Tumgik
#cyberwarfare
disk28 · 1 day
Text
Tumblr media
3 notes · View notes
mixtapenempire · 14 days
Text
Normally I don't make posts like these but this is serious.
Following the wake of the historic ban of Tik Tok from the United States that once out president signs the company has 6 months to make a choice.
I urge you guys to consider why they're banning tik tok as lately I've seen many people begged the protest the bill. I don't think people understand exactly why it was banned or just haven't been listening to proper experts
https://youtube.com/shorts/k6smfruHDNs?si=-RfA90O1HQrF3Om6
This is a Ryan Mcbeth video who has 3 degrees one being in cyberspace. He tracks and hunts down sources of disinformation from what he has learned in his previous military and non military background.
For those wondering why, tik tok is part of cyberspace, and there is a thing called cyberwarfare where countries can spy into the population of a country and steal their data, or worse, manipulate people via fear to do what they want.
China is planning to do just that with Tik Tok, and we have know it was a way for them to spy on us since 2021 but people seem to be mad because we are only now just taking action.
If you family or friends have tik tok, delete it. I understand many people rely on it for income or an escape, but there are many other sites that can help with that and I'm sure someone out there has a list, if you are said person please reblog with that list or hell send me a dm if you want to be kept private and I'll share it for you.
Do not let China win.
2 notes · View notes
tomorrowusa · 2 years
Link
Russian trolls are trying to leave the world with the impression that there is massive support for Vladimir Putin’s quagmire in Ukraine.
Meta, the owner of Facebook and Instagram, has exposed a Russian troll farm, Cyber Front Z, whose operations via Telegram and social media were aimed to create an appearance of massive support for Vladimir Putin’s war in Ukraine.   
That’s according to the company’s Quarterly Adversarial Threat Report.
Like the catastrophic invasion itself, the social media effort has been “clumsy and largely ineffective“.
This deceptive operation was “clumsy and largely ineffective,” the report reads, describing it as “a poorly executed attempt, publicly coordinated via a Telegram channel, to create a perception of grassroots online support for Russia’s invasion by using fake accounts to post pro-Russia comments on content by influencers and media.”
The investigation found attempts at driving comments to people’s content on Instagram, Facebook, TikTok, Twitter, YouTube, LinkedIn, VKontakte and Odnoklassniki. The targets included politicians, journalists, actors, celebrities and commercial brands from around the world — anyone who might have spoken out in support of Ukraine.
It appears that hired “trolls” worked in shifts seven days a week, with a daily brief break for lunch. The operation had an overt and a covert component. Overtly, they ran a Telegram channel that regularly called on its followers to go to particular accounts or posts by public figures or news media and flood them with pro-Russia comments. Covertly, they ran fake accounts that posted such comments themselves — likely to make it look as if their crowdsourcing had been effective.
In total, 45 Facebook accounts and 1,037 Instagram profiles, affiliated with Cyber Front Z, have been blocked.
I wonder how many of the people at the St. Petersburg troll factory have fled the country since the start of the special operation war.
A second wave of Russians is fleeing Putin’s regime
Thanks to the brain drain from Russia, Putin may have to rely on second-rate trolls these days.
Tumblr media
76 notes · View notes
gam3rsuar5sr3x · 4 months
Text
i dicided to make a christmas character take
so for this christmas on tumblr i dicided to make a take on any character from a christmas movie or cartoon. i,m thinking of home alone and the character i,m choosing is kevin mccallister.
so for cannon. kevin is the youngest in the mcallister family tormented and possibly bullied by his own family and feels like they hate him and therefore want them gone. he got his wish for Christmas's until he defeated the we bandits then they come back until he has to run when he heres buzz mad at what he did to his room.
so as for my take i,m taking the timeline to the modern 21st centry.
for this is i am obessed right now about hackers and i found a hackers road map video and so it includes I.T (information technology), A+, security, networking, linux, and coding and then start hacking.
so in this one kevin somehow was able to get himself a laptop and was just doing stuff on it watching videos on youtube and playing games lets say roblox (cause thats my favriot gaming platform).
