Start your day with intelligence. Get The OODA Daily Pulse.

Home > OODA Analysis and Briefs

Analysis

  • Intelligence? Sold!

    One thing has been strikingly absent from the public debate about the terrorist surveillance program run by the National Security Agency: Perspective. While we may not know the full scope of the use of personal information by our intelligence services, we know quite a bit about the routine use and compromise of our most personal…

  • Tick, tick, tick . . .

    Slate takes a brief look at intel whiste-blowers and the potential significance of Russ’ testimony next week. I’m particularly fond of the wrap-up: Sources in addition to Tice sketched out the wiretapping program for the Times. But since the revelations became public, no one else has come forward. In an echo chamber of unnamed “senior…

  • Bond, Jane Bond

    This was just too good to pass up, and a nice way to lighten the mood on a Friday. New Zealand filmmaker Lee Tamahori, who directed the James Bond movie “Die Another Day,” has been arrested in a Hollywood prostitution sting while dressed in drag. Tamahori, 55, was arrested on January 8 when he allegedly…

  • And I Thought Eliot Jardines . . .

    . . . had the toughest most thankless job in the Community: Agency: Office of the Director of National Intelligence Job Announcement Number: TBD-2-13-2006 SALARY RANGE: 107,521.00 – 139,774.00 USD per year OPEN PERIOD: Thursday, February 02, 2006 to Friday, February 10, 2006 SERIES & GRADE: GS-0300,0000-15/15 POSITION INFORMATION: Full-Time Permanent DUTY LOCATIONS: 1 vacancy…

  • Stop, Hey, What’s that Sound?

    A visitor is concerned: Lately, and for reasons I do not understand, this site is regularly visited by The Department of Defense, at times particularly the CIFA arm of DOD, The United States Department of State, and yesterday, the U.S. General Accounting Office.(There are many, many more governmental entities that visit this site.) […] To…

  • Don’t get all warm & fuzzy just yet

    The Washington Times allows for a moment of reflection: Despite statements by senior al Qaeda leaders, U.S. intelligence agencies do not have information indicating the group is ready to conduct a major attack, U.S. counterterrorism officials said. […] there are no signs of an impending attack like the hijacked airline strikes on the Pentagon and…

  • Deny? Oh, DNI!

    The Washington Post discovers the open secret: John D. Negroponte is to give a Capitol Hill briefing this morning on threats at home and abroad, as lawmakers express varying degrees of concern about whether he has moved quickly enough to establish his leadership as the nation’s first director of national intelligence. Several members of Congress…

  • Moving Forward?

    Steve Hayes and William Kristol bring the noise on media exploitation.

  • SO/LIC, doesn’t he coach at Nebraska?

    The Hill reports on more Pentagon consolidation proposals: Sources tell The Hill that Secretary of Defense Donald Rumsfeld is considering a proposal to eliminate the office of the assistant secretary of defense for special operations and low-intensity conflict (ASD SO/LIC) and spreading its responsibilities across other Pentagon offices. The proposal comes from Ryan Henry, the…

  • Just in case you thought we forgot (Able Danger)

    A great series of questions and answers about Able Danger at Rory O’Conner’s blog that summarizes all you need to know (before the knock on the door comes). (more shortly)

  • This ought to be interesting

    GCN keeps setting them up . . . The Homeland Security Department will test how well it works with other federal agencies and private IT companies to protect cybersecurity in a national exercise Feb. 6-10. The Information Technology Information-Sharing and Analysis Center will take part in the exercise, known as Cyber Storm, with DHS to…

  • Don’t Call it a Set Back

    Catching up on more GCN tid-bits: John Russack, program manager for the Information-Sharing Environment in the office of the Director of National Intelligence, is leaving the post, according to a statement released today by Sen. Dick Durbin (D-Ill).

