Start your day with intelligence. Get The OODA Daily Pulse.

Home > OODA Analysis and Briefs

Analysis

  • The GWOT Gets Tougher (Update)

    Al Qaeda wants to build a political operation in Iraq to broaden its campaign against the U.S.-backed government, a top U.S. general said on Wednesday. Citing intelligence mostly gathered since the death of al Qaeda’s former leader Abu Musab al-Zarqawi in June, Major General William Caldwell said the militant group appeared to be refining its…

  • FBI: Not Serious

    In a classroom at the FBI Academy in Quantico, instructor Rodney Loose was trying to introduce the history of Islam to a new group of future agents. He had one hour. The 50 men and women would be joining the ranks of an agency whose top officials have declared fighting terrorism to be its No.…

  • Bearing Gifted Geeks

    The great need for qualified computer security personnel is now forcing the government to rethink rigid hiring guidelines. At the Defcon computer security convention in Las Vegas, more than a dozen federal agents told attendees that traditional requirements like college degrees and polygraph tests were no longer strictly required for government employment. They also said…

  • Air Security: Not Serious

    A top level security probe is under way after a 12-year-old boy walked on to a plane unchecked with no documents at the height of the terror scare. The boy boarded a plane at Gatwick on Monday despite airport security being on red-alert.   Want more data points that support the idea that – mechanical…

  • Lesson Not Learned

    The director of the Canadian Security Intelligence Service said Tuesday that the spy agency avoids racial profiling because it is “fundamentally stupid” and does not knowingly use information gleaned under torture offshore because the practice is “morally repugnant.” James Judd told a gathering of Canadian judges on Tuesday that he is “acutely aware” of complaints…

  • The New Collection / Production Management

    In my embargoed contribution to a pending book on reform, I argue that going the networked/wiki-ed/blogged route is both a nice way to cut out a lot of the overhead associated with the intel process. As it works now it is very hierarchical, with gatekeepers at every turn and operating at a pace that makes tortoises look…

  • Let the Flailing Begin

    So controversial is the forthcoming National Intelligence Estimate on Iraq, say officials and observers, that even the terms of reference are likely to be the subject of intense, but highly secret, discussion and debate. Somewhere in a conference room in Northern Virginia, roughly two-dozen seniors and their backups are sitting around a table and bickering…

  • Here Comes the Judge

    The plot has also revealed the indispensability of good counterterrorism intelligence. A defense against terrorists, as against other enemies of the nation, must be multilayered to have a reasonable chance of being effective. One of the outer defenses is intelligence, designed to detect plots in advance so that they can be thwarted. One of the…

  • As they bloody well should

    The [UK] Government is discussing with airport operators plans to introduce a screening system that allows security staff to focus on those passengers who pose the greatest risk. The passenger-profiling technique involves selecting people who are behaving suspiciously, have an unusual travel pattern or, most controversially, have a certain ethnic or religious background. The system…

  • No connection . . .

    . . . execpt for the tactic. Incredible: The FBI said Monday it had no information to indicate that the three Texas men arrested in Michigan with about 1,000 cell phones in their van had any direct connection to known terrorist groups. Also, a prosecutor in a separate Ohio case said he can¹t prove a…

  • I don’t buy it

    This is what passes for CT analysis at Time. Acceptance that this is less an AQ issue than it is a terrorism issue is a nice change of pace from the class that loves to poo-poo any disrupted plot that doesn’t reveal the perps had wallets full of AQ business cards. Note however the quick…

  • The Difference Between LE and DI

    As a friend from one of the Commonwealth nations points out, “Nice job by the domestic intelligence service,” which is his subtle but well-meaning dig at both our FBI and larger intelligence apparatus. Domestic tip-off; foreign intelligence supplement; and allied intel cooperation all operationalized for the door-kickers inside of a year. Were this a US…

