Free Republic 1st Qtr 2021 Fundraising Target: $88,000 Receipts & Pledges to-date: $18,881
21%  
Woo hoo!! And the first 21% is in!! Thank you all very much!! God bless.

Keyword: cybersecurity

Brevity: Headers | « Text »
  • Report on What Happened to BLM Organizer Who Was at Capitol Protest, More on Antifa Presence (John Sullivan)

    01/09/2021 1:04:30 PM PST · by Kid Shelleen · 38 replies
    Red State ^ | 01/09/2021 | Nick Arama
    Democrats and liberal media have already dismissed the concept of radical leftists or Antifa being at the Capitol protest, that all the people there were Trump supporters. But as we reported, that’s not exactly true. What is true was there was at least some radical leftist presence there among the Trump supporters. What they did or what influence they may have had in the action is not clear. BLM protest organizer John Sullivan who frequently posted with BLM and Antifa hashtags was there at the doors to the Speaker’s Lobby next to Ashli Babbitt when she was shot. In fact,...
  • General McInerney calls for President Trump to declare martial law and investigation of treason

    12/31/2020 2:27:03 PM PST · by NKP_Vet · 44 replies
    https://headlines360-news.cdn.ampproject.org ^ | December 1, 2020 | Headlines360
    Worldview Weekend has released another bombshell interview with retired 3-star General Thomas McInerney. In the interview, Gen. McInerney publicly calls on President Trump to realize the seriousness of the cyber-war attack on America by invoking the Rebellion Act, removing Habeas Corpus (as Lincoln did) and initiating mass arrests under military authority. This call by Gen. McInerney, a highly accomplished military veteran and loyal patriot, seems to stem from the realization that much of the existing government has gone astray and is now colluding with the enemies of the nation. State governors have gone villains, court judges have gone villains, and...
  • Hackers Claim Attack on Largest Commercial Bank in Ukraine (Green Dragon vs PrivatBank)

    06/30/2014 8:51:29 PM PDT · by tcrlaf · 2 replies
    Softpedia ^ | 7-1-2014 | Ionut Ilascu
    A group of hackers called Green Dragon Crew announced on Twitter that the recent cyber-attack on the Privatbank, the largest commercial bank in Ukraine was their doing. The attack appears to be a distributed denial-of-service since on June 30, for a few hours, the bank’s pages either would not load or offered sporadic access to the customers. However, the group also claims that they managed to breach the bank’s systems and that they have access to customer bank accounts. In order to do this, they would have to access different systems because payment service and the website are not part...
  • Expert Witness Says His Team Has Hacked into the Georgia Senate Runoff Elections — “We are in.” Witness Says Voting System Is Connected to Internet

    12/30/2020 11:13:18 AM PST · by SeekAndFind · 83 replies
    Election Wiz ^ | 12/30/2020
    ‘This should not happen’December 30, 2020 | 1:35 PM ETDuring a Senate hearing in Georgia over fraud in the 2020 presidential election, Jovan Pulitzer told the senate members, “At this very moment at a polling location in the county, not only do we now have access to the devices through the poll pad — the system — but we are in.”Pulitzer told the senators this should not be able to happen, but his team was has able to hack into the voting system and has documented evidence to prove it.pic.twitter.com/1craf5cO51— JovanHuttonPulitzer ™ #JovanHuttonPulitzer (@JovanHPulitzer) December 30, 2020Pulitzer said the machines...
  • CIA China Ops Wiped Out By 'Botched' Spy Contact System

    08/18/2018 5:10:30 PM PDT · by UMCRevMom@aol.com · 30 replies
    Conservative Daily Post ^ | 18 Aug 2018 | Mark Megahan
    CIA China Ops Wiped Out By 'Botched; Spy Contact System: Investigation results show indicted spy Jerry Chun Shing Lee was not the CIA's only security breach. Sloppy coding led to a back door hole in the messaging system, used by the Chinese to 'wipe out' our entire spy network. Suddenly, in late 2010, undercover agents in China were being rounded up and hauled off for interrogation. Under Barack Obama's administration, the Central Intelligence Agency suffered what intelligence officers are calling one of the worst disasters in decades. Suddenly, in late 2010, undercover agents in China were being rounded up and...
  • Maduro's cryptocurrency 'genius' once pushed US sanctions (Venezuela, Russia, Turkey)

