Tag Archive for: Gen.

PM Defensive Cyber Operations Transitions to Army’s PEO IEW&S; Brig. Gen. Ed Barker Quoted


The Program Executive Office Intelligence, Electronic, Warfare and Sensors is building up the U.S. Army’s cyber capabilities with the addition of Project Manager Defensive Cyber Operations.

With the transition, PEO IEW&S is integrating into its portfolio PM DCO’s two key programs: Cyber Platforms and Systems and Cyber Analytics and Detection, the service branch said Thursday.

CPS facilitates the procurement and delivery of cybersecurity tools and related platforms to the armed forces and CAD offers capabilities that enable warfighters to analyze and detect internal and external cyberthreats to the Army.

“The days of the Army being a Kinetic only force are gone. Our ability to operate in multiple domains has become paramount with none more important than mastering the cyber warfare arena,” said Brig. Gen. Ed Barker, PEO for IEW&S.

Hackers reportedly breach thousands of Gen Digital customer accounts


Hackers have breached the accounts of about 6,450 Gen Digital Inc. customers, TechCrunch reported on Sunday.

Gen Digital Inc. is a publicly traded maker of antivirus software for consumers. The company was formed last September through the merger of cybersecurity providers Norton LifeLock Inc. and Avast plc. Besides antivirus software, Gen Digital also sells other cybersecurity products including a password manager and a virtual private network tool. 

Reports that some Gen Digital customer accounts had been breached first emerged on Friday. The next day, the company told Bleeping Computer in a statement that it has “secured 925,000 inactive and active accounts that may have been targeted” by hackers. On late Sunday, TechCrunch reported that 6,450 customers’ accounts were breached.

Gen Digital believes that the hackers may have accessed the names, phone numbers and mailing addresses of affected customers. The company also determined that the breach may have compromised some user data stored in its Norton Password Manager tool. According to Gen Digital, it’s possible the hackers accessed the login credentials that affected customers kept in Norton Password Manager.

Gen Digital said in a statement that its systems were not compromised in the breach. According to the antivirus maker, the hackers gained access to customer accounts through a credential-stuffing attack. That’s a type of cyberattack in which hackers use login credentials stolen from one company to compromise the customers of another.

“Systems have not been compromised, and they are safe and operational, but as is all too commonplace in today’s world for bad actors to take credentials found elsewhere, like the dark web, and create automated attacks to gain access to other unrelated accounts,” a company spokesperson told Bleeping Computer. 

Gen Digital first identified the breach on Dec. 12 after detecting a large number of failed login attempts that targeted its customers’ accounts. The company has determined that the hackers began accessing customer accounts as early as Dec. 1.

After detecting the breach, Gen Digital notified affected customers and reset their passwords. The company says that…

Source…

GBT Successfully Concluded Testing of its GEN II Long-Range Radio System



Get inside Wall Street with StreetInsider Premium. Claim your 1-week free trial here.


GEN II Global Communication System is using SDR Technology and is Aimed to Work with GBT’s AI technology

SAN DIEGO, Dec. 01, 2022 (GLOBE NEWSWIRE) — GBT Technologies Inc. ( OTC PINK: GTCH ) (“GBT” or the “Company”), successfully concluded its GEN II long range radio project, which has been assigned an internal code name of “Infinia”. GBT thoroughly tested the system and believes successful results were achieved. The system is targeted to work with GBT’s artificial intelligent technology to enable communication dead zone coverage. GEN II includes voice/data transmission through Software Defined Radio (“SDR”) technology. The system utilizes mobile and base/relay units with the goal of facilitating global wireless communication. SDR communication is a software-controlled radio operation. As a typical wireless system is traditionally operated via hardware using radio modules and related components, SDR technology is a computer controlled wireless system. The Infinia is a data and voice communication system that operates via High Frequency (“HF”) radio waves. Infinia communicates through an ionospheric propagation environment to reach very long distances and is designed to overcome areas where there is no reception or skip zones which is one of the major obstacles in communication system. GBT evaluated Infinia to determine if it is capable for enabling an efficient, programmatical method for dead-zone coverage and believes it achieved successful results. The SDR system analyzes the Earth’s ionospheric conditions according to geographical zones and automatically tunes RF signals and frequencies to achieve continuous, reliable communication regardless of location, rough terrain, time of day, season and weather conditions. GBT plans to continue its research in this domain and will continue searching for commercial applications for the Infinia system.

“We are glad to announce a successful conclusion of the Infinia project. Our testing has revealed that the GEN II version can successfully overcome dead zones using our advanced SDR technology. The Infinia utilizes a base unit…

Source…

Netskope threat research identifies next gen phishing tactics


SANTA CLARA, Calif. – Netskope, the SASE computer security platform provider has released their new threat research which reveals the top sources of phishing attacks and cloud vulnerabilities.

Threats this go around are led by fake login page referrals, fake third-party cloud apps and more as detailed in the Netskope Cloud and Threat Report: Phishing. These threats mimic legitimate apps in order gain access to unsuspecting users’ information.

“Although email is still a primary mechanism for delivering phishing links to fake login pages to capture usernames, passwords, MFA codes and more, the report reveals that users are more frequently clicking phishing links arriving through other channels, including personal websites and blogs, social media, and search engine results,” Netskope wrote. “The report also details the rise in fake third-party cloud apps designed to trick users into authorizing access to their cloud data and resources.”

Email has been the traditional delivery method for phishing attempts however Netskope’s report notes that webmail made up 11% of attempts recorded as opposed to personal sites and blogs which were responsible for 26% of referrals to phishing content. That’s extrapolated from roughly 8 out of every 1000 enterprise users who clicked on phishing links or accessed phishing content during Q3 2022.

Search engines have also seen a rise of referrals to phishing pages due to attackers creating pages based on uncommon or obscure search terms, which sees them becoming the top link for search results. “Business employees have been trained to spot phishing messages in email and text messages, so threat actors have adjusted their methods and are luring users into clicking on phishing links in other, less expected places,” said Ray Canzanese, Threat Research Director, Netskope Threat Labs. “While we might not be thinking about the possibility of a phishing attack while surfing the internet or favorite search engine, we all must use the same level of vigilance and skepticism as we do with inbound email, and never enter credentials or sensitive information into any page after clicking a link. Always browse directly to login pages.”

Another…

Source…