  • Clarity, Quick Hits & A Suggestion

    As I alluded to earlier, it is a little hard to accurately assess things if you’re not prepared to use accurate if un-PC language. US and UK media might have an aversion to mentioning the Muslim connection, but the Italian media apparently does not. Ethnic and religious descriptions are hardly immaterial in situations like this,…

  • More Terror Plot Short Takes

    Bloody day job . . . Surveillance, electronic or otherwise, works:  By late 2005, the probe had expanded to involve several hundred investigators on three continents. They kept dozens of suspects under close surveillance for months, even as some of the plotters traveled between Britain and Pakistan to raise money, find recruits and refine their…

  • Go Big Blue

    As a guy who knows a thing or two about warning systems, I watched again with dismay the misuse and abuse of the homeland security advisory system today. Granted, it isn’t really a “warning” system per se, but the general concept is the same: give people a quick way to assess the threat. The problem…

Briefs

  • Ukraine war: Satellite images reveal Russian defences before major assault

    Satellite analysis by BBC Verify has uncovered extensive fortifications and defenses built by Russia in southern Ukraine as it prepares for a major Ukrainian counter-attack. The satellite images reveal various key points, including Crimea’s west coast, where defense structures like “dragon’s teeth” and trenches have been installed. The small city of Tokmak is fortified with…

  • Ukraine war: Wagner chief vows to hand Bakhmut to Russian army by June

    The head of the Wagner mercenary group, Yevgeny Prigozhin, has declared that control of the Ukrainian city of Bakhmut will be transferred to the Russian army by June 1. Prigozhin claimed that his troops had captured Bakhmut on Saturday, although Kyiv disputed this, stating that it still maintained control of parts of the city. Prigozhin…

  • KeePass Flaw Exposes Master Passwords

    A critical flaw in the popular password manager KeePass has been discovered, potentially exposing the master password of users. The vulnerability, identified as CVE-2023-45678, allows an attacker to execute malicious code remotely, granting them access to the master password stored in memory. This flaw affects various versions of KeePass across multiple operating systems, putting users…

  • Meta Fined €1.2bn for Violating GDPR

    Meta, the parent company of Facebook, has been hit with a record-breaking fine of €1.2 billion for violating the European Union’s General Data Protection Regulation (GDPR). The penalty was imposed by the Irish Data Protection Commission (DPC) following an investigation into Meta’s handling of personal data. The DPC found that Meta failed to meet its…

  • Food Distributor Sysco Says Cyberattack Affects 126,000 Individuals

    Sysco, a major food distributor, has confirmed a cyberattack that has impacted approximately 126,000 individuals. The breach, discovered in May 2023, exposed personal information such as names, addresses, social security numbers, and driver’s license numbers. Sysco promptly launched an investigation, involving law enforcement agencies and third-party cybersecurity experts, to assess the extent of the incident…

  • ​​Samsung Smartphone Users Warned of Actively Exploited Vulnerability

    A recently discovered vulnerability in Samsung smartphones is being actively exploited by attackers, posing a significant threat to users. The flaw, named CVE-2023-12345, allows malicious actors to execute arbitrary code remotely, potentially compromising sensitive user data and device functionality. The vulnerability affects a wide range of Samsung models and versions, prompting urgent warnings from security…

  • OpenAI’s Sam Altman Urges A.I. Regulation in Senate Hearing

    The tone of congressional hearings featuring tech industry executives in recent years can best be described as antagonistic. Mark Zuckerberg, Jeff Bezos and other tech luminaries have all been dressed down on Capitol Hill by lawmakers upset with their companies. But on Tuesday, Sam Altman, the chief executive of the San Francisco start-up OpenAI, testified before…

  • Jeff Bezos’ Blue Origin Wins NASA Contract — Will Compete Against Musk’s SpaceX

    Jeff Bezos has his NASA moon ticket. The billionaire’s space company, Blue Origin, won a key contract from the National Aeronautics and Space Administration on Friday to develop a crewed lunar lander for delivering astronauts to the moon’s surface later this decade under the agency’s Artemis program. The Blue Origin-led effort is effectively a more…

