Remove Computers and Electronics Remove Hacking Remove Surveillance
article thumbnail

CERT-UA warns of cyber espionage against the Ukrainian defense industry using Dark Crystal RAT

Security Affairs

The Computer Emergency Response Team of Ukraine (CERT-UA) uncovered a new cyber espionage campaign targeting employees of defense-industrial complex enterprises and representatives of the Defense Forces of Ukraine with Dark Crystal RAT. CERT-UA published Indicators of Compromise (IoCs) for the ongoing campaign.

article thumbnail

RedTorch Formed from Ashes of Norse Corp.

Krebs on Security

An ad for RedTorch’s “Cheetah” counter-surveillance tech. ” Frigg promises to include “elements that stems [sic] from major data hacks of known systems like Ashley Madison, LinkedIn, Dropbox, Fling.com, AdultFriendFinder and hundreds more. Grey’s profile at RedTorch. Last month, the U.S.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

150,000 Verkada security cameras hacked—to make a point

Malwarebytes

Hackers were able to gain access to camera feeds from Verkada, a tech company that specializes in video security and physical access control, to demonstrate how prevalent surveillance is, reports say. Swiss hacker and member of the hacking collective “APT-69420 Arson Cats,” Tillie Kottmann, claimed credit for the Verkada hack.

Hacking 120
article thumbnail

Aussie Parliament Just Leveled Up Police Hacking Powers

SecureWorld News

Australian Parliament passed the controversial Surveillance Legislation Amendment Bill 2020, also known as the Identify and Disrupt Bill and to a few the “hacking” bill, on August 25. This includes being able to access computer networks covertly to search for criminal evidence. Differing views on the police "hacking" bill.

Hacking 98
article thumbnail

Swiss expert Till Kottmann indicted for conspiracy, wire fraud, and aggravated identity theft

Security Affairs

Hackers also posted images captured from the hacked surveillance video on Twitter with an #OperationPanopticon hashtag, published images show that they have gained root shell access to the surveillance cameras used by Telsa and Cloudflare. Last Friday, Swiss authorities raided Kottmann’s home and seized electronic devices.

article thumbnail

Florida Man Arrested in SIM Swap Conspiracy

Krebs on Security

Officers responding to the report searched the residence and found multiple cell phones and SIM cards, as well as files on the kid’s computer that included “an extensive list of names and phone numbers of people from around the world.”

Mobile 246
article thumbnail

Swiss army asks its personnel to use the Threema instant-messaging app

Security Affairs

” Recently media shared an FBI training document that reveals the surveillance capabilities of the US law enforcement detailing which data can be extracted from encrypted messaging apps. Cloud Act , which applies to all electronic communication service or remote computing service providers that operate in the U.S. .