Start your day with intelligence. Get The OODA Daily Pulse.

Home > OODA Analysis and Briefs

Analysis

  • Rudderless Ship

    Former CIA spy hunter Paul Redmond, who helped catch notorious Moscow mole Aldrich Ames, has withdrawn from consideration to become the Bush administration’s top counterspy, U.S. intelligence officials say. Mr. Redmond had been selected to be national counterintelligence executive, but backed out after the FBI held up his formal appointment by conducting a lengthy background…

  • Yellow: The New Blue

    A bipartisan push on Capitol Hill to strip the hue from the government’s color-coded terrorist alert system is gaining momentum. A package of legislation moving through the House eliminates the Department of Homeland Security’s use of colors to change the threat level, and calls for more specific threat information to be shared with the private…

  • Here Comes the Judge

    True this: In Posner’s analysis, the director of national intelligence (DNI), created by Congress to be the president’s top intelligence adviser, was given too much to do. DNI John D. Negroponte oversees the CIA and 15 other intelligence agencies, including those at the Pentagon. Negroponte’s staff, which has grown to about 1,000, “has become a…

  • DHS: Bleeding Out

    The Homeland Security Department is losing top managers and rank-and-file employees in a brain drain that could affect morale and the nation’s safety, according to members of Congress and labor experts. Homeland Security is “hemorrhaging on the front lines and higher up,” says New York University professor Paul Light, an expert on the federal workforce.…

  • Rocky Mountain High

    “. . . Colorado . . .” The idea that a whole lot of people all checking each other can converge on acceptably accurate results, and do it faster than a few experts, is relatively new. But once people have seen it work, they’re eager to try it. During the period leading up to the…

  • This is what happens . . .

    . . . when the “pros” can’t be bothered to do the job properly: The top US general this week suggested that the Pentagon had not adequately vetted documents that allege Russia passed intelligence about US troop movements to Saddam Hussein early on during the 2003 invasion of Iraq. On Tuesday – the same day…

  • Modern Chinese Secret (gathering)

    A U.S. State Department purchase of more than 15,000 computers made by Lenovo Group of China is starting to draw criticism, in the latest sign of American unease about the role of foreign companies in the domestic economy. I’m sorry; last year wasn’t this called “IBM”? I know somewhere in the DC area a certain…

  • Go Eliot, Go!

    Sometimes the most useful information is in plain sight—as long as you know where to look for it. . . . and “One of the non-negotiables I will impose [is single sign-on],” Jardines said. “We may not take the five or six separate networks and tell them, ‘You have to do away with yours,’ [but]…

  • Get Some!

    Uncle Cofer wants you! Upon further reflection, I have to add, what a joy it must be to deploy with such an outfit. Imagine every Army (or Marine) deployment you’ve ever been on only without the hurry-up-and-wait, the endless paperwork, the outrageously clumsy and oudated equipment, and the drudgery. How successful would such an endeavor…

  • It Works Both Ways

    I won’t attempt to pile on the good work that has been done here and here in addressing those would wave a dismissive hand at the public release of captured media. I’ll merely point out to all the nay-sayers and unoriginal thinkers that there is nothing stopping you from forming your own Army and producing…

  • HLS: Serious or Not Serious II

    Installing radiation detectors at U.S. entry points is taking too long and costing too much, says a congressional watchdog agency whose undercover investigators breached security by slipping nuclear material into the United States. In a test last year, the small amounts of cesium-137, which is used in industrial gauges, triggered radiation alarms in Texas and…

  • Does This Compute?

    According to FBI chief information officer Zalmai Azmi, the agency lacks the funds necessary to deploy essential technology, such as e-mail, for its investigators. Azmi said the bureau’s annual budget of $10 billion for unclassified networks barely covers costs and can only provide e-mail for 22,000 of its 30,000 employees. The FBI has set up…

  • JJA Speaks

    Commentary on the released docs from beyond the grave.

  • That CIA-LOC IPO is on the Horizon

    Did I mention that the gargoyles are here?

  • Avast!

    If you or someone you know is up on naval history – in particular piracy issues – from the1700-1800s, please drop me a line. Working on a little side writing project and need some expertise. You can be as anonymous as you want to be.