  • 10 Types of AI Attacks CISOs Should Track

    As CISOs work to future proof their cybersecurity strategy and infrastructure for tomorrow’s emerging threats, artificial intelligence (AI) attacks are looming large in their thoughts. Even without the hype that’s billowed around ChatGPT and generative AI’s skyrocketing popularity, AI risk has started to unfold as a growing concern among security researchers and pundits in 2023. Security…

  • Former CFO indicted for diverting $35M to cryptocurrency venture

    Nevin Shetty, a former chief financial officer (CFO) at a Seattle startup, was indicted on May 17 in the United States District Court in Seattle on charges of wire fraud. The indictment alleges that Shetty, 39, diverted approximately $35 million from the startup’s coffers to a cryptocurrency platform under his personal control. Shetty reportedly established this…

  • Workplace AI: How artificial intelligence will transform the workday

    Artificial intelligence has been around for years, but scarcely has it found itself in conversation as much as it has now. The launch of OpenAI’s ChatGPT rocketed generative AI onto the radar of many people who hadn’t been paying much attention – or didn’t feel it was relevant to their lives. This has included workers,…

  • UN expert says Myanmar imported $1 billion in arms since coup, much of it from Russia and China

    A United Nations report reveals that Myanmar’s military junta has been engaged in deadly arms sales with Russia and China, contributing to the escalating violence in the country. The report details the influx of weapons and military equipment, including helicopters and drones, into Myanmar, which have been used by the junta to suppress protests and…

  • Ukraine’s Zelenskyy makes surprise visit to Saudi Arabia

    Ukrainian President Volodymyr Zelensky made a surprise visit to Saudi Arabia ahead of his attendance at the G7 summit in Japan. The purpose of the visit was to participate in the Arab League summit and bolster bilateral relations between Ukraine and Saudi Arabia. During the visit, Zelensky met with Saudi officials and discussed potential areas…

  • G7 agree to ‘starve the Russian war machine’

    The G7 leaders are currently convening their annual meeting in Hiroshima, Japan, where they have reached an agreement to impose new sanctions aimed at undermining the Russian war machine. This decision was outlined in an official statement, emphasizing the G7’s collective commitment to curb Russian aggression. Notably, President Volodymyr Zelensky of Ukraine is scheduled to…

  • Iran condemned after executing three men over recent protests

    Amid ongoing protests and international criticism, Iran has faced condemnation for its recent wave of executions. The country has executed at least 21 people in the past week, including individuals convicted of political crimes and drug offenses. The executions have sparked widespread outrage, with human rights organizations expressing concern over Iran’s disregard for due process…

  • Microsoft Azure VMs Hijacked in Cloud Cyberattack

    A recent cyberattack targeting Microsoft Azure virtual machines (VMs) resulted in the compromise of multiple cloud environments. The attack exploited a vulnerability in the Azure Container Instances (ACI) service, allowing threat actors to escape the container and gain unauthorized access to the underlying VMs. By exploiting this flaw, attackers were able to take control of…

  • Okta’s Security Center opens window to customer insights, including threats and friction

    Okta, a leading identity management company, has launched its Okta Security Center to provide organizations with enhanced insights into their security posture. The Okta Security Center offers a centralized dashboard that consolidates security-related data and provides real-time visibility into potential risks and threats. It enables organizations to proactively monitor and respond to security incidents, ensuring…

  • Researchers Identify Second Developer of ‘Golden Chickens’ Malware

    Security researchers have identified a second developer responsible for the creation of the Golden Chickens malware. The Golden Chickens malware, initially discovered in 2018, is a sophisticated and persistent cyber espionage tool that primarily targets organizations in Southeast Asia. This recent development reveals that the malware was not the work of a single individual, as…

  • Apple Patches 3 Exploited WebKit Zero-Day Vulnerabilities

    Apple has released patches for three zero-day vulnerabilities in its WebKit browser engine that were being actively exploited. The vulnerabilities, tracked as CVE-2023-XXXX, were discovered by security researchers and were being used by malicious actors to gain unauthorized access and execute arbitrary code on targeted devices. The flaws were found in the way WebKit handles…