  • Confidence Remains High? (Part II)

    Government Computer News reports on DHS’s new “Secure Border Initiative”   The Homeland Security Department today took the wraps off its ambitious plan to quickly gain control of the U.S. northern and southern borders by hiring a systems integration contract team to carry out the Secure Border Initiative (SBI).   DHS plans to request proposals…

  • Living the Motto?

    The FBI Motto: Fidelity, Bravery, Integrity Her fidelity I can’t speak to . . . whatever bravery she had when she blew the whistle on stupid-headquarters-tricks has long past . . . and as far as integrity, well, read on (from Captain’s Quarters): […] former FBI agent and whistleblower Coleen Rowley […] has descended far…

  • Contractor’s Dream – Intelligence Nightmare

    Siobhan Gorman blazes a trail through Ft. Meade: A program that was supposed to help the National Security Agency pluck out electronic data crucial to the nation’s safety is not up and running more than six years and $1.2 billion after it was launched, according to current and former government officials. The classified project, code-named…

Briefs

  • Hundreds of graves found in liberated Izyum city – Ukrainian officials

    Days after Izyum was re-taken from Russia by Ukraine, Ukraine has announced that it has found hundreds of graves outside of the city. The graves were marked with wooden crosses, most were marked with numbers, and were found in a forest outside the city by Ukrainian forces. Authorities are planning on exhuming some of the…

  • 10 examples of smart contracts on blockchain

    With smart contracts’ rapid growth, IT leaders should understand the role those contracts could play within an enterprise technology ecosystem. Smart contracts on blockchain have the potential to streamline certain business processes and some business and IT leaders are looking at the potential use cases, such as in the area of advertising and healthcare. But smart…

  • Can ‘the Merge’ Save Crypto?

    Crypto could use a bit of good news these days. And on Wednesday, it got some. Ethereum, the most popular crypto platform, appears to have successfully upgraded its software architecture from a type of blockchain known as “proof of work,” which it has run since its inception in 2015, to a type of blockchain known as…

  • Investors say regulation needed to assuage crypto concerns

    Though many public pension funds have shied away from digital assets tied to cryptocurrencies and the blockchain, some are nevertheless moving forward with small investments in this potentially transformational yet volatile sector. Last year, for example, the $5.3 billion Houston Firefighters’ Relief and Retirement Fund decided to establish a $25 million portfolio in crypto assets. The…

  • North Korea Stolen Approximately $1B of Cryptocurrency in 2022

    The most worrisome trend in crypto crime is the startling increase in funds stolen from DeFi protocols, particularly the cross-chain bridges. A significant portion of the value stolen through Defi protocols can be traced back to malicious actors with ties to North Korea. Highly skilled hacking groups such as Lazarus Group have taken credit for…

  • Cryptocurrency is picking up as an instrument for tyranny

    Proponents paint Bitcoin (BTC) and other cryptocurrencies as antidotes to totalitarian governments and central banks. Simultaneously, international corporations and startups alike have designed blockchain platforms and products that could be used on behalf of totalitarian governments and central banks. One example is Microsoft, which applied for a patent for a cryptocurrency system using body activity data.…

  • Vulnerabilities Found in Airplane WiFi Devices, Passengers’ Data Exposed

    Two critical vulnerabilities have been detected in wireless devices LAN devices produced by Contec. The devices are used in planes to provide internet connectivity to passengers while in-flight. The flaws were discovered by a pair of researchers at Necrum Security Labs. The security researchers found that a hidden page not listed in the Wireless LAN…

  • User Alert as Phishing Campaigns Exploit Queen’s Passing

    Threat actors are capitalizing on the death of Queen Elizabeth II to lure targets into clicking on phishing links that request Microsoft credentials. Experts at Proofpoint posted a screenshot yesterday that revealed the phishing emails appear as though they are being sent from the tech giant itself. The headline claims to be memorializing the late…

