Free Republic 4th Qtr 2024 Fundraising Target: $81,000 Receipts & Pledges to-date: $847
1%  
Woo hoo!! 4th qtr FReepathon is now underway!! Thank you everyone!! God bless.

Keyword: hacking

Brevity: Headers | « Text »
  • U.S. NEWS WikiLeaks co-founder Julian Assange indicted on 17 new charges under Espionage Act

    05/24/2019 5:58:48 AM PDT · by Steve1999 · 41 replies
    NBC ^ | 23-05-19 | Ken Dilanian and Doha Madani
    The Department of Justice announced 17 new charges against Wikileaks co-founder Julian Assange on Thursday, including a virtually unprecedented move to charge him with publishing classified material — a move that could pose challenges to First Amendment protections. In a superseding indictment, a grand jury in Alexandria, Virginia, has accused Assange of breaking the law by inducing Army Pvt. Chelsea Manning to send him classified documents — and then publishing material that included the names of confidential sources who provided information to American diplomats. The 17 counts were tacked on to a single count accusing Assange of conspiring with Manning...
  • WikiLeaks Founder Charged in Superseding Indictment New Allegations Assert Assange Conspired With “Anonymous” Affiliated Hackers, Among Others

    07/02/2020 1:18:42 PM PDT · by ransomnote · 24 replies
    justice.gov ^ | June 24, 2020 | DOJ
    A federal grand jury returned a second superseding indictment today charging Julian P. Assange, the founder of WikiLeaks, with offenses that relate to Assange’s alleged role in one of the largest compromises of classified information in the history of the United States.   The new indictment does not add additional counts to the prior 18-count superseding indictment returned against Assange in May 2019.  It does, however, broaden the scope of the conspiracy surrounding alleged computer intrusions with which Assange was previously charged.  According to the charging document, Assange and others at WikiLeaks recruited and agreed with hackers to commit computer intrusions...
  • Leaked Docs Reveal Trump Campaign Was Still Getting Hacked As Recently As Last Week, Per Report

    09/25/2024 4:21:55 AM PDT · by blueplum · 10 replies
    Mediaite ^ | 24 Sept 2024 | David Gilmour
    Hackers reportedly had access to former President Donald Trump’s campaign systems through mid-September, and evidence suggests the breach may still be ongoing.... ... journalist Judd Legum detailed in his Popular Information newsletter on Tuesday that he received a further set of documents from an anonymous source named “Robert,” which he said included internal campaign files. While some of these documents held potential news value, one newly surfaced document, dated September 15, indicates the hack is both more recent and extensive than initially thought. The new document is a letter from the campaign and addressed to the New York Times...A source...
  • Hacking blind spot: States struggle to vet coders of election software

    09/01/2024 10:48:29 AM PDT · by Libloather · 24 replies
    Politico ^ | 9/01/24 | John Sakellariadis
    When election officials in New Hampshire decided to replace the state’s aging voter registration database before the 2024 election, they knew that the smallest glitch in Election Day technology could become fodder for conspiracy theorists. So they turned to one of the best — and only — choices on the market: A small, Connecticut-based IT firm that was just getting into election software. But last fall, as the new company, WSD Digital, raced to complete the project, New Hampshire officials made an unsettling discovery: The firm had offshored part of the work. That meant unknown coders outside the U.S. had...
  • 2.7 billion records leaked in massive US data breach:If you live in US, this breach could include your data

    Nearly every American's Social Security number may have been leaked, with a hacking group claiming they stole nearly 3 billion records of personal information. A massive database containing over 2.7 billion records has reportedly ended up on a criminal forum. These records belong to individuals in the U.S. and were allegedly stolen from National Public Data (NPD). While the accuracy of the leaked data could not be verified, the hackers reportedly obtained sensitive information such as names, mailing addresses and Social Security numbers. The scale of this breach is so vast that if you live in the U.S., it's likely...
  • Iran is Helping the Kamala Campaign - The Mullahs create pro-Kamala site, hack Trump accounts, leak materials to media.

    08/14/2024 6:12:45 AM PDT · by MtnClimber · 25 replies
    Front Page Magazine ^ | 14 Aug, 2024 | Daniel Greenfield
    With headlines like “Harris Surges Ahead: A New Era of Democratic Enthusiasm and Opportunity” and “Former Friend Exposes JD Vance’s Radical Transformation: A Study in Political Opportunism”, you might mistake NioThinker for another mainstream media outlet. Only the occasional odd word choice and convoluted bit of grammar hints that the digital media site flowing with enthusiasm for Kamala and contempt for Trump isn’t really American. Classified as part of Iran’s ‘Storm-2035’ network: NioThinker is an enemy operation. Why is an Islamic terrorist state spending its time putting up articles like “Trump Silent After Fox News Poll Favors Harris in Swing...
  • Urgent warning to change all of your logins NOW as hacker leaks 10BILLION passwords from dozens of popular websites

    07/09/2024 8:55:18 AM PDT · by george76 · 45 replies
    DAILY MAIL ^ | 8 July 2024 | NIKKI MAIN
    Cyber experts have urgently warned people to update their passwords after a hacker uploaded billions of login details. The leak, called RockYou2024, was posted on July 4th containing a staggering 10 billion passwords from a compilation of old and new data breaches. Researchers who revealed the leak said the information could allow hackers to target any system that isn’t protected by strict security software including online and offline services, online cameras and industrial hardware. This could prompt a wave of data breaches, financial fraud and identity theft using the passwords, which were collected from more than 4,000 databases over the...
  • How Vulnerable Are Our Digital Systems?