Briefs

  • Drizly Agrees to Tighten Data Security After Alleged Breach

    The Federal Trade Commission has announced that it would be pursuing action against Boston-based Uber subsidiary Drizly. The company delivers beer, wine, and spirits in stats where it is legal, and boasts partnerships with retailers in hundreds of US cities. The group has agreed to tighten its security practices and limit data collection after an…

  • Typosquat Campaign Targeting Android, Windows Users Now Counts 600+ Domains

    Security researchers have found a new campaign that is targeting Android and Windows users. The researchers have found that there may be a much larger set of domains associated with the campaign that was originally discovered by Cyble and Bleeping Computer. The campaign is classified as typosquatting and consists of 27 mimicked brands over 600…

  • Vice Society Ransomware Campaigns Continue to Impact US Education Sector

    Vice Society, a threat actor known for ransomware and extortion campaigns, has been identified in operations targeting the US education sector. Microsoft security researchers released an advisory about Vice Society and its recent activities on Tuesday. The write-up states that the group’s latest payload is a Zeppelin variant that contains specific file extensions. Microsoft found…

  • Israel-Lebanon gas field deal staves off war threat

    Israel and Lebanon have technically been in a state of war since Israel’s founding in 1948, in a dispute over rights to a gas field in the Mediterranean Sea. The two countries have signed an agreement that sets their borders in the Mediterranean. Hezbollah, the militant and political group in Lebanon had been threatening to…

  • 15 killed, 40 injured in terrorist attack claimed by ISIS in Iran

    A terrorist attack at the Shahcheragh Shrine in the city of Shiraz in southern Iran has killed at least 15 people and injured 40 others on Wednesday. Two of the suspected attackers have been arrested by Iranian security forces, and a third suspect is at large. ISIS has claimed responsibility for the attack.  ISIS claimed…

  • Hive Ransomware Group Leaks Data Stolen in Tata Power Cyber-Attack

    The Hive ransomware-as-a-service group has claimed responsibility for a cyberattack that compromised Tata Power. The attack was disclosed by the company on October 14, and likely occurred on October 3. Since the attack, the Mumbai-based power company confirmed that all critical operational systems are functioning again. The leak reportedly affected several of Tata’s 12 million…

  • Australia seeks stiffer penalty for data breaches amidst spate of security incidents

    Australia is seeking bigger penalties for serious or repeated data privacy breaches. The penalties could be raised as high as $31.57 million from $1.4 million. The announcement comes as Australia has faced a series of cybersecurity incidents that have had serious consequences across the country, such as a recent attack on the insurance group Medibank.…

  • Crypto Exchange FTX to Compensate API Phishing Victims With as Much as $6M

    Cryptocurrency exchange FTX has agreed to reimburse victims of this weekend’s phishing attack with up to $6 million, according to the exchange’s CEO, Sam Bankman-Fried. The phishing scam was in relation to 3Commas, a trading-bot platform that interlinks with FTX via an application programming interface (API). Scammers reportedly cloned the 3Comma’s website before performing trades…

  • Hackers increasingly targeting Internet of Things devices

    In the last quarter of this year there has been a 98% rise in malware detected targeting Internet of Things devices, according to a new report by threat intelligence agency SonicWall. It comes as the number of never-before-seen malware variants also spiked, rising by 22% year-on-year. SonicWall says one of the biggest concerns for companies is…

  • Hacktober’s $718M Losses Are an Existential Threat to DeFi

    October hasn’t been kind to crypto, with $730 million lost to 18 hacks this month alone, driving the 2022 total loss to $3 billion. With decentralized finance, or DeFi, as the prime target, it’s becoming a serious enough problem that calling 2021 The Year of the Hack may have been premature on the part of blockchain…

  • Biden Administration Wants To Make It Easier To Seize Crypto Without Criminal Charges

    Buried deep in a 61-page recent report by the U.S. Attorney General, the Biden Administration called for a dramatic expansion in the federal government’s ability to seize and keep cryptocurrency. If enacted, the proposed changes would bolster both criminal forfeiture, which requires a conviction to permanently confiscate property, as well as civil forfeiture, which doesn’t…

  • Binance Reveals Getting Closer to Identify Hacker that Drained $570M

    Binance is on the verge of uncovering the hacker(s) behind the $570 million exploit on its cross-chain bridge, BSC Token Hub, earlier this month. In a recent interview with CNBC’s ‘Squawk Box Europe,’ Binance CEO Changpeng “CZ” Zhao said the firm had received substantial tips from law enforcement authorities to identify the hacker(s) that drained two…