  • SparklingGoblin APT Targeted Hong Kong University With New Linux Backdoor

    The SideWalk backdoor has been leveraged by a threat actor group seeking to target a Hong Kong university. The attack reportedly occurred in February 2021 and was perpetrated by the SparklingGoblin advanced persistent threat group. The attackers sough out the Linux variant of the backdoor to hack into the university’s systems during student protests that…

  • Spain, Europol arrest ‘one of Europe’s biggest money launderers’

    European police have arrested one of Europe’s biggest money launderers in a rain in southern Spain. The suspect, a British-Irish man, is believed to have laundered more than 200 million euros in illicit money. The operation was led by Spain’s Guardia Civil and coordinated by Europol. The operation is seen as a blow to the…

  • Armenia reports ceasefire after new border clashes with Azerbaijan over Nagorno-Karabakh

    Late on Wednesday, a truce was reached between Armenia and Azerbaijan according to a senior Armenian official. The truce comes after two days of violence related to a decades-long dispute between the two countries over the territory of Nagorno-Karabakh. This conflict was the deadliest exchange between the two countries since 2020.  Russia is the primary…

  • DOJ charges 3 Iranians with hacking hundreds of U.S. computers to extort ransom

    The Justice Department announced charges Wednesday against three Iranian men accused of hacking into hundreds of U.S. computer systems, encrypting data and extorting victims for ransom. Victims of the scheme included a township in Union County, New Jersey, and a county government in Wyoming; accounting firms in New Jersey and Illinois; power companies in Indiana…

  • A Post-exploitation Look at Coinminers Abusing WebLogic Vulnerabilities

    We have recently observed malicious actors exploiting both recently disclosed and older Oracle WebLogic Server vulnerabilities to deliver cryptocurrency-mining malware. Oracle WebLogic Server is typically used for developing and deploying high-traffic enterprise applications on cloud environments and engineered and conventional systems. One of the older vulnerabilities that is still being actively exploited by malicious actors…

  • Ethereum Merge: How one big cryptocurrency is going green

    The second biggest cryptocurrency, Ethereum, is about to switch over to a new operating model that uses 99.9% less energy. The change, called The Merge, is designed to win over critics who see cryptocurrencies as environmentally harmful. Ethereum currently uses as much energy as a medium-sized country. Other cryptocurrencies, including the biggest, Bitcoin, will remain…

  • South Korea issues arrest warrant for developer of failed cryptocurrency Luna

    A South Korean court has issued an arrest warrant for Do Kwon, the primary developer of cryptocurrencies Luna and TerraUSD, whose spectacular collapse in May roiled crypto markets around the world. Kwon, also the founder of blockchain platform Terraform Labs, has been accused of fraud by investors in the wake of the collapse. “An arrest warrant…

  • SWIFT Financial-Messaging System Pilots Blockchain Project

    SWIFT, the messaging system used by financial institutions globally to convey instructions on tens of millions of transactions each day, is testing out blockchain. The Society for Worldwide Interbank Financial Telecommunication, or SWIFT for short, is piloting a project with fintech company Symbiont Inc., according to a post seen by Bloomberg. The collaboration, which includes Citigroup…

  • U.S. to Transfer Afghan Funds to Swiss Bank for Safekeeping

    On Wednesday, the US announced that it plans to transfer billions of dollars in frozen Afghani assets to a fund in Switzerland. This will effectively shelve talks that discusses recapitalizing the central bank despite the Taliban rule. The assets consist of roughly 7 billion USD. The Switzerland bank, the Bank for International Settlements, will guard…

  • EU chief proposes energy market reform, $140bn revenue cap

    The president of the European Commission, Ursula von der Leyen, has unveiled legislation to impose windfall levies worth $140bn on energy companies. This legislation is a bid to lessen the effects of increasing gas and electricity prices that have threatened economies and household electricity bills.  The legislation was announced in her State of the European…