    06/26/2024 8:39:12 PM PDT · by SeekAndFind · 23 replies
    Epoch Times ^ | 06/26/2024 | Jeffrey Tucker
    Last week a cyberattack hit a huge number of car dealers in the United States. The software designed by the company CDK was completely disabled, affecting the whole of an integrated process of purchasing and processing. Sellers could not process sales, loans, insurance, registrations, and much more. It happened suddenly, lasted two and a half days, came back, then went down again.How did car dealers function? They wrote it all out on paper and pledged to complete the process after the systems came back. They are back and all seems well but the experience is a warning sign. These systems...
  • LockBit claims the hack of the US Federal Reserve

    06/24/2024 1:54:31 PM PDT · by yesthatjallen · 9 replies
    Security Affairs ^ | 06 24 2024 | Pierluigi Paganini
    The Lockbit ransomware group announced that it had breached the systems of Federal Reserve of the United States and exfiltrated 33 TB of sensitive data, including “Americans’ banking secrets.” The Lockbit ransomware group added the Federal Reserve to the list of victims on its Tor data leak site and threatened to leak the stolen data on 25 June, 2024 20:27:10 UTC. The group hasn’t published any sample of the stolen data. “Federal banking is the term for the way the Federal Reserve of the United States distributes its money. The Reserve operates twelve banking districts around the country which oversee...
  • The Post Mellineal Data Breach

    06/24/2024 5:15:12 PM PDT · by LTC.Ret · 3 replies
    CreditKarma notification | 24 June 2024 | LTC.ret
    I was just notified by CreditKarma that The Post Millennial [thepostmillennial.com] had a data breach that shared my personal information: The Post Millennial breach Reported on May 2024 In May 2024, The Post Millennial's database was allegedly breached. Even if you don't use your The Post Millennial account anymore, it's important to protect any info that was exposed.
  • It has been 143 days since the Curling v. Raffensperger case rested and Judge Totenberg estimated “about 30 days” to make her ruling. ( Georgia )

    06/17/2024 10:43:54 AM PDT · by george76 · 19 replies
    X twitter ^ | Jun 16, 2024 | David Cross
    It has been 143 days since the Curling v. Raffensperger case rested and Judge Totenberg estimated “about 30 days” to make her ruling. Is she going to wait until it is too late to do anything with the voting machines? My guess is YES, she will delay her ruling until it is too late to do anything. Judge Totenberg is looking like she has been influenced or corrupted by pressure from the state. I bet she retires before making her ruling.
  • Stark Industries Solutions: An Iron Hammer in the Cloud

    06/14/2024 3:26:02 AM PDT · by Chad C. Mulligan · 2 replies
    Krebs on Security ^ | 23 May 2024 | Krebs
    Two weeks before Russia invaded Ukraine in February 2022, a large, mysterious new Internet hosting firm called Stark Industries Solutions materialized and quickly became the epicenter of massive distributed denial-of-service (DDoS) attacks on government and commercial targets in Ukraine and Europe. An investigation into Stark Industries reveals it is being used as a global proxy network that conceals the true source of cyberattacks and disinformation campaigns against enemies of Russia. At least a dozen patriotic Russian hacking groups have been launching DDoS attacks since the start of the war at a variety of targets seen as opposed to Moscow. But...
  • A Total Meltdown’: Lunden Roberts Claims Phones ‘Crashed,’ Almost ‘Everything’ With HUNTER ‘Gone’ After Pregnancy News

    06/08/2024 6:27:40 PM PDT · by OakOak · 55 replies
    Daily Caller ^ | 6/8/24 | Julianna Frieman
    Lunden Roberts, the mother of Hunter Biden’s daughter, Navy, claimed Friday her phones “crashed” and “just about everything” with Hunter Biden on the device was “gone” after she discovered she was pregnant. Roberts claimed to Sirius XM’s Megyn Kelly that both of her cellphone screens “crashed” at the same time in front of both she and her friends the night she learned she was pregnant with Navy. Yes. It looks like a total meltdown,” Kelly said. Roberts said “a lot of stuff” involving Hunter Biden was missing from her iCloud when she got a new phone the next day. “Just...
  • FBI WARNING: Chinese Hackers Preparing to Launch Massive Attack on U.S. Infrastructure – Have Already Infiltrated Several Critical Companies