  • Crypto Murder Drives Urgent Need for Regulations in South Korea

    A murder case in South Korea arising from a crypto dispute is forcing authorities to speed up the implementation of crypto regulations. South Korea has embraced blockchain technology and has been positively working towards regulations. The country is also building a public metaverse in Seoul and Seongnam. But a rise in a new sector also gives rise…

  • Trends and Predictions of Growing Cryptocurrency Cyberattacks

    Cryptocurrencies will almost certainly continue adoption and further adaptation despite the large 2022 downturn. Growth of the ecosystem and changes underway in 2023 carry important implications for cyberattack risk to both end users and organizations bridging into cryptocurrency throughout the next two years as blockchain-based financial technology further matures. Recent activity and changes to cryptocurrency…

  • Can blockchain really improve trust in AI?

    When Austrian-born physicists Lise Meitner and Otto Frisch first split the atom in the late 1930s, they probably didn’t anticipate their discovery would lead a few years later to the atomic bomb. The artificial intelligence (AI) revolution is arguably no different. AI algorithms have been around for decades. The first artificial neural network, the perceptron, was…

  • Why Most Cryptocurrency Fraud Cases Take Place in China and the US

    Crypto crime has become a major concern to regulatory authorities. There have been sharp increases in crypto crime, especially hacks related to fraud, in recent years as Web3 becomes an integral part of daily life. But the spread is not even and there are many emerging trends and patterns to crypto crime, which can be…

  • Cryptocurrency trading in UK should be regulated as form of gambling, say MPs

    UK authorities should regulate cryptocurrency trading as a form of gambling rather than a financial service, parliament’s Treasury committee has said after a fresh inquiry into the industry. The government must avoid wasting more taxpayer funds promoting tech innovations such as digital tokens, without demonstrating the clear benefits to the public, MPs said in a…

  • Ukraine and China Will Dominate G7 Summit, but a New Threat Lurks: A.I.

    At the Group of 7 summit President Biden is prepared for discussion with his closest allies on two crucial issues: how to better arm Ukraine as it enters its counteroffensive against the Russian invaders, and how to slow, or halt, the downward spiral in relations with China. At some point during the three days of…

  • Ukraine’s Foreign Minister and Visiting Chinese Envoy Discuss Peace, but Next Steps Unclear

    Ukraine’s foreign minister met with a visiting Chinese mediator to discuss how to end Russia’s war. However, Foreign Minister Dmytro Kuleba held his government’s position that Ukraine would not accept any proposal involving the loss of its territories or “freezing of the conflict.” Chinese leader Xi Jinping’s government says it’s neutral and wants to serve…

  • Japan, UK Renew Security Ties, Aircraft Carrier to Deploy in 2025

    The United Kingdom’s Prime Minister, Rishi Sunak, and Japanese Prime Minister, Fumio Kishida, will sign a new agreement to deepen security ties, called “Hiroshima Accord”. This agreement included a UK commitment to deploy an aircraft carrier strike group to the Indo-Pacific in 2025. It will also cover trade and investment, collaboration on science and technology,…

  • The Latest Flash Point Among Ukraine’s Allies Is Whether to Send F-16s

    Britain and the Netherlands are pushing to provide Ukraine with F-16 fighter planes, however the United States is reluctant to do so. Several European allies are prepared to give their F-16s to Ukraine, but the U.S. remains unconvinced that Ukraine needs the expensive jets. Kyiv’s pilots are currently not even allowed to train on the…

  • PaperCut vulnerability abused by several threat actors could impact 70,000 organizations

    The article highlights a critical vulnerability called “PaperCut” that affects print management software commonly used by organizations. The vulnerability could potentially allow threat actors to execute arbitrary code with elevated privileges, compromising the security and integrity of the affected systems. The flaw exists in the way the software handles printer job submission, which could be…

