Start your day with intelligence. Get The OODA Daily Pulse.
The full Starlink system is an incredible capability. High quality engineering was applied to reimagine the every component of the architecture, including ground stations to control the architecture, satellites which communicate with each other and the ground, and new terminals with advanced antennas that can track satellites without need for a gimbal. The ground element…
On Monday, Apple and Google officially announced the release of a new feature that notifies Android and iOS users is a Bluetooth tracking device is being used to track them. According to a joint statement made by the companies, the new feature “will help mitigate the misuse of devices designed to help keep track of…
Europol is launching an investigation following the announcement by a black hat hacker offering to sell classified data allegedly stolen from Europol systems. On May 10, the hacker known as IntelBroker declared that he had gained access to Europol systems and had stolen classified, For Official Use Only (FOUO) data. This classified data includes personal…
In March, Arctic nations conducted a simulation of a large oil spill as part of a virtual training exercise just off of northern Norway. Russia also participated in the simulation, signifying cooperation between the West and Russia in the polar region. Since Russia’s full-scale invasion of Ukraine in February 2022, relations between the West and…
On Tuesday, Russian state media announced the introduction of its submarine-launched Bulava intercontinental ballistic missile to its nuclear arsenal. Since the inception of the war in Ukraine, Putin has warned against direct intervention by NATO troops with potential consequences including nuclear conflict. In March, Putin declared that Russia’s nuclear forces were “technically ready” for such…
Accenture Federal Services, a subsidiary of Accenture (NYSE: ACN), has secured a $789 million contract from the U.S. Navy to enhance cybersecurity across maritime forces globally as part of the SHARKCAGE initiative. The contract aims to establish a unified and continuous security perimeter for the Navy’s networks and systems. Accenture will collaborate closely with the…
The Ohio Lottery disclosed this week that a cyberattack conducted by the ransomware group DragonForce last year has affected over half a million individuals. The breach, revealed in December 2023, led to the shutdown of certain systems by the Ohio Lottery to contain the incident. DragonForce claimed responsibility for the attack and released over 90…
Google released Chrome 124 update, addressing a zero-day vulnerability, CVE-2024-4671, which the company stated is being actively exploited in the wild. The vulnerability, classified as a high-severity use-after-free bug in the Visuals component, was reported by an anonymous researcher on May 7 and promptly patched within two days. While details on any bug bounty remain…
Ascension, a major healthcare provider in the United States, is grappling with a significant cyberattack affecting various computer systems, including electronic health records and patient communication portals. The attack, discovered on May 8, has prompted the activation of downtime procedures and the suspension of non-emergent elective procedures across several hospitals. Emergency medical services have been…
Vladimir Putin has been sworn in for his fifth term as Russia’s president, a stark contrast to his initial pledges to preserve democracy and nurture the country. Over his tenure, Putin has increasingly centralized power, curtailed dissent, and engaged in conflicts such as the ongoing war in Ukraine. Despite widespread international concern, Putin maintains strong…
North Korea’s former propaganda chief, Kim Ki Nam, has passed away at 94, attributed to age-related complications for which he had been receiving treatment since 2022. Known for fostering the Kim dynasty’s personality cult, he played a pivotal role in shaping North Korea’s messaging over decades. Despite his family name’s commonality, he had no blood…
Southern Brazil is grappling with unprecedented flooding and river overflow, deemed the worst natural disaster in Rio Grande do Sul’s history. With 95 fatalities and over 130 missing, approximately 1.4 million individuals have been affected, facing challenges in accessing clean water. Torrential rains submerged towns, including Porto Alegre, where 80% of the population lacks running…
German politician Franziska Giffey, a former mayor of Berlin and member of the centre-left SPD, was attacked in a local library by a man wielding a bag filled with hard contents. This incident is part of a recent string of assaults on politicians and campaign workers in Germany, particularly in eastern regions. Last Friday, Matthias…
This week, Google released a series of security updates for Android, addressing a total of 26 vulnerabilities, including a critical-severity flaw in the System component (CVE-2024-23706) affecting Android 14. This bug could potentially allow attackers to escalate their privileges on vulnerable devices, as noted in Google’s advisory. The updates include patches for various components such…
Last week, Philadelphia-based real estate firm Brandywine Realty Trust (NYSE: BDN) experienced a ransomware attack that disrupted some of its business applications, as disclosed in a filing with the US Securities and Exchange Commission (SEC) on Monday. The incident, which occurred on May 1, involved unauthorized access to portions of its IT environment, where file-encrypting…
Blackwell Security, a cybersecurity solutions provider focused on the healthcare sector, has secured $13 million in funding in a round led by General Catalyst and Rally Ventures. This investment will support the expansion of Blackwell’s Managed Healthcare Extended Detection and Response (MHXDR) solution and its offerings in the US market. Blackwell’s MHXDR platform integrates various…
Leviathan Security Group has issued a warning about a new VPN bypass technique called TunnelVision, which exploits a DHCP design flaw (CVE-2024-3661) to redirect VPN traffic off the tunnel and onto the local network. By manipulating route tables, attackers can force traffic through their own DHCP server, intercepting and potentially modifying it. This technique, termed…