  • US Charges Ukrainian ‘Raccoon Infostealer’ With Cybercrimes

    The US Justice Department announced on Tuesday that a Ukrainian man has been charged with computer fraud in connection to a cybercrime operation dubbed Raccoon Infostealer. The man, Mark Sokolovsky, allegedly infected millions of computers with malware during the operation. He is being held in the Netherlands while the US seeks his extradition. The Raccoon…

  • POS Malware Used to Steal Details of Over 167,000 Credit Cards

    Group-IB has released a new advisory regarding a malware campaign deploying point-of-sale (POS) malware tools to steal credit card information from payment terminals. According to the advisory, the POS malware has been used to steal the information of over 167,000 credit cards. Group-IB identified a command and control server of the POS malware that was…

  • Apple Fixes Actively Exploited iOS and iPadOS Zero-Day Vulnerability

    Apple released new updates earlier this week that patch zero-day vulnerabilities in iOS and iPadOS devices. The flaws fixed in the latest updates have reportedly been exploited in the wild by threat actors. One of the flaws is an out-of-bounds write issue in the kernel and could be exploited by rogue applications, leading to arbitrary…

  • See Tickets Discloses Major Card Data Breach

    See Tickets, a global ticketing giant, has notified its customers of a data breach that impacted financial information. According to the vendor, the breach lasted for over two years. The company is owned by the French media firm Vivendi, who revealed that the data breach occurred earlier this week. The company has not made an…

  • Clashes in Iran after crowds gather at Mahsa Amini’s grave

    Clashes between protesters and Iranian security forces were reported in the home city of Mahsa Amini as crowds gather near her grave to protest and mark 40 days since she died in custody. According to a Kurdish rights group, security personnel fired live rounds and tear gas into Saqqez’s Zandan Square.  Thousands of mourners gathered…

  • China accused of illegal police stations in the Netherlands

    The Chinese government has been accused of establishing undeclared police stations in the Netherlands. There has been evidence found of at least two “overseas service stations” that claim to provide diplomatic services. These stations are also attempting to try to silence Chinese dissidents in Europe.  The Dutch foreign ministry spokeswoman said the existence of these…

  • Polygon-Based Decentralized Exchange Quickswap Loses $220K in Flash Loan Exploit

    On Monday, the Polygon-based decentralized exchange (dex) Quickswap lost $220K in a flash loan exploit and following the attack, the team detailed the Quickswap Lend platform will be terminated. 2022 has been quite the year for decentralized finance (defi) hacks as billions have been stolen due to mistakes, flash loans, faulty smart contracts, and unchecked lines…

  • Cryptocurrency hot wallet explained

    Cryptocurrency is digital money. You can store it in a cryptocurrency wallet. A cryptocurrency wallet is an app or hardware that allows you to make transactions with your digital coins. These wallets have different features and functions, but each has pros and cons. Here’s what you need to know about them. A cryptocurrency wallet is an…

  • Hackers Are Taking Advantage of Typing Mistakes to Steal Cryptocurrency

    A group of hackers have taken advantage of typing mistakes in order to introduce malware to Android phones and Windows-based PCs. Using a technique called typosquatting, which consists of registering domains that are dramatically near to the ones of official brands of organizations, hackers are getting data and private keys from unsuspected users, according to…

  • Blockchain security companies tackle cryptocurrency theft, ransom tracing

    According to data from the Rekt leaderboard, cybercriminals have stolen as much as $3 billion of investor funds through 141 various cryptocurrency exploits since January, putting 2022 on track to top 2021 levels of digital currency malfeasance. Comparitech’s cryptocurrency heists tracker indicates that since 2011, hackers have stolen $7.9 billion in cryptocurrency worth about $45.5…

  • Apple tightens its rules on crypto and NFTs in its App Store

    Apple clarified its rules on cryptocurrencies and non-fungible tokens (NFTs) laying out what apps are allowed to do with these technologies. On crypto exchanges, Apple said in updated App Store rules on Monday, that apps may facilitate “transactions or transmissions of cryptocurrency on an approved exchange.” But the app can only be offered in countries or…

  • Ukraine Warns of Cuba Ransomware Campaign

    Ukrainian authorities have warned of a ransomware campaign targeting Ukrainian organizations. The Ukrainian CERT stated that it has discovered phishing emails that have appeared to be sent from the Press Service of the Armed Forces of Ukraine. Recipients of the phishing emails are prompted to click on a malicious link embedded in the email that…