  • Russia covertly spent $300m to meddle abroad – US

    Since 2014, Russia has covertly spent over $300m to influence politicians in more than 24 countries according to allegations by the US. The Department of State made this allegation after a US intelligence assessment was declassified and released on Tuesday.  Russia has not publicly commented on the issue of meddling abroad. American intelligence suggests that…

  • Cyberattackers Abuse Facebook Ad Manager in Savvy Credential-Harvesting Campaign

    According to security researchers at Avanan, attackers are using the power of Facebook’s branding to craft emails that seem to be legitimate Facebook Ads Manager communications. The attackers are seeking credentials and attempt to lure targets into giving up logins and credit card information under the guise of Facebook ads. Avanan released a report on…

  • Microsoft Raises Alert for Under-Attack Windows Flaw

    On Tuesday, Microsoft released a warning stating that its security teams had detected zero-day exploitation of a critical vulnerability that had been previously disclosed. The vulnerability lies in the Windows platform and was fixed in the latest batch of Patch Tuesday updates. However, attackers are now actively exploiting the flaw to gain system privileges on…

  • ShadowPad-Associated Hackers Targeted Asian Governments

    Threat actors associated with the ShadowPad remote access Trojan have implemented a new toolset to assist its campaigns. The group is targeting various government and state-owned organizations spanning multiple Asian countries, according to Symantec. Symantec released an advisory regarding the threats earlier this week. In the report, the security firm states that it is likely…

  • DDoS Attacks on UK Firms Surge During Ukraine War

    According to recently compiled data, the volume of DDoS attacks that targeted UK financial institutions surged during the first few months of the Ukrainian war. The information was obtained from the industry regulator via the new Freedom of Information data. The Financial Conduct Authority revealed that there have been 14 DDoS attacks so far in…

  • Hackers Steal Steam Credentials With ‘Browser-in-the-Browser’ Technique

    Cybersecurity researchers at Group-IB have warned that hackers are targeting the video game platform Steam to target users with a new phishing technique named broswer-in-browser (BitB). Group-IB released new data earlier this week describing the attack, which uses a fake browser window in the same tab rather than traditional techniques of opening phishing webpages in…

  • Crypto Exchange Huobi to Delist 7 Privacy Coins, Including Zcash, Monero

    Prominent crypto exchange Huobi Global will delist seven privacy tokens next week amid broader regulatory scrutiny of such tokens, it said in a statement on Monday. “Huobi Global strictly complies with the compliance policies of every country and region and always endeavors to safeguard our users’ assets,” the exchange, which is one of the largest…

  • DeFi Hacks Keep Adding Up as Scammers Exploit Code Ethos

    Scammers who ransacked cryptocurrency projects to the tune of hundreds of millions of dollars in recent months have been able to carry out such heists by taking advantage of a central tenet of decentralized financial services. While DeFi projects promise to enable more efficiency in crypto transactions, much of the code undergirding the software is public,…

  • SEC Chair Stands Firm: ‘Vast Majority’ of Cryptocurrency Tokens Are Securities

    In prepared remarks delivered at the Practising Law Institute’s “SEC Speaks” program on September 8, Chair Gensler emphasized and reiterated his long-standing position that the vast majority of cryptocurrency tokens are securities, and he noted that “only a small number of tokens, even though they may represent a significant portion of the crypto market’s aggregate…

  • The Ethereum Merge Is Set to Take Place This Week. What Investors Should Know About How It Will Influence the Price

    It’s a big week for Ethereum: Its big merge is set for Thursday, and investors could see big price movement when it happens. This major network upgrade will see Ethereum transition from proof-of-work to proof-of-stake. The upgrade will address concerns about its environmental impact and dramatically improve its transaction speed, among other improvements, according to…

  • Coinbase employee mired in first insider trading case involving cryptocurrency

    The brother of a former Coinbase Global Inc product manager pleaded guilty on Monday to a wire fraud conspiracy charge, in what US prosecutors have called the first insider trading case involving cryptocurrency. Nikhil Wahi, 26, admitted during a virtual court hearing before US district judge Loretta Preska in Manhattan that he made trades based…