but then hed stumble upon something. while playing a game, he noticed a glitch and wonderd what it was and saw it again the server crashed and kevin and other players (some of them were youtubers) were not happy. it turns out the game got hacked and kevin wonderd what that was. this would trigger something kevin never thought would happen to him but as he looked up hacking tools he had one geuss from what he quickly lerned as a script kiddie and tried out linux and other things he soon got to know everything about hacking in 1 second having written a computer virus he in a split second after a launched a virus lerned how to hack in a moment as well as command prompt and other hacking tools as he used them to quickly make a virus on not only the computer but also a cell phone. the police came on the door as it became known to kevin that he made something and read what he wrote. it was a line of code. thats when he looked at linux and cmd (command prompt) and saw what he wrote without anything no syntax error no nothing and found out what he did. he imidently gained how to do all this in one moment and with it a full understanding of how internet works and ect of what hackers use as well as an advanced. kevin in that moment lerned how to do all programming languages some way some how and his machine and cpu. hed go on to make himself a hacker kit used for a laptop computer disinged to do all linux and other stuff and a cell phone and tools for hacking as well as lerning how to binary code (the combonation code of 1s and 0`s for ex: 10011101010011001100101011001)
without even knowing what he was doing or lerning until the police came and left when the coast was clear and the virus was gone as kevin somehow imbeded it. thats when he came to know and realized what hed done. without knowing it he had servers he made for both cell phone and computer witch he lerned to be hacker on both tech`s. he lerned the new computer and new cell phone for assembly and other things not knowing what happened but that very night as he though and looked at his code like thing thats when he realized he lerned hacking quicly. its unknown how kevin lerned hacking that fast and then did vanilla all programming languages and vanilla linux and cmd as he saw what happened he became a grey hat after declaring neutrality in the cyber battlefield but soon began engaging in a mixture of ethical acts but also malicous activity thought most of it was thankfully ethical. eventually overnight somehow it made sense to kevin as he soon wrote code encrypting his information compleatly and made his own internet and wifi and vpn ect his computer and phone had stuff in them generating inf amount of both electricity and coolant. allowing him to work forever though he doesnt.
later he got a black hoodie with the hacker symbol on it. his hacker kit is basicly a suit case but silver metal and is so small its compact and has mettal techy straps and can be tightened and fliped for work while walking or to just carry it on back end or front artifically (most of the time, the front).
kevin now works as a grey hat hacker in this timeline tech version of home alone. this time he wont be left alone in the house though however the police had already seen the wet bandits and put them in jail and they wont escape until kevin and his family come back home from paris.
kevin is still harrassed by the older siblings so instead he stays in his own room and keeps himself as isolated from his entire family as possible as long as possible. knowing the typical reactions they have to him he doesnt bother coming out except for breakfest lunch, dinner, event, or holiday (even those times he takes his hacker moible desk as he calls it or H.M.D, with him and back to his room whenever keep in mind that its always with him no matter the circumstance)
its compact enough for him to keep whereever he finds himself and it works cause he made a chip generating inf wifi its own wifi and can connect to towers anywhere even in the middle of nowhere or on a plane but big enough to hold all his stuff (its equal for compact mobility and reliability and stuff holding and is still light wieght to).
this is my take on kevin known as hacker kevin. his technology art however hasnt gone unnoticed by the older siblings who often could if they have the chance accuse him of doing crime through technology though its always proven ethical no matter the circumstance as there is no way to proove to the parents.
its also said sence kevin isolates himself for the greater good his kid friends are also hackers as well. he can do the dark web and stuff. he has his own hacker library and on a plane or in public he doesnt say anything and rather minds his own busniss and igorns the older siblings as they are more likly to typicly harrass him so instead hes away though on a plane he can be forced to. he minds crypto for money witch gets him rich alot and he knows other responsiblities. even if home alone kevin is calm and easily defeats the bandits and hangs around his hacker friends who are about justice.
Kevin can be sometimes darkened and burdened by his hacker knowledge. He packs his own suit case himself as doesn't need others to pack it for him should it otherwise risk his secret identity as a hacker being discovered and one thing leads to another and next thing you know after discovered its now exposed to his entire family. Especially buzz sence buzz is a total jerk Kevin ignores and ditches buzz on purpose cause why mess with a jerk.
