages. However, TechCrunch was unable to independently verify the attack, and Bank Sepah and its affiliates did not respond to requests for comment. This alleged cyberattack occurs amid escalating hostilities between Israel and Iran, following Israeli strikes on Iranian nuclear and military sites. Predatory Sparrow is believed to be a pro-Israel or anti-Iran hacktivist group with a history of targeting Iranian infrastructure, including steel plants
energycybersecuritycyberattackhacktivistIrannuclear-energyindustrial-disruptionPro-Israel hacktivist group claims reponsibility for alleged Iranian bank hack
The pro-Israel hacktivist group Predatory Sparrow, also known by its Persian name Gonjeshke Darande, claimed responsibility for a cyberattack that allegedly targeted and disrupted Iran’s Bank Sepah. The group stated that their attack destroyed data belonging to Bank Sepah, which they accused of helping the Islamic Revolutionary Guard Corps (IRGC) circumvent international sanctions and finance Iran’s terrorist proxies, ballistic missile program, and military nuclear efforts. Following the claim, reports emerged of widespread banking disruptions in Iran, including closed Bank Sepah branches and customers being unable to access their accounts, with ATMs reportedly displaying error messages. However, independent verification of the cyberattack remains unavailable, and attempts to contact Bank Sepah and Predatory Sparrow for confirmation were unsuccessful. This alleged cyberattack occurs amid escalating hostilities between Israel and Iran, with both countries reportedly conducting strikes against each other’s military and nuclear infrastructure. While the exact identity of Predatory Sparrow remains unclear, cybersecurity experts consider the group credible based
energycybersecuritycyberattacknuclear-energyindustrial-disruptionhacktivismIranRadio trick turns laptop into a spy speaker that talks through walls
Security researchers from the University of Florida and the University of Electro-Communications in Japan have uncovered a novel vulnerability in modern digital microphones used in laptops and speakers. These MEMS microphones convert audio into digital pulses that inadvertently emit weak electromagnetic signals, which can be intercepted remotely using inexpensive FM radio receivers and antennas. This allows attackers to eavesdrop on private conversations without needing malware, hacking, or physical access, even through concrete walls up to 10 inches thick. Laptops are particularly vulnerable due to their internal microphone wiring acting as antennas that amplify these leaked signals. Alarmingly, the microphone does not need to be actively recording; simply running certain applications like Spotify or Google Drive can enable this leakage. The researchers demonstrated the attack by capturing distorted voice transmissions and then enhancing them using AI speech-to-text tools from OpenAI and Microsoft. The AI models achieved 94.2% accuracy in recognizing spoken digits from up to 2 meters away through walls, with a 14% transcription error rate, making most
IoTcybersecurityelectromagnetic-signalsMEMS-microphoneswireless-eavesdroppingAI-speech-to-textdigital-privacyTrump administration takes aim at Biden and Obama cybersecurity rules
The Trump administration has issued an executive order that significantly revises and rolls back several cybersecurity policies established by former Presidents Barack Obama and Joe Biden. The administration criticized Biden’s recent cybersecurity order, particularly opposing its encouragement for agencies to accept digital identity documents for public benefit programs, citing concerns about potential abuse by illegal immigrants. Experts like Mark Montgomery argue that revoking digital ID mandates prioritizes immigration concerns over cybersecurity benefits. The new order also shifts the federal AI cybersecurity strategy to focus on identifying and managing vulnerabilities rather than censorship, promotes AI use in defending energy infrastructure and Pentagon cybersecurity, and supports federal AI security research. Additionally, the order removes previous requirements for agencies to adopt quantum-resistant encryption promptly and eliminates mandates for federal contractors to attest to software security, labeling these as burdensome and ineffective compliance measures. It also repeals Obama-era policies that allowed sanctions for cybersecurity attacks, restricting sanctions only to foreign malicious actors to avoid misuse against domestic political opponents and clarify that election-related activities are exempt. Overall, the Trump administration’s changes reflect a move away from some compliance-heavy and expansive cybersecurity measures toward a narrower, security-focused approach with an emphasis on AI and foreign threats.
energycybersecurityAI-securityquantum-resistant-encryptionfederal-researchenergy-infrastructurecybersecurity-policyUS shows world-first quantum communication in live nuclear reactor
energyquantum-communicationnuclear-reactorcybersecuritydigital-transformationquantum-encryptionclean-energyBrain-like thinking AI chip with 100x less energy use developed
energyAI-chipneuromorphic-computingenergy-efficiencycybersecurityon-device-processingpattern-recognitionApple notifies new victims of spyware attacks across the world
Applespywarecybersecuritygovernment-surveillanceprivacytech-newsnotificationsUK retail giant Co-op warns of disruption as it battles cyberattack
Co-opcyberattackUK-retaildisruptioncybersecurityfood-retailCo-operative-GroupGovernment hackers are leading the use of attributed zero-days, Google says
government-hackerszero-day-exploitscyberattackscybersecurityGoogle-researchattributed-exploitsthreat-intelligenceCitizen Lab say exiled Uyghur leaders targeted with Windows spyware
UyghursspywarecybersecurityChinahuman-rightsdigital-surveillanceexiled-leadersMeet the companies racing to build quantum chips
quantum-computingquantum-chipstech-startupstechnology-innovationqubitscybersecuritymaterials-science