  • Ports, schools shut as Typhoon Muifa barrels toward eastern China

    Chinese authorities have ordered ships to return to port due to projections that the country will suffer from one of the strongest typhoons this year. The typhoon, named Muifa, is set to make landfall in the eastern province of Zhejiang. In addition to the ships returning to port, China has ordered some schools to close…

  • Famine Threatens East Africa as Drought Persists

    In East Africa, thousands are facing a hunger emergency that has occurred as a result of four failed rainy seasons in a row. As the rainy season approaches, another drought could deepen the crisis and tip some areas into famine within weeks. Meteorologists have assessed the current situation and issued warnings over a fifth unsatisfactory…

  • UN warns of ‘serious threat’ from Syria cholera outbreak

    A cholera outbreak has posed a serious threat to people in Syria and the wider area according to the United Nations. UN Resident and Humanitarian Coordinator in Syria Imran Riza said the cholera outbreak is believed to be linked to contaminated irrigation water that has been watering crops, or from people drinking from the Euphrates…

  • Dozens dead in overnight clashes between Armenia and Azerbaijan

    Dozens of soldiers have been killed during fighting between Armenia and Azerbaijan that occurred overnight. Armenia’s Prime Minister said that 49 of its soldiers died in the clashes. These neighboring countries have fought two wars and have seen regular clashes over the past 30 years. Russia claims to have brokered a ceasefire for the latest…

  • Iranian Hackers Launch Renewed Attack on Albania

    Albania has accused Iranian hackers for launching attacks against Albanian authorities. In the latest attacks, Iranian hackers took border control systems offline. Albanian Prime Minister Edi Rama’s office took to Twitter over the weekend to confirm cyberattacks against the Total Information Management System that helps Albania track its border crossings. Albania condemned the cyberattack and…

  • High Severity Vulnerabilities Found in HP Enterprise Devices

    Security researchers at Binarly have reportedly uncovered six high-severity firmware vulnerabilities. The vulnerabilities were detected over the course of the past year and were first revealed at the Black Hat 2022 conference. The flaw affect HP EliteBook devices and range in severity scores from 7.5 to 8.2. The attacker could leverage the vulnerabilities to install…

  • U-Haul reports data breach, customers’ info exposed

    US moving company U-Haul has reportedly suffered from a data breach that occurred when an unauthorized individual gained access to an unknown number of rental contracts. U-Haul’s parent company Amerco confirmed the attack last week and stated that consumers’ payment card information was not compromised in the attack. The individual who obtained access to the…

  • ‘This is the jungle’: Law enforcement slowly waking up to the threat of DeFi exploits

    At the end of August, the FBI issued a public service announcement on the susceptibility for cybercrime in DeFi (decentralized finance), the growing crypto segment of financial applications backed by blockchain technology. Of the $1.3 billion stolen in cryptocurrencies in the first three months of 2022, 97% came from DeFi platforms. The warning did nothing to…

  • Ethereum Merge makes network more vulnerable to attack — Security expert

    Despite the Ethereum Merge being touted as a major upgrade to the blockchain network, its transition to proof-of-stake theoretically makes it more vulnerable to exploit. Speaking to Cointelegraph, the security researcher explained that unlike proof-of-work (PoW) systems, a proof-of-stake (PoS) system informs node validators in advance what blocks they will validate, thus enabling them to plan…

  • North Korean Lazarus Group Hacked Energy Providers Worldwide

    A malicious campaign conducted by the North Korean threat actor Lazarus Group targeted energy providers around the world between February and July 2022. The campaign was previously partially disclosed by Symantec and AhnLab in April and May, respectively, but Cisco Talos is now providing more details about it. Writing in an advisory on Thursday, the security researchers…

  • YouTuber with 13 million subscribers hacked by crypto scammers; Here’s how much they stole