One time he faced a black hat hacker in front of everyone exposed once they saw what he was doing the hacker talked to Kevin about the code he wrote and all the things he did as a hacker with everyone listening the black hat hacker told Kevin to look at the line of code he wrote and what it did. Kevin looked at the code read it and saw what happened and it hit him he learned a long term thing in such a way that for him it was a short term deal and Kevin said "but how". That's when it hit Kevin he knew how to hack. Kevin explained a part of him knew what it was doing but as for the rest of him it's like he's just mindlessly typing nonsense and just somehow it messed with the server for some reason but with this his mind has exploded to great knowledge of what he's doing now. The hacker said to Kevin "it's your intelligence Kevin deep in your mind you know what your doing and it makes sense now your one of us what people know as the hacker the cyberpunk" Kevin leaped up and shooted at the screen to the hacker he would never be like him but the hacker insisted that he already is the code he wrote has wrecks the victims computer or phone with malware and randomware imbeds the code and tracking evidence with hello world. Kevin in utter guilt can't think of how to hack anymore as the fight continued the siblings tried to convince Kevin that he must continue while buzz watched in silence. Eventually Kevin taps into his hacker part finds it and activates it as it explodes throughout his entire mind and Kevin defeats the hacker after getting lost in the code. Then they come home the wet cyber bandits as it is in this timeline are defeated as well. Witch hacker Kevin in lost in new York is where Kevin makes his own credit card and it has the crypto currency he has so in this time line he isn't left behind in the home alone one but he is in lost in new York where he sets up his hotel room the crypto currency he uses for his money in his Bitcoin miner is run by a program for his gain to get things like food water etc. the wet cyber bandits known as the sticky cyber bandits are also not that great as kevin easily defeats them as soon as they try to launch their revenge cyber attack on a white hat hacker that got them in prison and kevin puts them back there again.
In end he packs his stuff up and goes all the way Florida easy for him he just networks into his mom's phone and sees where their at and buys a ticket to go there by airplane he arrives at the hotel his mom is at and finds the room there in and knocks as the mom answers and sends him to the room buzz is at Kevin however reminds her that buzz could be a jerk and explains the problem he has with him so instead he sleeps with 2 of his older sisters has his own bed there witch he sleeps in.
over all hacker kevin my take is a complex and a guy who strangly lern something that takes years to lern as quick as a moment somehow.
1 note · View note
osintelligence · 11 months
Link
https://bit.ly/3nZtdQH - 🔒 "The Five Bears," referring to Russia's state-sponsored Advanced Persistent Threat (APT) groups, represent a formidable part of the country's offensive cyber capabilities. The network combines advanced tools and infrastructure to execute sophisticated operations, targeting nations in both war and peacetime. However, the recent war in Ukraine has shown limitations in the strategic advantages of offensive cyber operations on the physical battlefield. #CyberWarfare #CyberSecurity 📚 Since the 1990s, Russia has been engaging in a broad spectrum of hostile cyber operations, from espionage to sabotage. Today, its state-sponsored threat actors form a network of skilled groups conducting operations worldwide, marking a vital component of Russia's global power strategy. Still, attribution is a complex issue, with groups frequently changing or exchanging toolsets. #CyberEspionage #RussiaCyber 🎯 The Russian APT actors use their cyber capabilities to target adversaries' critical infrastructure globally. They've demonstrated advanced cyber tradecraft, maintaining a persistent and often undetected presence in compromised environments. Prominent actors include Fancy Bear, Venomous Bear, Energetic Bear, and Voodoo Bear, each linked to different Russian intelligence agencies and known for their unique focuses and techniques. #CyberThreat #APT 🔍 Tactics, Techniques & Procedures (TTP) employed by these groups often change to evade attribution. The US Cybersecurity and Infrastructure Security Agency (CISA) has identified several TTP used by Russian state-sponsored APT groups, including targeting and attacks on critical infrastructure, espionage activities, and influence campaigns. Other techniques involve reconnaissance, resource development, initial access, execution, persistence, and credential access. #CyberTTP #CISA 💻 Known toolkits used by Russian state-sponsored APT groups include backdoors, credential stealers, downloaders, privilege escalation tools, droppers, wipers, and web shells. These tools enable a variety of malicious activities, from data theft to system destruction. #CyberTools #Malware ⚠️ Over the years, Russian state-sponsored APT groups have been attributed to several prominent attacks. These include a global energy sector intrusion campaign (2011-2018), attacks on the Ukrainian power grid (2015 & 2016), the 2016 US Presidential Election hack, and the NotPetya attack in 2017. #CyberAttacks #NotPetya 🇺🇦 Despite their known capabilities, Russian cyber operations have had a negligible impact on strategic objectives during the war in Ukraine. This could be due to Ukraine's defensive capabilities or the inability to integrate cyber operations into a comprehensive all-domain strategy. Nevertheless, the potential for unintentional spillover effects means Russian cyber operations remain a significant threat to any digitalised society.