  • Microsoft Teams Features Amp Up Orgs’ Cyberattack Exposure

    Certain features of Microsoft Teams, a popular collaboration platform, can increase organizations’ exposure to cyberattacks. One potential vulnerability lies in the ability for external participants to join Teams meetings without needing to be authenticated, which can lead to unauthorized access and data breaches. Additionally, the integration of third-party apps and plugins within Teams introduces potential…

  • 4 Countries Join NATO Cyber Defense Center

    It has been announced that four countries, namely Belgium, Denmark, Germany, and Poland, have joined the NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE) in Estonia. The CCDCOE is a multinational hub for research, training, and exercises in the field of cybersecurity. The addition of these countries expands the collaboration within NATO and strengthens its…

  • Millions of Smartphones Distributed Worldwide With Preinstalled ‘Guerrilla’ Malware

    A discovery of a massive campaign involving millions of smartphones worldwide that were distributed with preinstalled malware known as “Guerrilla” has been made; The group behind the campaign is tracked by the cybersecurity firm as Lemon Group. The malware was found on a wide range of devices, including popular brands such as Samsung, Xiaomi, Oppo,…

  • Can you recover stolen Bitcoin from crypto scams?

    The process of recovering stolen Bitcoin from cryptocurrency scams is difficult and complex. The prevalence of cryptocurrencies has led to an increase in scams and other fraudulent practices that prey on the gullible. Numerous people have suffered significant financial losses as a result of falling for different crypto scams, such as phishing, rug pulls and…

  • Russian Hacker Charged in $200M Crypto Ransomware Scheme Against US Infrastructure

    The United States Department of Justice has charged a Russian national with two indictments. The individuals executed attacks against U.S. infrastructure. The United States Department of Justice (DOJ) has charged a Russian national with a crypto-ransomware scheme targeting the United States infrastructure. In a press release released on May 16, the Justice Department said it…

  • What is Worldcoin, the iris-scanning cryptocurrency backed by OpenAI CEO Sam Altman

    Sam Altman, the CEO of OpenAI, is reportedly close to securing $100 million for Worldcoin, a unique cryptocurrency that involves scanning people’s irises. Co-founded by Altman and Alex Blania in 2019, Worldcoin has an ambitious vision: to give a share of a new digital token to every human being on Earth. But what is Worldcoin…

  • Airdrops are great, but be aware of the risks

    Airdrops have emerged as a powerful tool for token distribution, user acquisition and community building as the blockchain industry has grown. They provide a unique opportunity for projects to distinguish themselves, incentivize desired behaviors and foster long-term relationships with their user base. But the question remains: Do airdrops work? Based on my prior research in the…

  • Federal Reserve Bank of Chicago Breaks Down Crypto Runs of 2022

    The Federal Reserve Bank of Chicago (Chicago Fed) has released a letter combining the major crypto runs that happened in 2022. The bank pointed out the interesting background, data, and when these firms filed for bankruptcy. The letter takes users through Celsius, Voyager Digital, BlockFi, Genesis, and FTX. The Chicago Fed mentioned that due to…

  • Gains Near Bakhmut Raise Ukraine’s Hopes of a Turning Tide

    Russian forces spent a year fighting their way to surround the city of Bakhmut in eastern Ukraine. By March it seemed they were close to succeeding. However, now Ukrainian forces have taken back territory north and south of the city in just a few days. Ukraine’s recent gains around the city are not huge, and…

  • Attackers Target macOS With ‘Geacon’ Cobalt Strike Tool

    Attackers have been observed employing a new variant of Geacon as a substitute for Cobalt Strike on macOS systems, highlighting the evolving tactics of threat actors. Geacon, originally a Windows-based tool, is a command-and-control framework that enables remote access and control of compromised machines. By utilizing Geacon on macOS, attackers can gain a foothold in…

  • Scammers exploit AI trend with fake ChatGPT apps on Google Play, Apple App Store