    Popular YouTuber Scuba Jake has confirmed the hacking of his channel with over 13 million subscribers and 1.75 billion views since the channel’s creation in 2011. The September 9 incident saw crypto scammers take over the channel and attempt to defraud unsuspecting followers in a fake giveaway involving Bitcoin (BTC) and Ethereum (ETH). An analysis…

  • 3 major mistakes to avoid when trading cryptocurrency futures markets

    Many traders frequently express some relatively large misconceptions about trading cryptocurrency futures, especially on derivatives exchanges outside the realm of traditional finance. The most common mistakes involve futures markets’ price decoupling, fees and the impact of liquidations on the derivatives instrument. Let’s explore three simple mistakes and misconceptions that traders should avoid when trading crypto…

  • Investigators Seize $30m in Stolen Crypto from North Korea

    Chainalysis has reported that US authorities seized roughly 10% of the cryptocurrency stolen by North Korean state hackers during the Ronin Network heist that occurred last month. Chainalysis also reported that a total of $30 million was seized during the raid, marking the first time ever that cryptocurrency originally stolen by North Korea was taken…

  • Hackers Compromise Employee Data at PVC-Maker Eurocell

    Eurocell, a leading British PVC manufacturer, has suffered from a substantial data breach, according to a law firm that viewed emails to current and former employees. The Derbyshire-based company operates as a distributor of UPVC windows, doors, and roofing products. The data breach reportedly occurred when an unauthorized third party accessed its systems. The company…

  • The second-biggest school district in the US was hit with ransomware

    Los Angeles Unified, the second-largest US school district, allegedly suffered from a ransomware attack that occurred over the weekend. The school district announced the attack on Tuesday as it resumed operations as normal. The attack caused significant disruption to the school district’s IT infrastructure. LA Unified also confirmed that employee healthcare and payroll services were…

  • Russians ‘outnumbered 8-1’ in counter-attack

    Ukraine led a counter-attack in the Kharkiv region against Russia last week and outnumbered Russians by eight to one.  Ukraine’s army has retaken villages in the north and has broken through to the Russian border.  After the offensive, Ukraine has regained control over 3,000 square kilometers of territory. Ukraine says it will be continuing the…

  • Tigrayan forces accept immediate ceasefire and AU-led peace talks with Ethiopia govt

    The Tigray People’s Liberation Front has said that they are ready to accept an immediate ceasefire and a peace process led by the African Union. These two steps will help end a conflict with the federal military forces in Ethiopia that has lasted almost two years.  A committee had been created by the Ethiopian government…

  • Rethinking Responsible Disclosure for Cryptocurrency Security

    The Biden administration has pointed, with alarm, to the national security implications of both cybersecurity and cryptocurrency. It’s just a matter of time before the government begins worrying about their intersection—cryptocurrency security. All of the United States’ international adversaries are in the business of exploiting bad cybersecurity, and many of them monetize their exploits using…

  • Why quantum computing isn’t a threat to crypto… yet

    Quantum computing has raised concerns about the future of cryptocurrency and blockchain technology in recent years. For example, it is commonly assumed that very sophisticated quantum computers will one day be able to crack present-day encryption, making security a serious concern for users in the blockchain space. The SHA-256 cryptographic protocol used for Bitcoin network security…

  • Cryptocurrency’s Structural Security Problem

    I explore the remarkable number of failures in cryptocurrency security for Lawfare. I argue that security really is worse for cryptocurrency, because the decentralization that proponents treasure makes it hard to safely disclose and fix security holes: Software security flaws … are ubiquitous in digital products. Like writers who can’t see their own typos, most coders…

  • White House: Bitcoin Mining Must Be Greener—Or US Should Ban It

    The White House today suggested that U.S. lawmakers and regulators could soon crack down on cryptocurrency mining because of its large carbon footprint. In a Thursday report, mandated by President Biden in an executive order in March, the White House Office of Science and Technology Policy said crypto miners should reduce greenhouse gas emissions, with…