  • Iranian Atomic Energy Agency Admits Email Hack

    The Atomic Energy Organization of Iran (AEOI) has identified an unnamed foreign country for stealing and leaking sensitive internal emails belonging to the organization. Iranian hacktivist group the Black Reward published the documents after attempting to extort Iranian authorities into releasing political prisoners. The attack committed by the hacktivist group was an attempt to achieve…

  • Italy’s Meloni commits to EU, rejects fascism in speech to MPs

    Italian Prime Minister Giorgia Meloni confirmed Italy’s support for the European Union, NATO and Ukraine in her first address to parliament. The speech comes one month after her party won a historic election. Meloni was sworn in on Saturday as Italy’s first female leader and on Tuesday, rejected any links with her country’s fascist past. …

  • Six killed as Israel targets militants in West Bank raid

    Five Palestinian gunmen were killed in an Israeli raid against a militant group in the West Bank. A sixt Palestinain was shot and killed by Israeli troops who were attacked with stones while Palestinians protested the raid. The operation was in the northern city of Nablus and targeted the new Lion’s Den group.  The group…

  • DHL Replaces LinkedIn As Most Imitated Brand in Phishing Attempts

    Popular shipping company DHL has replaced Linkedin as the most impersonated brand being imitated in phishing attempts. The brand was identified as the most imitated between July and September of this year by Check Point security in its Q3 Brand Phishing Report. The new data finds that phishing campaigns impersonating DHL account for roughly a…

  • DeFi Is At War: But Not With Who You Think

    DeFi is at war. Total value locked (TVL) is at its pre-pandemic level of $50 billion, along with the prices of bitcoin and ethereum. Rising inflation is driving the cost of money out of fintech innovation investment and raising capital is becoming more difficult. Many fintechs are facing downsizing and staff layoffs while their customers…

  • Cryptocurrency cold storage explained

    Cryptocurrency is a digital asset designed to work as a medium of exchange. Cryptocurrency uses cryptography to secure transactions, control the creation of additional units, and verify the transfer of assets. The first cryptocurrency to gain widespread adoption was Bitcoin in 2009. Since then, numerous other cryptocurrencies have been created that offer different features and benefits…

  • Gate​.io users at risk as scammers fake giveaway on hacked Twitter account

    Hackers took over the official Twitter account of crypto exchange Gate.io, putting over 1 million users at risk of losing funds to an ongoing fraudulent Tether giveaway. Social media platform Twitter serves as the most effective medium to reach the crypto community. As a result, the trend of hacking into official Twitter handles of verified accounts…

  • 3Commas issues security alert as FTX deletes API keys following hack

    Automated crypto trading bot provider 3Commas issued a security alert after identifying certain FTX API keys being used to perform unauthorized trades for DMG cryptocurrency trading pairs on the FTX exchange. 3Commas and FTX conducted a joint investigation in relation to reports from users of unauthorized trades on the DMG trading pairs on FTX. The duo…

  • Hacker Steals $300K From Olympus DAO, Then Returns It All the Same Day

    OlympusDAO is the latest target of a crypto cyberattack, as a thief made off with 30,000 OHM tokens—worth about $300,000—early this morning. But the attacker either had a change of heart or was a white hat hacker all along, as they sent back the funds to the DAO hours later. Community members were first alerted…

  • FBI Says Iranian Threat Group Likely to Target US Midterms

    The FBI has warned that the Iranian threat group Emennet Pasargad is positioned to target the US elections and officials and companies associated with the process. The group regularly engages in hack-and-leak campaigns. Although the group is primarily dedicated to targeting Israeli officials, the FBI warns that the threat actor may be active in operations…

  • 50 killed in air raid on Kachin rebels in Myanmar, reports say

    An air raid that targeted a large ethnic insurgent group in Myanmar killed at least 50 people and injured 100. The death toll was communicated in a report by Colonel Naw Bu, a spokesman of the Kachin Independence Army. According to eye witness accounts, three bombs were dropped on a concert by aircraft. The concert…

  • Rishi Sunak wins race to become the UK’s new prime minister

    Rishi Sunak will become the United Kingdom’s new prime minister after winning the contest by the ruling Conservative Party. The contest was caused by the resignation of Liz Truss last week. Sunak’s win occurred on Monday. Liz Truss’s resignation occurred due to her disastrous tax plans and policy u-turns that caused the markets to plunge…