    Fake ChatGPT apps have been discovered on the Google Play Store and Apple App Store, posing a significant threat to user privacy and security. These apps mimic the popular ChatGPT language model but aim to deceive users into sharing sensitive information or downloading harmful content. Users are advised to be cautious and only download apps…

  • US Offering $10M Reward for Russian Man Charged With Ransomware Attacks

    The United States government has announced a $10 million reward for information leading to the arrest and conviction of a Russian man accused of carrying out ransomware attacks. The individual in question, Evgeniy Bogachev, is believed to be the mastermind behind the notorious Zeus banking Trojan and Cryptolocker ransomware. Bogachev’s activities have caused substantial financial…

  • Kim Jong Un Inspects North Korea’s First Military Spy Satellite

    North Korean leader Kim Jong Un has inspected the country’s first military spy satellite, giving the go-ahead for what state media described as a “future action plan”. A military reconnaissance satellite was one of the key defense projects Kim outlined in a 2021 plan to modernize and advance the country’s military prowess.  The United States…

  • Critical Infrastructure Organizations Warned of BianLian Ransomware Attacks

    Critical infrastructure organizations have been warned about the emergence of BianLian ransomware, a highly sophisticated threat that specifically targets sectors crucial to national infrastructure such as energy, transportation, and healthcare. BianLian utilizes advanced evasion techniques to bypass traditional security measures, making it extremely difficult to detect and mitigate. The attackers behind BianLian demonstrate a deep…

  • US Debt Ceiling: Biden and Republicans Hopeful of a Deal

    President Joe Biden and Republican leaders have expressed optimism that a deal to raise the U.S. debt ceiling is within reach, however the Speaker of the House, Kevin McCarthy, told reporters the two sides are still far apart. Without a deal, the U.S. could enter a calamitous default on its $31.4 trillion debt as soon…

  • Ukraine Says It Shot Down Hypersonic Russian Missiles Over Kyiv

    Ukraine’s air defense shot down six of Russia’s hypersonic Kinzhal missiles during a barrage of missiles and drones aimed at Kyiv, the capital. Russia’s Defense Ministry said at least one Kinzhal had hit an American-made Patriot system, the most advanced U.S. ground-based air-defense system.  Up until recently Ukraine had lacked the capability to intercept Kinzhals…

  • Libra-related Sui blockchain fixes critical bug that put ‘billions’ at risk

    The Sui blockchain network quietly fixed a bug that could have put “billions of dollars” at risk, according to a May 16 announcement from Zellic, the security firm hired to audit the network’s security. The bug was in a dependency of the bytecode verifier, which ensures that the human-readable Move language used to write smart contracts…

  • Research from College of Business explores impact of celebrity endorsement of cryptocurrency

    Share to Facebook Share to Twitter New research from the University of Nevada, Reno College of Business and Vanderbilt University explores how celebrity endorsement affects an initial coin offering’s (ICO) success. Similar to initial public offerings (IPO) in stock, ICOs raise funds to develop things like a platform or business by issuing a new cryptocurrency…

  • Do Kwon Failed to Reveal $1 Billion Deal With Jump Trading, Says SEC

    The U.S. Securities and Exchange Commission (SEC) alleges that Jump Trading earned $1.2 billion from a deal to boost Terra’s liquidity before it collapsed. The agency filed court papers Friday naming Jump as the anonymous beneficiary mentioned in its civil suit against Kwon in December. Jump allegedly bought “tens of millions” of dollars in the…

  • Building a secure crypto ecosystem: Best practices for investors and crypto exchanges

    The crypto industry has witnessed a meteoric rise in popularity over the past decade, with millions worldwide investing in this asset class. Global crypto transactions will total to around $43 billion in 2023, up 24% from $34.30 billion the previous year. However, with this rise in popularity, there has also been a corresponding surge in…

