The infiltrators of the Salt Hurricane in China have penetrated the US National Guard for about a year


After the last reporting The week is that the video of the Jeffrey Epstein prison, “Raw”, was published by the FBI It is likely to be modified in at least some ways (Although there is no evidence that the shots were deceptive in a deceptive manner), WIRED mentioned on Tuesday that The filter data analysis shows nearly two minutes and 53 seconds From one of the sewing clips.

The UAE Ministry of Internal Security is facing more controversy DNA samples are taken from about 133,000 immigrant children and youth The administration added to a criminal database. Meanwhile, researcher Jeremy Fowler published the results this week More than 2 GB of data related to very sensitive adoptionIncluding information about parents, children and adopted fathers – it was exposed and available to the audience on the open Internet.

Roblox new reliable communication feature It includes an artificial intelligence verification to clear adolescent video photos And determine if they can be given access to chat with the people they know. Like Deepfake’s video – maturity – including Artificial intelligence tools that can even deal with live video clipsAmnesty International’s “Nudify” platforms attract millions of users and generate millions of dollars In revenue using technology from American companies.

There is more. Every week, we link the security and privacy news that we did not cover deeply. Click the titles to read full stories. And staying safe there.

The Chinese piracy group, which is sponsored by the state known as Salt Typhoon, was once shocked by the United States last year that it had penetrated deep American communication systems, to target text messages and phone conversations for citizens including Condings Trump and JD Vance in real time. Now it seems that the group’s spy has included the US military, and spent most of the last year within the US National Guard Network in at least one state. NBC News mentioned this week on the DHS note, which was obtained by the non -profit transparency property of national security, which warned that the Chinese infiltrators group had violated the National Guard Network at the state level from March to December of last year. The country that was targeted was not specified. According to the memo, the arrival of the Salt Typhoon “is likely to provide Beijing data that can facilitate the penetration of the National Guard Units of the Army in other states, and perhaps many cybersecurity partners at the state level.”

The Trump administration is developing a new digital system designed to grant the arrival of immigration and customs near time to the sensitive data of taxpayers, including their home addresses. The internal plans, which are revealed by ProPublica on Tuesday, shows that the system is designed to automate and accelerate data exchange “based on demand”, bypassing guarantees of the traditional tax department that usually requires reviewing each case separately and legal justification. The system represents a major shift in how to access the tax department data, and it already raises concerns among civil freedom experts who say the process may violate privacy laws and accelerate ICE’s ability to obtain tax data for deportation purposes.

A Spain twice This allows the train brakes that they are caused by malicious infiltrators is a worrying idea. The ability to immunity exceeds 7,300 days leaves trains exposed to this brake penetration is a terrible level of neglect for critical American infrastructure. Last week, the Cyber Security and Infrastructure Agency released a consultant about a lack of authentication in a protocol that allows the device at the head of the train (hot) to send a brake sign to another device at the end of the train coordinated brakes via long trains such as shipping trains. This means that infiltrators can send their orders that are not approved to disable trains, close railways, or even cause a decrease in its course, one of the researchers attributed to the consultant for Securityweek. This problem was made more proud of the fact that researchers discovered that weakness was first reported in 2005, but it was not taken seriously or fixed. Tens of thousands of weak hot devices and EOT are replaced in a process that will start next year.

Methods who want to build a robot from harmful programs can search for these devices for confidence in security gaps-which are abundant enough-and exploit them remotely. Or best of that, they can infect them before shipping them. Google announced this week that it will file a lawsuit against the officials of the so -called Badbox 2.0 Botnet, which consists of 10 million Android TVs that were infected in one way or another with harmful programs before selling it to consumers. Then the Botnet operators, described by Google as Chinese Internet criminals, then enjoying access to these devices for use as agents or fake advertising views in a widespread clicking. Badbox 2.0 “is already the largest known robot for Internet TVs, and it grows every day. It has harmed millions of victims in the United States and around the world and threatens a lot of complaint.”

Leave a Reply

Your email address will not be published. Required fields are marked *