    07/25/2018 3:37:03 PM PDT · by Texas Fossil · 10 replies
    AP News ^ | Mar. 19, 2018 | JOSHUA GOODMAN
    CARACAS, Venezuela (AP) — A chief strategist of Venezuela's government-backed cryptocurrency is a former U.S. congressional intern who once organized protests against the same socialist administration he's now helping to circumvent U.S. financial sanctions.Gabriel Jimenez, 27, was catapulted to something of tech stardom in Venezuela last month when he stood alongside President Nicolas Maduro and two Russian businessmen on national TV signing a contract to position the petro, as the fledgling currency is known, among international investors."It's a company founded and led by young Venezuelan geniuses, boys and girls of Venezuela, who have one of the most technologically advanced blockchain...
  • Video Platform, Zoom Executive Based in China Spied on Dissidents at the Behest of the Chinese Communist Party

    12/19/2020 9:52:25 AM PST · by SeekAndFind · 5 replies
    PJ Media ^ | 12/19/2020 | Rick Moran
    FBI PHOTO An employee of the video platform Zoom who is based in China was spying on Chinese dissidents for the Communist Chinese government, according to a federal indictment announced on Friday.Xinjiang Jin, also known as Julien Jin, was charged with conspiracy to commit interstate harassment and unlawful conspiracy to transfer means of identification. Some of his targets were living in the United States.Jin served as Zoom’s in-house liaison to the Chinese government and had extensive interaction with Zoom executives in the United States.Daily Caller:John Demers, the assistant attorney general for national security, said that the case shows that U.S....
  • Zoom executive exposed as Chinese Communist spy who sabotaged anti-China video conferences with child porn and terrorism: DOJ

    12/20/2020 11:05:33 AM PST · by gattaca · 10 replies
    The Blaze ^ | December 20, 2020 | Paul Sacca
    The spy fabricated fake evidence of child porn and terrorism to frame Zoom users A former executive at Zoom, who shut down video conferences that were not flattering to China, was exposed as a spy for the Chinese Communist Party, according to the Department of Justice. Xinjiang Jin, aka Julien Jin, was an employee of the American video conferencing company. The 39-year-old, who was based in China's Zhejiang Province, worked as a "security technical leader" for tech company headquartered in San Jose, California. Jin served as a liaison between Zoom and the Chinese government after Beijing blocked the company's service...
  • Cybercriminals Could be Coming After Your Coffee

    12/19/2020 2:16:23 PM PST · by TigerLikesRoosterNew · 49 replies
    darkreading ^ | 10/23/2020 | Curtis Franklin Jr.
    Researchers show no IoT device is too small to fall victim to ransomware techniques. There's no question that ransomware has become one of the most feared (and loathed) cybersecurity attack types. The idea of your critical data sitting on your hard drives yet inaccessible is, frankly, terrifying. And a new study shows it could get much, much worse. You know that cup of coffee that's pretty much the only thing that can get you out of bed most mornings? Well, some eye-opening ransomware research came out with the announcement of a proof-of-concept ransomware attack on a coffee maker. Losing access...
  • Massive cyberattack grows beyond US, heightening fears

    12/19/2020 8:45:35 AM PST · by Mariner · 161 replies
    AFP via Yahoo ^ | December 19th, 2020 | Rob Lever
    A devastating cyberattack on US government agencies has also hit targets worldwide, with the list of victims still growing, according to researchers, heightening fears over computer security and espionage.Microsoft said late Thursday that it had notified more than 40 customers hit by the malware, which security experts say came from hackers linked to the Russian government and which could allow attackers unfettered network access."While roughly 80 percent of these customers are located in the United States, this work so far has also identified victims in seven additional countries," Microsoft president Brad Smith said in a blog post.Smith said the victims...
  • Microsoft and industry partners seize key domain used in SolarWinds hack

