Start your day with intelligence. Get The OODA Daily Pulse.
On 27 Oct 2021 OODA Network members participated in a network only salon focused on an examination of global geopolitical risks and mitigation strategies. This session provided members with an update that flowed from the OODA C-Suite Report and provided an opportunity for all present to provide inputs on areas of interest that OODA analysts…
Microsoft has issued a warning regarding a newly discovered attack method dubbed Dirty Stream, which exploits a vulnerability pattern related to path traversal in Android applications. The vulnerability impacts popular apps like Xiaomi File Manager and WPS Office, with a combined install base exceeding 1.5 billion from Google Play. Microsoft has identified several other affected…
Horizon3.ai has introduced a Rapid Response service to its NodeZero SaaS-based penetration testing platform, aiming to proactively prevent malicious attacks by swiftly addressing critical vulnerabilities identified in IT environments. The service combines AI and human expertise to rapidly assess and prioritize vulnerabilities beyond those listed by NVD, automatically checking for exposure to exploitation. Leveraging AI…
The cyberespionage campaign called ArcaneDoor, targeting Cisco firewalls with two zero-day vulnerabilities, is suspected to be the work of a Chinese threat actor, according to Censys. Cisco’s Talos unit disclosed the campaign’s details, revealing that a group tracked as UAT4356 and Storm-1849 exploited the vulnerabilities to target government networks globally. While the initial attack vector…
The botnet utilized by APT28, a cyberespionage group linked to Russia’s GRU, consisted not only of Ubiquiti Edge OS routers but also included Raspberry Pi and other Linux devices. The cleanup operation following the US dismantling of the botnet in January 2024 failed to completely sever the hackers’ access, as additional undetected malware remained on…
On Wednesday, the United States accused Russia of violating the international ban on the use of chemical weapons. This accusation comes after Russia deployed chloropicrin, a choking agent, against Ukrainian troops. Russia is also using riot control agents as a form of warfare. According to a statement made by the State Department, “The use of…
A Portuguese-flagged container ship was attacked via drone in the Arabian Sea for which the Houthis claimed responsibility. The Houthis attacked the MSC Orion last Friday, occurring around 600 kilometers (375 mi) off the coast of Yemen. The attack on this vessel is the first confirmed deep-sea assault conducted by the Houthis. The implications of…
On Tuesday, Israeli Prime Minister Benjamin Netanyahu announced plans to launch an incursion into Rafah. Rafah is a city in southern Gaza, where there are currently hundreds of thousands of Palestinians sheltering. These comments come just hours before the U.S. Secretary of State Antony Blinken arrived in Israel. Blinken’s visit intended to engage in truce…
A former U.S. National Security Agency (NSA) employee was sentenced to almost 22 years in prison. The employee’s prison sentence was made on account of attempting to transfer classified documents to Russia. The former employee, named Jareh Sebastian Dalke, 32, worked as an Information Systems Security Designer. In this role, he had access to sensitive…
Last week, a criminal case involving artificial intelligence came out of a Maryland High School, wherein a principal was framed as a racist from a fake recording. According to authorities in Baltimore County, athletic director Dazhom Darien cloned Principal Eric Eiswert’s voice using artificial intelligence to produce a fake recording. The fake recording depicted the…
Following several attacks on industrial control systems (ICS) by pro-Russian hacktivists, government agencies are issuing security warnings. Government agencies from Canada, the United States, and the United Kingdom are issuing securitization recommendations to critical infrastructure organizations. These warnings come from attempts by hacktivist groups to disrupt ICS and operational technology (OT) systems. These hacktivist groups…
On Thursday, a senior U.S. official pleaded that both China and Russia match U.S. declarations promising that artificial intelligence would never make decisions on nuclear weapons. Paul Dean, an arms control official in the State Department, discussed U.S. commitments to control over nuclear weapons in an online briefing. Dean stated that the U.S. had a…
Flooding has forced the evacuation of tourists and staff from Kenya’s Maasai Mara game reserve, with over 10 lodges and camps submerged after the Talek River overflowed on Tuesday. Concerns arise over the safety of animals swept away by the floods. Efforts to rescue trapped individuals are ongoing, with 36 rescued by air and 25…
Severe storms in Rio Grande do Sul, Brazil, have led to flooding, resulting in at least six deaths and over a dozen missing persons. Helicopters are conducting rescue operations, but some areas are inaccessible, forcing crews to airlift stranded residents. Governor Eduardo Leite has appealed to President Luiz Inácio Lula da Silva for federal assistance,…
Riot police in Georgia clashed with pro-EU protesters outside parliament as they fired tear gas and water cannon to disperse crowds opposing a bill perceived by the opposition as a threat to media freedoms and inspired by Russian authoritarian legislation. The bill, backed by Georgian MPs despite EU warnings, requires NGOs and independent media receiving…
Victory Park in Moscow, known for commemorating the Soviet Union’s victory in World War Two, now hosts an open-air exhibition showcasing Western military hardware captured by the Russian army in Ukraine. The display includes British, American, and German tanks, among others. The Russian authorities aim to highlight Russia as the victim, drawing parallels between the…
Security researchers at JFrog have discovered three large-scale campaigns targeting Docker Hub with repositories devoid of container images, instead containing malicious metadata. Docker Hub, a platform for Docker image development, hosts over 15 million repositories and is popular among developers globally. Approximately 3.2 million repositories were found to host malicious content, ranging from spam to…
A 26-year-old man in Finland has been sentenced to six years and three months in prison for hacking thousands of patient records at a private psychotherapy center and attempting to extort ransom from some patients over the sensitive data. The perpetrator, Aleksanteri Kivimäki, was found guilty of aggravated data breach, over 21,000 counts of aggravated…
UnitedHealth Group revealed that the Alphv/BlackCat hackers infiltrated Change Healthcare’s systems for nine days before unleashing file-encrypting ransomware, accessed through leaked credentials for a vulnerable Citrix portal lacking multi-factor authentication. CEO Andrew Witty, set to testify before a US Congress committee on May 1, confirmed the attack’s compromise of personally identifiable information (PII) and protected…
Chinese cybersecurity firm QAX XLab has uncovered a new Android trojan named Wpeeper, notable for hiding its true command-and-control (C&C) server behind compromised WordPress sites, utilizing a multi-level C&C infrastructure. Despite typical trojan functionality, including information collection and file management, Wpeeper encrypts commands, uses HTTPS for communication, and employs elliptic signatures to prevent takeover. Uploaded…
The US state department has found five units of the Israeli military responsible for violations of human rights in individual incidents, but says they will continue to send US military backing. All of the incidents took place outside of Gaza before the current war. Israel took corrective action in four units, and gave additional information…
State TV in Mali has reported that a senior Islamic State commander who had a $5m US bounty on his head has been killed by a force of troops from Mali, Burkina Faso and Niger. Abu Huzeifa had been linked to several high-profile raids in the Sahel region, including a 2017 attack that killed four…
After a significant data theft at UnitedHealth, fellow healthcare company Kaiser Permanente publicly announced a data breach impacting 13.4 million current and former insurance members. Kaiser’s systems accidentally shared patient data with third-party advertisers. Those advertisers include Google, Microsoft and the social platform X. The shared data included names, IP addresses, pages people visited, whether…
The US government’s cybersecurity agency CISA has rolled out a series of guidelines to increase the safety and security of critical infrastructure against AI-related threats. The new guidelines categorize AI risks into three types, the utilization of AI in attacks on infrastructure, targeted assaults on AI systems themselves, and failures in AI design and implementation…