1 février 2022 | International, Aérospatial
11 septembre 2024 | International, C4ISR, Sécurité
Chinese hackers launch DragonRank campaign, targeting multiple countries for SEO manipulation using BadIIS malware and compromised IIS servers.
https://thehackernews.com/2024/09/dragonrank-black-hat-seo-campaign.html
1 février 2022 | International, Aérospatial
21 mai 2020 | International, Aérospatial
By: The Associated Press ALBUQUERQUE, N.M. — A national aerospace and defense contractor has confirmed plans to pack up operations in New Mexico and move to Arizona and elsewhere. Raytheon Technologies Corp. will close its office in Albuquerque, where it employs about 200 people, the Albuquerque Journal reported Tuesday. Company spokeswoman Heather Uberuaga said Raytheon is looking to streamline its capabilities with pursuits and programs located at other sites around the country. She described the move as being in the best interest of customers and said the company will work with employees on individual options for employment going forward. That could include transferring to a new site or applying for different positions within the company. All laid-off workers will receive severance packages, and health care coverage will continue during the severance. Raytheon's Albuquerque division has worked closely in recent years with the Air Force Research Laboratory at Kirtland Air Force Base to develop modern laser and microwave weapons. That work will be transferred to Raytheon Missiles and Defense headquarters in Tucson, Arizona. Raytheon expanded its operations at the Sandia Science and Technology Park on Albuquerque's south side in 2017. The company received $850,000 in economic development funding from the state to offset the expansion costs. Uberuaga said that money has been returned. https://www.defensenews.com/industry/2020/05/20/raytheon-to-move-albuquerque-operations-to-other-us-sites/
8 octobre 2024 | International, C4ISR, Sécurité
GoldenJackal cyber threat targets air-gapped systems in embassies and governments, using USB-based malware.