    12/19/2020 10:13:01 AM PST · by linMcHlp · 61 replies
    ZDNET ^ | 12/15/2020 | Catalin Cimpanu
    UPDATED: The seized domain has been turned into a killswitch to prevent the SolarWinds hackers to escalate infections and make new victims. Microsoft and a coalition of tech companies have intervened today to seize and sinkhole a domain that played a central role in the SolarWinds hack, ZDNet has learned from sources familiar with the matter. The domain in question is avsvmcloud[.]com, which served as command and control (C&C) server for malware delivered to around 18,000 SolarWinds customers via a trojanized update for the company's Orion app. SolarWinds Orion updates versions 2019.4 through 2020.2.1, released between March 2020 and June...
  • Suspected Russian hack is much worse than first feared: Here’s what you need to know

    12/18/2020 3:42:24 PM PST · by Berlin_Freeper · 74 replies
    cnbc.com ^ | Dec 18 2020 | Sam Shead
    The scale of a sophisticated cyberattack on the U.S. government that was unearthed this week is much bigger than first anticipated. The Cybersecurity and Infrastructure Security Agency said in a summary Thursday that the threat “poses a grave risk to the federal government.” It added that “state, local, tribal, and territorial governments as well as critical infrastructure entities and other private sector organizations” are also at risk. CISA believes the attack began at least as early as March. Since then, multiple government agencies have reportedly been targeted by the hackers, with confirmation from the Energy and Commerce departments so far.
  • Billions Spent on U.S. Cyberdefenses Failed to Detect Giant Russian Hack

    12/17/2020 11:35:26 AM PST · by Mariner · 40 replies
    The New York Times via Yahoo ^ | December 17th, 2020 | David E. Sanger, Nicole Perlroth and Julian E. Barnes
    WASHINGTON — Over the past few years, the U.S. government has spent tens of billions of dollars on cyberoffensive abilities, building a giant war room at Fort Meade, Maryland, for U.S. Cyber Command, while installing defensive sensors all around the country — a system named Einstein to give it an air of genius — to deter the nation’s enemies from picking its networks clean, again.
  • Russian hackers breached Microsoft as part of their campaign that infiltrated the US nuclear weapon stockpile network, the Los Alamos lab and the Energy Department, officials reveal

    12/17/2020 4:23:18 PM PST · by rickmichaels · 43 replies
    Daily Mail ^ | Dec. 17, 2020 | Katelyn Caralle, Keith Grififth
    Microsoft was breached in the massive suspected Russian campaign that has hit multiple U.S. government agencies, including those responsible for maintaining America's nuclear weapons stockpile, according to people familiar with the matter. The sprawling attack, which targeted critical government infrastructure using a Trojan horse hidden in network management software from SolarWinds Corp, also compromised broad swathes of the private sector, likely including most of the Fortune 500, it emerged on Thursday. Officials say the attack went undetected for nearly nine months, allowing the hackers free range in the affected agencies and companies, and that the true scale of the stolen...
  • Little-known SolarWinds gets scrutiny over hack, stock sales

    12/17/2020 4:16:27 PM PST · by blueplum · 8 replies
    AP ^ | 17 Dec 2020 | Matt O'Brien
    SolarWinds’ longtime CEO, Kevin Thompson, had months earlier indicated that he would be leaving at the end of the year as the company explored spinning off one of its divisions. The SolarWinds board appointed his replacement, current PulseSecure CEO Sudhakar Ramakrishna, on Dec. 7, according to a financial filing, a day before FireEye first publicly revealed the hack on its own system and two days before the change of CEOs was announced. It was also on Dec. 7 that the company’s two biggest investors, Silver Lake and Thoma Bravo, which control a majority stake in the publicly traded company, sold...
  • I Was the Homeland Security Adviser to Trump. We’re Being Hacked.