  • US Healthcare Organizations Warned of ‘Daixin Team’ Ransomware Attacks

    The US Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the Department of Health and Human Services (HHS) have issued a joint alert. The alert pertains to a new cybercrime group called Daixin Team that targets organizations in the healthcare sector. The threat actor has been active since June 2022,…

  • Google Unveils Open Source Project to Improve Software Supply Chain Security

    Last Thursday Google called for contributors to collaborate on an open source project titled Graph for Understanding Artifact Composition (GUAC). The project is part of Google’s efforts to improve software supply chain security. GUAC is still in the early stages, but Google hopes that the project will change how the industry perceives software supply chains…

  • Clicker Malware Garners Estimated 20 Million Downloads

    McAfee has found that the clicker malware that was designed to facilitate ad fraud is present in 16 mobile apps available in the Google Play Store. Google has since removed the apps, however, they racked up an estimated 20 million downloads. The malware was identified in apps such as flashlights, QR readers, cameras, unit converters,…

  • New Phishing Campaign Targets Saudi Government Service Portal

    Phishing domains impersonating the Saudi government service portal Absher have popped up online, CloudSEK says. The phishing portals are designed to provide fake services to citizens and steal credentials. CloudSEK published an advisory concerning the threat last Thursday. The threat actors are sending phishing SMS messages containing a link to the illegitimate sites. The messages…

  • European Police Warn of Metaverse Cyber-Threats

    Europol has warned that Facebook’s Metaverse and similar immersive internet experiences could be a target for ransomware and cybersecurity crimes like identity theft, money laundering, and more. Europol released a report from the Innovation Lab that urges security authorities to begin thinking about the potential threats the metaverse could bring. The money and people involved…

  • Advantages And Disadvantages Of Blockchain Technology

    A blockchain is a network of decentralized and distributed data (ledger), meaning the users share the ownership and management of the network through computer nodes. As a database, blockchain stores information in a digital format. Blockchain technology stores data in blocks and link them together to form a chain. The blocks have a specific capacity and,…

  • Taking measures to secure the metaverse

    The internet you know today is gradually going the way of the original web. The aspect of web3 that’s most exciting–and most concerning to cybersecurity wonks like me–is the metaverse, an immersive 3D experience where people can explore, shop, play games, spend time with distant friends, attend a concert, or hold a business meeting. The…

  • Twitter user saves cross-chain bridge from potential exploit

    A cross-chain bridge between BitBTC and the Ethereum layer-2 network Optimism has been able to avoid a potentially costly exploit thanks to the work of an eagle-eyed Twitter user. The custom cross-chain bridge offers a ramp for users to send assets between Optimism’s network and BitAnt’s decentralized finance (DeFi) ecosystem, which includes yield services, nonfungible…

  • Ethereum Alarm Clock exploit leads to $260K in stolen gas fees so far

    A bug in the smart contract code for the Ethereum Alarm Clock service has reportedly been exploited, with nearly $260,000 said to have been swiped from the protocol so far. The Ethereum Alarm Clock enables users to schedule future transactions by pre-determining the receiver address, sent amount and desired time of transaction. Users must have the…

  • The Next Terra Luna? A Major $5 Billion Cryptocurrency Could Be About To ‘Self-Destruct’—Potentially Hitting The Price Of Bitcoin and Ethereum

    Bitcoin, Ethereum and the wider crypto market was hard hit by the collapse of the terra stablecoin and its support coin luna earlier this year—with the market’s “fate” still to be decided. The bitcoin price has crashed under $20,000, down more than 70% from its all-time highs, while ethereum and other major cryptocurrencies have suffered even…

  • ‘FurBall’ Spyware Being Used Against Iranian Citizens

    Analysts at ESET have found a new Android malware variant dubbed FurBall being used to target and spy on Iranian citizens. The spyware’s deployment is likely an extension of the wider Domestic Kitten campaign launched by the threat actor APT-C-50. Although the spyware has undergone some new scripts and changes, the basic functionality matches that…

  • Cyber-Enabled Crimes Are Biggest Police Concerns

    Interpol has released its first ever Global Crime Trend report, listing cyber-related crimes such as ransomware, phishing, and money laundering as the biggest threat to society today. The study was created based on data received from 195 member countries. In addition, Interpol used information and analysis from external sources to compile the report. Money laundering…

  • This old malware has been rebuilt with new features to use in ransomware attacks

