Tag Archive for: Ends

With Eisenhower renaming, Army’s 100+ years honoring Confederates ends


FORT EISENHOWER, Ga. — When this installation’s former namesake invaded Maryland, the U.S. Army shot him five times.

Despite receiving five bullets at Antietam in 1862 — and three additional wounds in other battles — as he rose from captain to major general in the Confederate army during the Civil War, former slaveowner John Brown Gordon survived to become the head of the Ku Klux Klan in Georgia.

As a member of the U.S. Senate, Gordon helped negotiate the end of Reconstruction in 1877, which rehabilitated the white Southern elite and allowed a new era of racial oppression to emerge. A two-term governor of Georgia, Gordon was also the first commander of the United Confederate Veterans.

But in a Friday morning ceremony just outside of Augusta, the Army eschewed Gordon’s legacy in favor of that of Dwight D. Eisenhower, the post’s new namesake. Eisenhower helped lead the destruction of Nazi Germany as a five-star general in World War II, and oversaw key racial integration milestones later as president. In 1957, Eisenhower deployed the 101st Airborne Division to Arkansas and federalized the state’s National Guard when the governor attempted to block nine Black students from attending Little Rock Central High School.

Army Secretary Christine Wormuth spoke of Eisenhower’s achievements in a speech accompanying the ceremony, which members of the former president’s family attended.

Friday’s renaming marks the final such installation-level move for the Army, culminating a nearly three-year process that began when Congress’ fiscal 2021 defense policy bill established the bipartisan Naming Commission to rename the military’s places and objects that honored Confederates. Four members of the commission attended the final redesignation at Eisenhower.

Wormuth’s remarks also acknowledged how the renaming process emerged from the “unrest and significant division in our country” that followed racial justice protests sparked by the 2020 death of George Floyd. But she celebrated how the new namesakes “unquestionably represent” what the Army wants to see from its future soldiers and leaders.

Source…

Computer system breach ends work day early


A computer system breach shut down operations for Hinds County employees Thursday. Hinds County Tax Collector Eddie Fair confirmed that internal servers were hacked and access to computers was not granted. Employees were sent home for the day while an investigation into what caused the service interruption is conducted. Residents in Hinds County will not be able to purchase car tags or receive any services. Hinds County Sheriff Tyree Jones said the breach did not affect our emergency services, 911 dispatch or the radio system. This is developing. Stay with WAPT for updates on when offices could reopen.

A computer system breach shut down operations for Hinds County employees Thursday.

Hinds County Tax Collector Eddie Fair confirmed that internal servers were hacked and access to computers was not granted. Employees were sent home for the day while an investigation into what caused the service interruption is conducted.

Residents in Hinds County will not be able to purchase car tags or receive any services.

Hinds County Sheriff Tyree Jones said the breach did not affect our emergency services, 911 dispatch or the radio system.

wapt

Hearst OwnedHinds County Sheriff’s Office

This is developing. Stay with WAPT for updates on when offices could reopen.

Source…

Nitrogen Campaign Starts with Fake Ads, Ends with Ransomware


Threat actors are using bogus advertisements for IT tools on sites like Google and Microsoft’s Bing in hopes of luring tech users to inadvertently download malware that kicks off an attack that eventually leads to ransomware like BlackCat.

The hackers use the Nitrogen malware to get initial access into corporate networks, leading to second stage of the attack, which includes deploying Cobalt Strike Beacons and the Meterpreter shell, a payload designed to let an attacker move through a targeted system and execute code, according to cybersecurity firm Sophos X-Ops team.

“We assess it is likely that the threat actors mean to leverage this infection chain to stage compromised environments for ransomware deployment,” X-Ops researchers Gabor Szappanos, Morgan Demboski, and Benjamin Sollman wrote in a report.

The Nitrogen campaign is only the latest in what the researchers said are an increasingly popular type of attack that abuses click-per-play ads displayed in search engine results. They’ve seen the attackers targeted organizations in the tech and no-profit industries in North America and, given the array of trojanized installers that lead to the infections of systems, “the threat actors are trying to cast a wide net to lure unsuspecting users seeking certain IT utilities, and it is likely this campaign will attempt to impersonate other types of popular software to deliver Nitrogen in future attacks.”

Sophos’ look at the campaign follows on other research by security firms Trend Micro and eSentire, both of which found similar pattern.

It Starts with Malvertising

According to Sophos, the infections begin with the fake ads – malverstising – in Google and Bing Ads in hopes of directing victims to compromised WordPress sites and phishing pages that look like legitimate and popular sites where people can buy software. Instead, they inadvertently download trojanized ISO installers.

Included in the list of software the campaign impersonates are AnyDesk remote desktop app, Cisco AnyConnect VPN installers, and WinSCP, a Windows client. The researchers listed nine trojanized installers deploying the Nitrogen package.

“These applications are often used for business-related…

Source…

Central Government ends social networking sites.. ?


Central government ends social networking sites..!?

In recent years, various restrictions have been imposed on social networking sites in India. Especially religious posts, violent posts, obscene posts, false news, etc. are spreading beyond limits. social media companies are also taking various measures to control this. The government has imposed restrictions on this and is taking strict measures. Last year, the central government brought new regulations in this regard. According to the government report, it has been made mandatory for the companies to appoint officers and administrators to separately investigate and take action on the complaints received about the posts shared on social networking sites. Again there was a complaint that no action was taken if a complaint was filed. In the meantime, the central government said that a regulatory committee should be formed to investigate the matter and take action.But there are no restrictions as per government announcements. Again there was a complaint that no action was taken if a complaint was filed. In the meantime, the central government said that a regulatory committee should be formed to investigate the matter and take action. The IT rules have also been changed for this purpose. According to this change, many social networking sites including Twitter, Facebook, YouTube, and instagram will also have to function within the legal framework. A user complaint should be received within 24 hours. It has been announced that action should be taken on those complaints within 15 days.The central government hopes to increase the security of the internet through this. So it is expected that fake news, posts inciting violence, and obscene posts like obscene posts will decrease after this. Due to this, the government wants social networking companies to cooperate with the government. Intermediaries were merely dictating the terms to users. But that will no longer be the case. They must not publish any illegal records. Be it the leadership of the biggest tech companies in the US or Europe, when they operate in India, they should listen to the constitutional rights of indians and not go against the government.Currently, social media

Source…