    12/16/2020 11:23:23 PM PST · by yesthatjallen · 23 replies
    NYT ^ | 12 16 2020 | Thomas P. Bossert
    At the worst possible time, when the United States is at its most vulnerable — during a presidential transition and a devastating public health crisis — the networks of the federal government and much of corporate America are compromised by a foreign nation. We need to understand the scale and significance of what is happening. Last week, the cybersecurity firm FireEye said it had been hacked and that its clients, which include the United States government, had been placed at risk. This week, we learned that SolarWinds, a publicly traded company that provides software to tens of thousands of government...
  • Trump’s chaos made America a sitting duck for cyberattacks

    12/15/2020 10:12:58 AM PST · by Mariner · 36 replies
    The Verge ^ | December 14th, 2020 | By Russell Brandom
    On Sunday night, as news broke of one of the broadest state-sponsored cyberattacks in recent memory, former civilian cybersecurity chief Christopher Krebs was stuck tweeting. A state-sponsored attacker linked to Russia had compromised senior-level cabinet agencies, implicating huge portions of the government and private sector. Fired in November from his role leading the Cyber and Infrastructure Security Agency (CISA) after a political spat with President Trump, Krebs had to watch it all take place from the outside.“I have the utmost confidence in the CISA team and other Federal partners,” Krebs said. “I’m sorry I’m not there with them, but they...
  • The New Acting Attorney General Jeff Rosen Recently Wrote an Essay on Foreign Influence in US Elections – This Tells Us A Little About His Knowledge of What’s Going On Today

    12/14/2020 9:12:23 PM PST · by bitt · 26 replies
    GATEWAY PUNDIT ^ | 12/14/2020 | Joe Hoft
    Jeff Rosen may be the right man for the times. We can only hope. Today President Trump announced that Attorney General Bill Barr would be resigning before Christmas and Deputy Attorney General Jeff Rosen would be taking over: (see inserts) According to Ron at CodeMonkeyZ on Twitter, Deputy Attorney General Jeff Rosen who is taking over for AG Barr has written about foreign intervention on US elections: (see insert) In his recent essay from late August of this year, Rosen shares the following: "But interference with infrastructure is not our only concern. We are also concerned about another threat, known...
  • BREAKING: FBI, Texas Rangers and US Marshals Raid Solarwinds HQ in Austin — More News Coming on CEO and Executive Vice President

    12/14/2020 5:54:33 PM PST · by Kevin in California · 82 replies
    The Gateway Pundit ^ | 12/14/2020 | Jim Hoft
    Last night the Cybersecurity and Infrastructure Security Agency (CISA) issued a rare Emergency Directive 21-01, in response to a KNOWN COMPROMISE involving SolarWinds Orion products. This was only the fifth Emergency Directive issued by CISA under the authorities granted by Congress in the Cybersecurity Act of 2015. CISA reported a breach of the SolarWinds Orion products. This Emergency Directive called on all federal civilian agencies to review their networks for indicators of compromise and disconnect or power down SolarWinds Orion products immediately.
  • CISA ISSUES EMERGENCY DIRECTIVE TO MITIGATE THE COMPROMISE OF SOLARWINDS ORION NETWORK MANAGEMENT PRODUCTS

    12/13/2020 10:49:35 PM PST · by bitt · 95 replies
    cisa.gov/ ^ | 12/14/2020 | cisa.gov/
    WASHINGTON – The Cybersecurity and Infrastructure Security Agency (CISA) tonight issued Emergency Directive 21-01, in response to a known compromise involving SolarWinds Orion products that are currently being exploited by malicious actors. This Emergency Directive calls on all federal civilian agencies to review their networks for indicators of compromise and disconnect or power down SolarWinds Orion products immediately. “The compromise of SolarWinds’ Orion Network Management Products poses unacceptable risks to the security of federal networks,” said CISA Acting Director Brandon Wales. “Tonight’s directive is intended to mitigate potential compromises within federal civilian networks, and we urge all our partners—in the...