23 novembre 2024 | International, C4ISR, Sécurité

Russian Hackers Deploy HATVIBE and CHERRYSPY Malware Across Europe and Asia

Russia-linked TAG-110 hacks 62 victims across 11 nations using HATVIBE and CHERRYSPY malware.

https://thehackernews.com/2024/11/russian-hackers-deploy-hatvibe-and.html

Sur le même sujet

  • Fincantieri reopens shipyards in Italy

    23 avril 2020 | International, Naval

    Fincantieri reopens shipyards in Italy

    By: Tom Kington ROME — Italy shipbuilder Fincantieri has reopened its facilities after more than a month of closure due to coronavirus. The state controlled firm shut down on March 16 after talks with unions as the virus swept through Italy — the first Western country to be hit hard. Since then, Italy's death toll has been overtaken by the U.S., but remains the most exposed country in Europe, with more than 25,000 deaths and 187,000 total infections. As the contagion rate slows however, the government is targeting May 4 as the date to relax rigid lockdown rules for the public. Fincantieri was given the go ahead to restart production on Monday — at a reduced pace. At the firm's Riva Trigoso yard in the Liguria region, where 1,800 were employed before lockdown building Italy's final FREMM frigate and PPA vessels for the Italian navy, just 350 will initially return to work, a spokesman said. Of that number, 150 will be Fincantieri staff, while the remainder are maintenance, cleaning and security contractors. A similar policy is being followed at Fincantieri's Muggiano yard, also in Liguria, where 2,600 are normally employed, and where just 200 staff and 200 contractors have returned to continue work for Italy on a logistics vessel, the Vulcano and a new LHD, the Trieste; as well as a corvette for Qatar. “We hope to be back to full personnel numbers by the end of May or the start of June,” said the spokesman. In the meantime, safety precautions will be taken, including staggered entrances to the yards for staff, obligatory masks and gloves at work, temperature checks at entrances to spot fever sufferers and in-house medical staff. Each staff member will be given a packet of 20 masks per week so they can change them multiple times during each day. “We are planning buses to get staff to work so they don't have to use public transport,” said the spokesman. Similar measures will be taken at Fincantieri's other yards in Italy, which build cruise ships. During the shutdown, the firm's 8,900 staff were kept at home through use of vacation time, furloughs and home working. By contrast, Italian state defense group Leonardo did not close during the lockdown, although many staff worked from home when possible. A deal was struck with unions to introduce social distancing and cleaning at facilities in Italy, and no staff were furloughed, a spokeswoman said. Separately, the Italian government has reconfirmed Leonardo CEO Alessandro Profumo in his role after his mandate ended. The government did however appoint a new chairman, Luciano Carta, who moves from his post as director of Italy's foreign intelligence service. He replaces Gianni De Gennaro, who was head of the government department overseeing Italy's foreign and domestic intelligence services between he joined Leonardo in 2013. https://www.defensenews.com/coronavirus/2020/04/22/fincantieri-reopens-shipyards-in-italy

  • US Army to field long-range combat aircraft to first unit in FY31

    25 avril 2024 | International, Aérospatial

    US Army to field long-range combat aircraft to first unit in FY31

    The program's schedule is behind by a year following Lockheed Martin's protest over the Army's decision to choose Bell's offering.

  • For DoD cyber, 2019 is the year of doing

    31 janvier 2019 | International, C4ISR

    For DoD cyber, 2019 is the year of doing

    By: Mark Pomerleau Following a year of cyberspace strategizing, 2019 will be all about implementing rules and tools, according to the Department of Defense's top uniformed cyber policy adviser. Appearing Jan. 29 before the Senate Armed Services Subcommittee on Cybersecurity, Brig. Gen. Dennis Crall said the department knows where it needs to head following last year's DoD cyber strategy (the first in three years) and now is the time to show results. “This is the year of outcomes and that's what we're focused on — delivering the capabilities and improvements that we've discussed for some time,” he told the committee, adding that the strategy process allowed them to take a look at some departmental gaps and get after them. The strategy actually has actionable lines of effort and there are things they can do to measure progress, he said. The document lays out five objectives and five areas of interest under its strategic approach. The five objectives include: Ensuring the joint force can achieve its missions in a contested cyberspace environment; Strengthening the joint force by conducting cyberspace operations that enhance U.S. military advantages; Defending U.S. critical infrastructure from malicious cyber activity that alone, or as part of a campaign, could cause a significant cyber incident; Securing DoD information and systems against malicious cyber activity, including DoD information on non-DoD-owned networks; and Expanding DoD cyber cooperation with interagency, industry, and international partners. The five areas of interest under the guise of its strategic approach include building a more lethal joint force; competing and deterring in cyberspace; strengthening alliances and attracting new partners; reforming the department; and cultivating talent. The strategy also notes DoD must take action in cyberspace during day-to-day competition to preserve U.S. military advantages and defend U.S. interests. The focus will be on nation states that can pose strategic threats to the United States, namely China and Russia. “We will conduct cyberspace operations to collect intelligence and prepare military cyber capabilities to be used in the event of crisis or conflict,” the document says. Dana Deasy, the department's chief information officer, told the same committee that the threat from Russia and China is so acute he is briefed weekly from U.S. Cyber Command and the National Security Agency on them. This allows him to understand their offensive and defensive posture relative to the DoD. “Suffice to say that these are very strong, capable adversaries, but at the same time we have some strong, capable abilities ourselves,” he said. Cyber Command has now assembled a full force of cyberwarriors and received limited acquisition authority to start equipping them. However, there is much more work to be done. In fact, aside from individual tools, the force is still in need of a training range where cyberwarriors can do individual and collective training, as well as mission rehearsal, similar to rifle ranges or national training centers in the physical world. The Persistent Cyber Training Environment, being run by the Army for the joint force, will get after this; however, it is still in the prototype phase with a limited capability delivered to users. Additionally, the force needs a large-scale command-and-control platform that will house tools, provide commanders global situational awareness of forces and enable forces to plug into operations from remote locations. This is the goal of Unified Platform, which is also still in the prototype phase, though officials have said a limited product could be delivered as early as the spring. https://www.fifthdomain.com/dod/2019/01/30/for-dod-cyber-2019-is-the-year-of-doing

Toutes les nouvelles