intelligence gathering
-
Details of the arrest of the BR administrator of the world's largest English underground hacker forum are exposed
Yesterday we already knew that the administrator of the "Breach Forum" or webmaster "Pompompurin" was arrested, and we also knew that the man was 21-year-old American Conor Brian Fitzpatrick...
-
Russian tech giant Yandex source code leaked
According to foreign media reports, a source code leak occurred at Yandex, one of Russia's largest IT technology companies. Nearly all of Yandex’s source code leaked A former employee allegedly leaked Yandex’s source code repository, which leaked…
-
Analysis of U.S. military joint operations cloud capability planning in the context of military intelligence
The US military believes that cloud computing is a shared computing resource pool that can meet the rapidly changing needs of users at any time. By building a cloud environment, military data processing advantages can be ensured, thereby ensuring military advantages in the digital and physical worlds. The US military believes that its cloud technology for joint operations...
-
DevOps platform GitLab remote code execution (RCE) vulnerability
Background: GitLab officially released a security advisory to fix a remote code execution vulnerability (CVE-2022-2884) in GitLab Community Edition (CE) and Enterprise Edition (EE). The vulnerability allows authenticated users to access the GitLab Community Edition (CE) and Enterprise Edition (EE) by...
-
The United States uses the "Sour Fox Platform" to launch cyber attacks on China and Russia!
Recently, many scientific research institutions in China have discovered traces of the activity of the "verifier" Trojan program. A research report released by 360 on the 28th showed that according to the available US NSA confidential documents: "Authenticator" is a small implanted Trojan that can be deployed remotely...
-
WPS Office for windows is dealing with a certain OLE mechanism remote code vulnerability
Vulnerability description: WPS office software is an office software suite independently developed by Kingsoft Office Software Co., Ltd. It can realize the most commonly used functions of office software such as text, tables, presentations, etc., covering windows, macos, L...
-
U.S. Central Intelligence Agency (CIA) "Hive" Malicious Code Attack Control Weapon Platform Analysis Report
Recently, the National Computer Virus Emergency Response Center analyzed the "Hive" malicious code attack control weapon platform (hereinafter referred to as the "Hive Platform"). The Hive Platform is affiliated to the Center for Digital Innovation (DDI) of the U.S. Central Intelligence Agency (CIA). Information…
-
Nvidia’s core asset data was “open sourced” by hackers
NVIDIA's core source code has just been "open sourced", and the information of more than 70,000 employees has been leaked. At the same time, hackers "helped" Samsung open source the code, and by the way, Qualcomm was also involved. It seems that the South American hacker group Lapsus$ is going to play a big game with Nvidia. source code…
-
StripChat adult video website vulnerability leaks sensitive data of tens of millions of users
The security flaw was discovered by data breach hunter Bob Diachenko, who discovered an ElasticSearch database cluster that was accessible online without authentication. Diachenko in November…
-
Russia’s Federal Security Service (FSB) arrests REvil ransomware gang
Russia’s Federal Security Service (FSB) has taken the unprecedented step of announcing the arrests of several members of the notorious REvil ransomware gang