    04/18/2024 9:51:06 PM PDT · by bitt · 95 replies
    https://www.thegatewaypundit.com/ ^ | 4/18/2024 | cullen linebarger
    Chinese hackers are preparing to launch a major attack on critical U.S. infrastructure and have already infiltrated multiple companies according to the FBI. FBI Director Chris Wray revealed today China is developing the capability to cause significant damage to our critical infrastructure at a time of their choosing. The only question is the time to launch a catastrophic blow. “China is developing the ability to physically wreak havoc on our critical infrastructure at a time of its choosing,” Wray said at the 2024 Vanderbilt Summit on Modern Conflict and Emerging Threats. “Its plan is to land low blows against civilian...
  • Volt Typhoon: FBI Warns Chinese Hackers Are Preparing to Attack US Infrastructure

    04/18/2024 8:17:21 PM PDT · by SeekAndFind · 63 replies
    Hotair ^ | 04/18/2024 | John Sexton
    Last May I wrote about a group of Chinese hackers who'd been identified by Microsoft after malware was discovered in telecom systems on the island of Guam. Microsoft named the hacking group "Volt Typhoon."Microsoft called the hacking group “Volt Typhoon” and said that it was part of a state-sponsored Chinese effort aimed at not only critical infrastructure such as communications, electric and gas utilities, but also maritime operations and transportation. The intrusions appeared, for now, to be an espionage campaign. But the Chinese could use the code, which is designed to pierce firewalls, to enable destructive attacks, if they choose.Today,...
  • Nationwide Ransomware Attack on UnitedHealth Payment Processor Exposes The Problem With Health Care Monopolies

    04/02/2024 10:18:02 PM PDT · by SeekAndFind · 16 replies
    The Federalist ^ | 04/02/2024 | Christopher Jacobs
    The hacking of a UnitedHealth affiliate is a symptom of consolidation within the health care sector, and it’s likely to get even worse.In a bid to win reelection, the Biden administration keeps trying to sell the country on all the supposed benefits of Obamacare. Before continuing their sales campaign, they might want to check in with the doctors’ offices struggling to make payroll.For over a month, the multitrillion-dollar health care sector has had to respond to a hack on a payment processor owned by UnitedHealthGroup, the nation’s largest insurer. Axios reported that hospitals, doctors, medical equipment suppliers, and pharmacies are...
  • How Hackers "live off the land"

    03/31/2024 3:20:03 AM PDT · by rodguy911 · 71 replies
    microsoft ^ | rodguy911
    Living off the Land: How hackers blend into your environment Cyber-criminals are increasingly ‘Living off the Land’, leveraging commonly-used tools to fly under the radar of conventional cyber defenses. Discover why Self-Learning AI is uniquely positioned to identify attacks leveraging this technique. What is Living off the Land attack? Living off the Land is a strategy which involves threat actors leveraging the utilities readily available within the target organization’s digital environment to move through the cyber kill chain. This is a popular method because It is often cheaper, easier, and more effective to make use of an organization’s own infrastructure...
  • WAS IT AN “ACCIDENT?” Lara Logan Intel Sources Claim Baltimore Bridge Collapse On “Second busiest strategic roadway for hazardous materials” Was “absolutely brilliant strategic attack”

    03/27/2024 9:08:32 AM PDT · by ransomnote · 152 replies
    thegatewaypundit.com ^ | Mar. 26, 2024 | Patty McMurray
    Independent journalist Lara Logan’s report on the “accident” is very different from the reports in the mainstream media.Here’s what Logan had to say about the cargo ship’s “accident” with the Francis Scott Key bridge in Baltimore:Multiple intel sources: The Baltimore bridge collapse was an “absolutely brilliant strategic attack” on US critical infrastructure – most likely cyber – & our intel agencies know it. In information warfare terms, they just divided the US along the Mason-Dixon line, exactly like the Civil War.The second busiest strategic roadway in the nation for hazardous material is now down for 4-5 years – which is...
  • Leaked Files From Chinese Firm Show Vast International Hacking Effort

    02/22/2024 4:09:22 PM PST · by Enlightened1 · 7 replies
    The Washington Post ^ | 02/22/24 | Christian Shepherd, Cate Cadell, Ellen Nakashima, Joseph Menn and Aaron Schaffer
    A trove of leaked documents from a Chinese state-linked hacking group shows that Beijing’s intelligence and military groups are attempting large-scale, systematic cyber intrusions against foreign governments, companies and infrastructure — with hackers of one company claiming to be able to target users of Microsoft, Apple and Google. The cache — containing more than 570 files, images and chat logs — offers an unprecedented look inside the operations of one of the firms that Chinese government agencies hire for on-demand, mass data-collecting operations. The files — posted to GitHub last week and deemed credible by cybersecurity experts, although the source...
  • GitHub leak exposes Chinese offensive cyber operations – researchers

    02/19/2024 10:50:15 AM PST · by TigerClaws · 7 replies
    The leaked documents supposedly discuss spyware developed by I-Soon, a Chinese infosec company, that’s targeting social media platforms, telecommunications companies, and other organizations worldwide. Researchers suspect the operations are orchestrated by the Chinese government. Unknown individuals allegedly leaked a trove of Chinese government documents on GitHub. The documents reveal how China conducts offensive cyber operations with spyware developed by I-Soon, Taiwanese threat intelligence researcher Azaka Sekai claims. While several researchers have analyzed the supposedly leaked documents, no official confirmation of their veracity exists as of the writing of this article. We have reached out to I-Soon but did not receive...