  • EU Countries OK World’s First Comprehensive Crypto Rules

    European Union members have given final approval to the world’s first comprehensive cryptocurrency regulations. EU finance ministers met in Brussels Tuesday (May 16) to approve the regulations, which were accepted by the European Parliament in April, Reuters reported, noting that regulating the industry has gained new urgency following last year’s collapse of FTX. “Recent events have confirmed…

  • At least 16 killed as Pakistan tribes clash over coal mine

    A clash between two tribes over the ownership of a coal mine in northwest Pakistan has killed at least 16 people and injured over 10. Officials said the incident occurred late on Monday and was a part of a decades-old tribal rivalry. The mine is in Darra Adam Khel area of Khyber Pakhtunkhwa province, bordering…

  • Kyiv hit by ‘exceptional’ number of missiles

    Kyiv has been targeted by further Russian air attacks with an attack of 18 missiles. Ukraine said all 18 missiles were shot down and footage showed air defenses destroying targets over the city. Russia’s attack used drones and missiles and Russia reported that its attack had hit all its targets. Moscow intensified its air campaign…

  • Companies Have to Figure Out the Skills They Need to Reap AI Benefits

    Organizations need to determine how they can benefit from artificial intelligence (AI) so that they can build new skill sets that use AI to receive these benefits. As many as 97% of workers believe companies should prioritize AI skills in their employee development journey, according to a survey released by Salesforce.com which polled working adults…

  • Toyota Discloses Decade-Long Data Leak Exposing 2.15M Customers’ Data

    Toyota has disclosed that for more than 10 years, a misconfigured cloud bucket left more than 2.15 million customer records exposed to the open internet. According to the disclosure, the sensitive data from Toyota’s cloud-based Connected services was open to unauthorized access from November 2013 to this April.  However, the breach was only said to…

  • PharMerica Breach Hits Over 5.8 Million Customers

    Nearly six million customers of a popular nationwide pharmacy services provider, PharMerica, have had their personal, health insurance, and medical data exposed in a March cyber-attack. PharMerica provides services from over 70,000 backup and local pharmacies. In March it revealed that the Louisville headquarter firm suffered a serious data breach. The breach had lasted two…

  • Senate Bill Looks to Train AI-Ready Workforce, Focus on Risk Mitigation

    New legislation is responding to the federal workforce’s knowledge gap concerning advancing artificial intelligence (AI) systems. This legislation aims to create a new training program specifically for leaders at government agencies. As AI continues to rapidly evolve, the ultimate goal of the bill is to improve the federal workforce’s skills and acumen regarding AI applications.…

  • Why DeFi Cybersecurity Can Never Sleep

    Having a bug bounty program to pay white hat hackers for reporting vulnerabilities is one thing. But staffing an always-on security desk to respond to those reports can be really expensive, said Immunefi founder and CEO Michell Amador. “Lots of people don’t want to wake up on Sunday at 4 a.m. in the morning to…

  • How This Scammer Stole Over $15M Worth of Crypto

    A hacker has stolen over $15 million from crypto wallets by imitating the website of the HitBTC exchange. The hackers cloned the exchange’s user interface to lure victims into connecting their wallets by clicking “Approve.” According to the crypto tracking platform MistTrack, hackers created a fake website, “hitb2c[.]lol,” to impersonate the original website, “hitbtc[.]com.” After a user connects…

  • US Justice Department on the hunt for DeFi hackers and thieves

    The United States Department of Justice’s (DOJ) crypto tsar is cracking down on Decentralized Finance (DeFi) hackers and exploiters amid a four-year rise in illicit crypto activity. In a Financial Times report published on May 15, Eun Young Choi, director of the Justice Department’s National Cryptocurrency Enforcement Team (NCET), stated that the department is focusing on…

  • North Korean crypto thefts target Japan, Vietnam, Hong Kong

    North Korea is using cyberattacks to target Japanese cryptocurrency assets. Hacker groups affiliated with North Korea have stolen $721 million from Japan since 2017, according to a study by a U.K.-based compliance specialist. That is equal to 30% of the total of such losses worldwide. Pyongyang is believed to have targeted the crypto assets of other…