2 notes · View notes
mitchipedia · 2 years
Text
Ronan Farrow writes an in-depth investigation of NSO, an Israeli cybersurveillance company implicated in many countries’ spying on political opponents and rights advocates.
16 notes · View notes
sloeserwij · 27 days
Text
Ruslands Doodseskader
Navalny vermoord door Ruslands Doodseskader Unit 29155. Te lezen op mijn blog https://sloeserwij.wordpress.com/ #Navalny, #Rusland, #Poetin, #Unit29155, #Spetsnatz
Vrijdag 16 februari 2024 overleed Aleksej Navalny op onverklaarbare wijze. Rusland beweert een natuurlijke dood, maar bewoners van de vrije wereld weten wel beter. Autoritaire regiems hebben gemeen dat zij met harde hand hun macht moeten afdwingen. Deze harde hand beperkt zich niet enkel tot het eigen land maar strekt ver over haar eigen landsgrenzen heen. Alles wat het zittende regiem op enige…
Tumblr media
View On WordPress
0 notes
hasanabiouttakes · 1 month
Text
youtube
0 notes
mereinkling · 2 months
Text
Choosing a Career
Do you remember when you were making decisions about your future career? C.S. Lewis’ comment on the subject of careers remains quite valuable in today’s rapidly changing world. Toward the end of high school, I recall filling out some educational assessments that projected how successful I might be in a number of different pursuits. Employability appeared to be the primary focus for the…
Tumblr media
View On WordPress
0 notes
definitelytzar · 2 months
Photo
Tumblr media
Meet the Pogi :-D
0 notes
usnewsper-world-news · 2 months
Text
Iran's Spies and Social Media Tricks: Threat to Israel's Security #cyberwarfare #espionageoperations #Iranrecruitmentspies #IsraelIrantensions #MiddleEastdominance #socialmediamanipulation
0 notes
disk28 · 2 years
Text
Tumblr media
4 notes · View notes
pensierosicuro · 3 months
Link
Il tuo Capodanno può essere INCREDIBILE e SICURO allo stesso tempo! Guarda il nostro video dedicato alla sensibilizzazione al tema dei botti di capodanno illegali e l'uso corretto per una festa esplosiva ma responsabile. 🎉🧨 Navighiamo tra i siti ufficiali come quello della Polizia di Stato e il Ministero degli Interni per guidarti nella giungla dei botti di Capodanno. Con questi siti potrai imparare a distinguere tra i giochi pirotecnici legali e quelli illegali, e scopri le fonti affidabili per una scelta sicura! I siti visitati nel video:
Capodanno 2023: i dati https://www.poliziadistato.it/articolo/capodanno-2023-i-dati
Guide: fuochi d'artificio, un po' di chiarezza https://www.poliziadistato.it/articolo/644-Guide_fuochi_d_artificio_un_po_di_chiarezza/
Virtati e consentiti: https://www.carabinieri.it/in-vostro-aiuto/consigli/Cose-di-tutti-i-giorni/fuochi-artificio/vietati-o-consentiti
Operazione "Capodanno Sicuro" contro i fuochi d’artificio illegali: https://www.interno.gov.it/it/notizie/operazione-capodanno-sicuro-contro-i-fuochi-dartificio-illegali
Mettiamo in luce l'importanza di educare i più giovani: mai acquistare botti da venditori non autorizzati e sempre sotto la supervisione di un adulto. 🚫👶 Un messaggio cruciale per prevenire incidenti e promuovere un #divertimentoconsapevole #DivertimentoResponsabile #PrevenzioneIncidenti #CapodannoInformato #BottiLegali #ConsigliSicurezza #FesteggiaConSaggezza #EducazionePirotecnica #CapodannoSicuro #FuochiArtificioResponsabili #SitiUfficiali #PoliziaDiStato #MinisteroInterni #GuidaBotti #SicurezzaGiovani #PrevenzioneRischi Non lasciarti sfuggire questo video essenziale per un Capodanno spettacolare e senza rischi. Clicca ora e porta la sicurezza alla tua festa di fine anno! Grazie per aver scelto #PensieroSicuro, il tuo compagno affidabile nel mondo della #cybersecurity e della #tecnologia Se sei appassionato di #sicurezzainformatica o desideri esplorare i concetti di base della #tecnologia, sei nel posto giusto. Se desideri intraprendere una carriera nella cybersecurity, considera lo studio di argomenti chiave come reti e sistemi operativi, programmazione e crittografia. Imparare dai migliori #framework e standard di sicurezza, come #ISO27001 e #NIST, è fondamentale. Hai domande che pensi siano troppo basilari? Non aver #paura a chiedere qui su #PensieroSicuro. Siamo qui per supportarti nel tuo percorso di #apprendimento e soddisfare la tua #curiosità tecnologica. Unisciti a noi in questa #avventura di conoscenza e condivisione. Non dimenticare di iscriverti, #commentare e condividere se hai apprezzato il contenuto. Continua a esplorare e rimanere aggiornato su tutte le novità del nostro #podcast con #PensieroSicuro. Se Pensi Sicuro, Sicuramente Pensi
0 notes
digitalcreationsllc · 3 months
Text
Iran Hit by Major Cyberattack Targeting Nation's Fuel Supply
Critical Infrastructure Security , Cyberwarfare / Nation-State Attacks , Fraud Management & Cybercrime Cyber Group Dubbed Predatory Sparrow Takes Responsibility for Widespread Attack Chris Riotta (@chrisriotta) • December 18, 2023     The Predatory Sparrow group has taken credit for an attack on Iranian gas stations on Dec. 18, 2023. (Image: Shutterstock) Gas stations across Iran abruptly shut…
Tumblr media
View On WordPress
1 note · View note
bookstattoosandtea · 5 months
Text
Release Tour, Exclusive Excerpt & Giveaway: Zero Control by Trina Lane
Release Tour, Exclusive Excerpt & Giveaway: Zero Control By Trina Lane Got Your Six, Book 1 Keiji Pacheo knows there is something very wrong with one of the smart weapons his company has fast-tracked for production. Something has to be done to protect millions of people from being targeted. But apparently, he is the only one willing. He needs help or artificial intelligence is going to run amok…
Tumblr media
View On WordPress
0 notes
osintelligence · 2 months
Link
https://reut.rs/3OmZGKL - 🌐 The U.S. government has recently taken action against a significant Chinese hacking operation named 'Volt Typhoon,' which compromised thousands of internet-connected devices. This operation, part of a larger campaign targeting critical Western infrastructure, was met with legal countermeasures from the Justice Department and FBI. #CyberSecurity #USChinaRelations 🔒 'Volt Typhoon' has raised alarms among intelligence officials for its potential to disrupt key sectors, including naval ports, ISPs, and utilities. The scope of the hacking campaign expanded in late 2023, leading to U.S. government collaborations with the private technology sector to track and counteract the activities. #DigitalThreat #InfrastructureSecurity 🌎 The broader implications of these breaches could enable China to disrupt facilities in the Indo-Pacific region, impacting U.S. military operations. This comes amidst heightened tensions over Taiwan, with China increasing its military presence in response to perceived U.S.-Taiwan collusion. #GeoPolitics #TaiwanUSRelations 🚫 When Western nations flagged 'Volt Typhoon' in May 2023, China dismissed the allegations as disinformation. The Chinese embassy in Washington has yet to respond to the latest developments. #InternationalRelations #CyberEspionage 📡 The 'Volt Typhoon' hackers leveraged a botnet—a network of compromised devices like routers and security cameras—to mask further attacks. This technique obscures the attackers' footprint, making it challenging for cyber defenders to trace the origin of these intrusions.
1 note · View note