  • NFT watchdog Rug Pull Finder gets its own NFT giveaway exploited

    In an ironic twist, Rug Pull Finder (RPF), a nonfungible token (NFT) watchdog focused on identifying Web3-based fraud, has fallen victim to a smart contract exploit of its own. According to the NFT investigator’s post on Twitter on Friday, two people exploited a technical flaw in the project during the free mint stage — pilfering…

  • Google Cloud to Validate Transactions on Axie Infinity’s Ronin Network

    As Axie Infinity creator Sky Mavis works to further decentralize its Ronin network—a custom Ethereum sidechain designed for NFT-powered games—the Web3 startup has tapped one of the largest Web2 tech giants to help its cause. Today, Sky Mavis announced that it has reached an agreement with Google Cloud that will see the cloud computing division of…

  • TikTok Denies Breach After Hacker Claims ‘2 Billion Data Records’ Stolen

    Popular social media platform TikTok is denying allegations of a data breach just weeks after security researchers uncovered a serious vulnerability in the app that could have exposed users to a 1-click takeover exploit. The issue affected Android users and has since been patched by TikTok. However, reports began circulating that the platform had been…

  • UN chief visits flood-hit Pakistan, appeals for ‘massive’ help

    The United Nations Secretary-General Antonio Guterres has appealed for global support on behalf of Pakistan due to unprecedented flooding has killed almost 1,400 people and destroyed over a million people’s homes. Guterres landed in the Pakistani capital early on Friday morning and was received by Hina Rabbani Khar, the Pakistani state minister for foreign affairs. …

  • Ukraine has retaken 1,000 square kilometers in a week – Zelensky

    Ukraine claims to have retaken possession of over 1,000 square kilometers of its territory in the south and east of the country from Russia. Ukrainian President Volodymyr Zelensky said the land had been liberated since September 1. Another general report also stated that over 20 villages in the Kharkiv region have been recaptured as well. …

  • Indian and Chinese troops disengaging from disputed border area, New Delhi says

    Chinese and Indian troops have begun to disengage from the Gogra-Hotsprings border area in the western Himalayas, according to the Indian government on Thursday. The disengagement comes 2 years after clashes at the border site strained diplomatic ties between India and China.  In the announcement, India said the disengagement is taking place in a coordinated…

  • North Korea declares itself a nuclear weapons state, in ‘irreversible’ move

    North Korea passed a new law declaring itself a nuclear weapons state, a move that leader Kim Jong Un says is irreversible. When he passed the law, he said the country would never give up its nuclear weapons and would not negotiate on denuclearization.  The new law also gave Pyongyang the right to use preemptive…

  • SEC Chair Gary Gensler Backs Giving CFTC Bitcoin Oversight

    At an industry conference today, Securities and Exchange Commission (SEC) chief Gary Gensler said that he supports handing the Commodity Futures Trading Commission (CFTC) the power to “oversee and regulate crypto nonsecurity tokens and related intermediaries.” Gensler stressed that should Congress give the CFTC prime oversight over crypto, his own federal agency shouldn’t be overlooked.…

  • Crypto Scammers Use Fake Websites in Latest Bid to Dupe Customers

    Scammers in recent weeks have employed up fake cryptocurrency web pages to attempt to steal money from users, the latest tactic to emerge in what’s already been a costly year for crypto-related hacks. The sham websites – which masquerade as pages for popular services such as Coinbase, Gemini, Kraken and MetaMask – aim to dupe visitors…

  • North Korea’s Lazarus hackers are exploiting Log4j flaw to hack US energy companies

    Security researchers have linked a new cyber espionage campaign targeting U.S., Canadian and Japanese energy providers to the North Korean state-sponsored Lazarus hacking group. Threat intelligence company Cisco Talos said Thursday that it has observed Lazarus — also known as APT38 — targeting unnamed energy providers in the United States, Canada and Japan between February and…