3 juillet 2024 | International, Sécurité

Israeli Entities Targeted by Cyberattack Using Donut and Sliver Frameworks

Discover the 'Supposed Grasshopper' cyberattack campaign targeting Israeli entities using open-source frameworks and custom WordPress sites as deliver

https://thehackernews.com/2024/07/israeli-entities-targeted-by.html

Sur le même sujet

  • In A&D Industry, Who Has The Best Environmental Requirements? | Aviation Week Network

    7 septembre 2021 | International, Aérospatial, Naval, Terrestre, C4ISR, Sécurité

    In A&D Industry, Who Has The Best Environmental Requirements? | Aviation Week Network

    Green is the new green in aerospace and defense, but how do companies compare when it comes to their own standards?

  • Battelle Embarks on DARPA ECHO Program

    30 juillet 2019 | International, C4ISR

    Battelle Embarks on DARPA ECHO Program

    COLUMBUS, Ohio--(BUSINESS WIRE)--Battelle has won an Associated Contractor Agreement for a new Defense Advanced Research Projects Agency (DARPA) Epigenetic Characterization and Observation (ECHO) program. The aim is to build a field-deployable platform technology that quickly reads someone's epigenome and identifies signatures that indicate whether that person has ever—in his or her lifetime—been exposed to materials that could be associated with weapons of mass destruction (WMD). Battelle will examine blood samples from people known to have handled materials associated with biological, chemical, explosive, pesticide or herbicide contaminants and compare those results to control subjects who have not handled these materials to identify unique epigenome signatures. The epigenome is biology's record keeper. Though DNA does not change over a single lifetime, a person's environment may leave marks on the DNA that modify how that individual's genes are expressed. This is one way that people can adapt and survive in changing conditions, and the epigenome is the combination of all these modifications. Though modifications can register within seconds to minutes, they imprint the epigenome for decades, leaving a time-stamped biography of an individual's exposures. Whereas current forensic and diagnostic screening technologies only detect the immediate presence of contaminants, the envisioned ECHO technology would read someone's epigenome from a biological sample even when other physical evidence has been erased. “We'll be developing methods to identify these signatures and how to interpret them for attribution—what did the person handle, when and for how long,” said Battelle Biologist and Principal Research Scientist Rachel Spurbeck, PhD, who is leading the effort. “This will even allow for diagnosing illnesses in individuals as a result of their exposure.” About Battelle Every day, the people of Battelle apply science and technology to solving what matters most. At major technology centers and national laboratories around the world, Battelle conducts research and development, designs and manufactures products, and delivers critical services for government and commercial customers. Headquartered in Columbus, Ohio since its founding in 1929, Battelle makes the world better by commercializing technology, giving back to our communities, and supporting science, technology, engineering and mathematics (STEM) education. For more information, visit www.battelle.org. Media Contacts For more information contact Katy Delaney at (614) 424-7208 or at delaneyk@battelle.org or contact T.R. Massey at (614) 424-5544 or at masseytr@battelle.org. Contacts Katy Delaney (614) 424-7208 delaneyk@battelle.org T.R. Massey (614) 424-5544 masseytr@battelle.org https://www.businesswire.com/news/home/20190729005374/en

  • DIU awards $45M contract for weapon systems cybersecurity

    13 mai 2020 | International, C4ISR, Sécurité

    DIU awards $45M contract for weapon systems cybersecurity

    Andrew Eversden The Defense Innovation Unit awarded a $45 million to a Silicon Valley-based tech startup to perform cybersecurity testing on Defense Department weapon systems' applications, the company announced May 11. The company, ForAllSecure, has been prototyping its cybersecurity testing platform, known as Mayhem, with DoD components for more than three years. DIU made the award on the five-year contract April 23, a ForAllSecure spokesperson said. ForAllSecure is working with the Air Force 96th Cyberspace Test Group, the Air Force 90th Cyberspace Operations Squadron, the Naval Sea Systems Command (NAVSEA) and the U.S. Army Command, Control, Communication, Computers, Cyber, Intelligence, Surveillance and Reconnaissance Center (C5ISR). The same DoD users have worked with ForAllSecure throughout the prototyping process for the company's platform, which finds bugs in applications and shows the user how they can be triggered. The platform will allow for a continuous testing for vulnerabilities in weapons systems. “One of the problems that [the department] run[s] into is this idea that there's a point in time when you're done" with cybersecurity," said David Brumley, chief executive officer of ForAllSecure. "It all comes down to how quickly can you test and retest.” In the last few years of prototyping, the company went through 10 iterations of Mayhem. One significant piece the company added to those iterations were cybersecurity tutorials for users. ForAllSecure's work on Mayhem started before a troubling report from the Government Accountability Office that highlighted several cybersecurity challenges and shortfalls that the Defense Department's weapons systems faced in light of potential advanced cyberattacks. “If you look at the GAO report, they simply weren't embedding cybersecurity testing in the process at all," Brumley said. “So this is adding this common sense measure and it's automating it.” In 2016, the company's Mayhem platform won the Defense Advanced Research Projects Agency's Cyber Grand Challenge, an automated defensive cybersecurity competition. That victory came with a $2 million prize. Since that victory, Brumley said that the company has run into a few unique challenges working with other DoD components, particularly around installing the platform. “When DARPA has their contest, it really only has to work for the developers,” Brumley said. “When you go to a product, you have to go to an unknown site, you have to install. You have to repeatedly do that.” https://www.fifthdomain.com/dod/2020/05/12/diu-awards-45m-contract-for-weapon-systems-cybersecurity/

Toutes les nouvelles