China’s Salt Typhoon hackers violated the US National Guard for nearly one year
After reporting the last The week when the film “Raw” Jeffrey Epashtin prison sent by the FBI is probably at least some modified (though no evidence that the film has been deceptively manipulated), a wired report on Tuesday reported that the video was deleted from the video that it had been removed from 2 minutes and 53 seconds.
The US Department of Homeland Security is controversial on DNA samples from about 133,000 immigrant children and adolescents that the department has added to a criminal database. Meanwhile, Jeremiat Fowler’s researcher released findings this week, with more than 2 GB of highly sensitive childbirth data, including information on biological parents, children and adoptive parents-on the Internet.
The new feature of Roblox reliable fittings includes age confirmation that uses artificial intelligence to scan teenage video selfies and determines if they can be accessible to unconscious chats with people who know. And since the deep video capabilities have matured – including artificial intelligence tools that can even manipulate live video videos – the “nude” operating systems attract millions of users and generate millions of dollars in technology from US companies.
And there are more things every week, we collect security news and privacy that we have not covered deeply. Click the titles to read the full stories. And stay safe there.
The Chinese -backed Hacking Group, known as Topson salt, once last year shocked the United States with the revelation that deeply infiltrated US telecommunications systems, even targeting citizens’ text messages and telephone conversations, including Donald Trump and JD Venus in real time. The group now appears to include the US military and spent most of the last year on the US National Guard in at least one state. NBC News this week about the DHS note, obtained by the non -profit transparency of the National Security National Security, reported that the Chinese hacker group has violated the state -level National Guard Network from March to December last year. This did not specify which state was targeted. According to the note, Salt Typhoon’s access will probably provide data for Beijing that can facilitate the hacking of the National Army National Guard units and possibly many government -level cyber security partners. “
The Trump administration is developing a new digital system designed to grant migration and customs enforcement access to real -time taxpayer data, including their home address. The interior designs, revealed by Propublica on Tuesday, show that the system is designed to automate and accelerate data transactions “on request”, and by passing traditional IRS protection that usually requires legal and legal justification. The system reflects a major change in how IRS data is accessed, and now raises concerns about civil liberties that say the process may violate privacy laws and accelerate the ICE ability to access tax data for exile purposes.
A zero -day vulnerability that allows train brakes to be created by malicious hackers is a worrying concept. A daily 7,300 daily vulnerability that exposes the trains to the brake hack is a shocking level of negligence for a piece of important US infrastructure. Last week, the Cyber Security and Infrastructure Security Agency released a consultation on a protocol that allows a device on the train (hot) to send the brake signal to another device at the end of the train (EOT) for long trains such as transportation trains. This means that hackers can submit their unauthorized commands to disrupt trains, turn off rail networks or even create anxiety, one of the researchers in this consultation told SecurityWeek. This is much more important than the fact that the researchers discovered that vulnerability was first reported in 2005, but has never been seriously or resolved. Tens of thousands of hot and eot vulnerable devices are to be replaced in a process that will begin next year.
Hackers who want to create a batter of malware-controlled Internet devices can distinguish these devices for vulnerabilities-which are abundant enough-and use them remotely. Or better, they can even infect them before sending. Google announced this week that it is a lawsuit against the so -called Badbox 2.0 Botnet executives, which includes 10 million Android TVs that have been infected with malware before selling to consumers. Botnet operators, which Google describes as Chinese cybercriminals, then access those devices to be used as proxy machines or click on a wide design. Badbox 2.0 “is currently the largest known buttant of the Internet -connected television devices and grows every day. It hurts millions of victims in the United States and around the world and threatens many others.”