det.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Mastodon Server des Unterhaltungsfernsehen Ehrenfeld zum dezentralen Diskurs.

Administered by:

Server stats:

2.1K
active users

#cyberwarfare

2 posts2 participants0 posts today

With Chinese diplomats reportedly admitting to targeting US Critical Infrastructure as a "warning to the U.S. about Taiwan" and some in the industry war-gaming the possibility of Cyber Effects being used to sway the Trade dispute between the US and China, now seemed a good time to do a reality check on how - if at all - China would do so.

The bottom line - expect a surge in cyber espionage and signaling campaigns targeting US telcos and leadership to provide the CCP a competitive advantage in negotiations and their backdoor dealings.🕵️

Cyber Security doesn't operate in a vacuum - here's a good example of where geopolitics starts to seep in at the edges: opalsec.io/is-cyber-a-legitima

Opalsec · Is "Cyber" a Legitimate Weapon in a Tariff War?Amidst the US-China trade war drama, would China actually pull the trigger on destructive cyber attacks using known footholds (think Volt & Salt Typhoon) in US critical infrastructure? Probably not, but expect a surge in cyber espionage and signaling campaigns targeting US telcos and leadership.

Cyberattacks by AI agents are coming

Agents could make it easier and cheaper for criminals to hack systems at scale. We need to be ready.

by Rhiannon Williams, April 4, 2025

"Agents are the talk of the AI industry—they’re capable of planning, reasoning, and executing complex tasks like scheduling meetings, ordering groceries, or even taking over your computer to change settings on your behalf. But the same sophisticated abilities that make agents helpful assistants could also make them powerful tools for conducting cyberattacks. They could readily be used to identify vulnerable targets, hijack their systems, and steal valuable data from unsuspecting victims.

"At present, cybercriminals are not deploying AI agents to hack at scale. But researchers have demonstrated that agents are capable of executing complex attacks (Anthropic, for example, observed its Claude LLM successfully replicating an attack designed to steal sensitive information), and cybersecurity experts warn that we should expect to start seeing these types of attacks spilling over into the real world."

Read more:
technologyreview.com/2025/04/0
#Cyberattacks #ZeroDay #AI #LLMs #Cyberwarfare

MIT Technology Review · Cyberattacks by AI agents are comingBy Rhiannon Williams

"[T]he main thing that people need to understand about Signal is that messages are encrypted from my phone to your phone in such a way that Signal can't read them as they go through their servers. The government could not read them off of Signal servers even with a warrant, even if they really wanted to. But if somebody has access to your phone, they can read those messages the same way you can by looking at them with their eyeballs because the messages have to be decrypted for you to read.

Now, there are a lot of ways that you can get access to somebody's phone. You can look over their shoulder while they're reading their messages, right? You can find out their password and unlock their phone, right? You can use forensic tools that police have like a Cellebrite or a break-in device to unlock phones, and then you can read the messages that way. You can also use malware. Installing malware on somebody's phone is a way that governments often gain access to people's private encrypted communications. Things like Pegasus malware or they're recently written about malware from Paragon Solutions that was going after WhatsApp messages, which was also end-to-end encrypted.

A concern about national security folks using these devices for the communications is that it makes it much more likely that their devices will get targeted by malware. And there's a lot of countries that have espionage capabilities that have the capability to target people's phones that would be very interested in knowing what Pete Hegseth is talking about, or what other high-level cabinet officials are talking about. So that makes for a very juicy intelligence target for foreign intelligence, and I think it's safe to assume that's something that many countries are now going to be going after."

techpolicy.press/about-that-si

Tech Policy Press · About that Signal Chat | TechPolicy.PressTo learn more about the scandal, Justin Hendrix spoke to Just Security co-editor-in-chief Ryan Goodman and EFF senior staff technologist Cooper Quintin.

Three papers with #SECUSO participation have been accepted for presentation at this year's Conference on #Human #Computer Interaction (CHI 2025)! The journal article "Encouraging Users to Change Breached Passwords Using the Protection Motivation Theory" by @yixinzou, Khue Le, Peter Mayer, Alessandro Acquisti, Adam J. Aviv, and Florian Schaub deals with design interventions to encourage users to change breached passwords. Furthermore, the paper “It's a Match - Enhancing the Fit between Users and #Phishing Training through #Personalisation” by Lorin Schöni, Neele Roch, Hannah Sievers, Martin Strohmeier, Peter Mayer, and Verena Zimmermann, as well as the Late Breaking Work “It's like an explosion”: #Cyberwarfare harms for civilian population in Ukraine during the Russian invasion” by Oksana Kulyk, Jari Kickbusch, and Peter Mayer were accepted. CHI 2025 will take place in Yokohama, Japan, from April 26 to May 1st, 2025.
See all papers: programs.sigchi.org/chi/2025/s

programs.sigchi.orgConference Programs

#Musk has revealed that #𝕏 was hit by a major #cyberattack, far beyond routine threats.
According to Musk, this wasn’t just another day in cyberspace—it was a well-funded, highly coordinated #strike.

"Either a large, coordinated group and/or a country is involved,"

Could this be part of a broader geopolitical #cyberwarfare escalation? Who stands to gain from crippling a global platform?

One thing is clear: cyberattacks are no longer just about data breaches—they’re about #power.

So glad the U.S. is moving to the right side. 🙃

Polish Researchers Detect Ship-Based GPS Jammers in Baltic Sea
"... align[s] with past reports of high-power radio equipment fitted aboard vessels in the Russian "'shadow fleet.'"
maritime-executive.com/article
#Russia #GPS #cyberwarfare #BalticSea #Baltic #EU #Europe #geopolitics #Ukraine

Sources have previously informed Lloyds List of clandestine, high-powered radio gear mounted aboard Russia-linked tankers (Finnish Border Guard file image)
The Maritime ExecutivePolish Researchers Detect Ship-Based GPS Jammers in Baltic SeaBy The Maritime Executive

Survey: a majority of Germans are afraid of cyber warfare.

The majority of Germans (70%) see cybercrime as a major threat, and almost as many (64%) believe that Germany is poorly prepared for cyberattacks. Six out of ten even fear a cyberwar.

mediafaro.org/article/20250213

heise online · Survey: majority of Germans are afraid of cyber warfare
More from Marie-Claire Koch

Ukraine Daily summary - Tuesday, January 21 2025

False story: Denmark denies Russian claims of F-16 instructor killed in Kryvyi Rih strike -- Trump sees peace in Ukraine as a deal but refuses to play his winning hand -- Massive Russian hack on government database shows cracks in Ukraine's digitalization drive -- Russia's primitive glide bombs are still outmatching Ukraine's air defenses, killing more civilians -- and more

writeworks.uk/~/UkraineDaily/U

writeworks.ukUkraine Daily summary - Tuesday, January 21 2025False story: Denmark denies Russian claims of F-16 instructor killed in Kryvyi Rih strike -- Trump sees peace in Ukraine as a deal but refuses to play his winning hand -- Massive Russian hack on government database shows cracks in Ukraine's digitalization drive -- Russia's primitive glide bombs are still outmatching Ukraine's air defenses, killing more civilians -- and more