    Security company Mandiant has discovered that a new variant of the Ursnif malware, also known as Gozi, has repurposed into a backdoor trojan that has been described as very dangerous. The backdoor trojan will likely be used in ransomware attacks, the security firm says. Ursnif is one of the oldest and most successful forms of…

  • Johnson eyes race to replace Truss as UK PM

    Liz Truss resigned as Prime Minister of the UK on Thursday after 45 days in office. Boris Johnson and former finance minister Rishi Sunak lead the potential contenders for Truss’ replacement. Johnson has not confirmed whether he will run, however, his allies are working to gather support.  Boris Johnson was forced to step down in…

  • UN agency calls on Myanmar’s neighbors to protect asylum seekers

    A United Nations refugee agency has begun appealing to countries neighboring Myanmar to end the return of asylum seekers back to Myanmar. People are fleeing Myanmar due to indiscriminate violence against civilians, which has been occurring across the country. Fighting between Myanmar’s military and ethnic armed groups in several border areas has also forced people…

  • Far-right leader poised to govern Italy despite Putin row

    Giorgia Meloni and her fiar-right coalition allies have met with Italian President Sergio Mattarella and stated they are ready to form a government. Mattarella is poised to ask Ms Meloni to become prime minister in the coming hours. Ex-Prime Minister Silvio Berlusconi attended the talks, despite leaked pro-Putin remarks that shook the coalition recently.  Meloni…

  • Imran Khan disqualified from holding office for five years, Pakistan’s election commission rules

    The Election Commission of Pakistan has ruled the Pakistan’s former Prime Minister Imran Khan will not be able to hold political office for five years. This move was announced on Friday and is likely to increase the political tension in the country. The ECP chief stated the Khan was disqualified due to being involved in…

  • Hacker Steals $8.4 Million from Moola Market DeFi Protocol

    As cybercrime continues to be an important subject in the decentralized finance (DeFi) sector, the latest incident sees Moola Market being exploited for over $8.4 million. In a surprising turn of events, the majority of these funds were later returned. “First off, we’re buoyed by the fact that the majority of funds were recovered. This is…

  • Customers battle to regain billions in bitcoin the DOJ recovered in its largest seizure of stolen crypto

    When the Justice Department announced it seized billions in stolen cryptocurrency earlier this year, it seemed like great news for victims of a hack that drained around $70 million from customers’ accounts on the Bitfinex trading platform in 2016. “It was the biggest relief of my life,” said Frankie Cavazos, who lost 15 bitcoins in the…

  • FTX Chief Shares Solution to End Crypto Hacking

    Over the last few months, crypto hacking has turned rampant, especially in the decentralized finance (DeFi) market. This month itself, more than $750 million have been already lost in crypto hacks as per data from Chainalysis. Crypto billionaire and FTX chief Sam Bankman-Fried have recently outlined a framework to deal with this problem of crypto hacks.…

  • Retail investors become vigilantes in hunt for crypto’s most wanted man

    Kang Hyung-suk’s faith in cryptocurrencies was shattered by the $40bn collapse of Do Kwon’s cryptocurrency operator Terraform Labs, where he used to work in Seoul. Now he is looking for payback. In about 10 days, Kang is flying to Dubai, the capital of the crypto-friendly United Arab Emirates, where he believes Kwon is hiding. “Finding…

  • 2 Venezuelans and 5 Russians Accused of Using Cryptocurrency to Evade Sanctions

    The United States today announced the takedown of a Russian-Venezuelan network that used Tether (USDT) to trade outside the traditional banking structure, thus evading international sanctions. One of the most discussed geopolitical scenarios for cryptocurrencies is their ability to evade conventional financial restrictions imposed by world powers against their adversaries—but this workaround is becoming increasingly difficult…

  • Ukrainians told to ‘charge everything’ as power grid hit by Russia

    Ukraine’s national energy company has told citizens to charge all of their devices by 04:00 GMT Thursday because of power cuts expected due to Russian missile strikes. Energy plants were hit by Russian missiles on Wednesday, part of a wave of strikes that have occurred since October 10. There will be outages of up to…

  • Scammers Targeting Those Seeking Student Loan Forgiveness

    The FBI warned earlier this week that fraudsters are targeting individuals seeking student loan forgiveness via email, text, phone, and online. The attackers are masquerading as administrators from the Federal Student Loan Forgiveness Program. The campaign’s primary goal is to steal personally identifiable information from targets, the FBI says. The Biden administration announced in late…