article thumbnail

U.S. Charges 4 Chinese Military Officers in 2017 Equifax Hack

Krebs on Security

Justice Department today unsealed indictments against four Chinese officers of the People’s Liberation Army (PLA) accused of perpetrating the 2017 hack against consumer credit bureau Equifax that led to the theft of personal data on nearly 150 million Americans. dubbed the “China Initiative Conference.”

Hacking 246
article thumbnail

Stark Industries Solutions: An Iron Hammer in the Cloud

Krebs on Security

Two weeks before Russia invaded Ukraine in February 2022, a large, mysterious new Internet hosting firm called Stark Industries Solutions materialized and quickly became the epicenter of massive distributed denial-of-service (DDoS) attacks on government and commercial targets in Ukraine and Europe. The homepage of Stark Industries Solutions.

DDOS 266
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Three cybercrime technology trends to watch in 2023

CyberSecurity Insiders

Spy”-type cyberspace race as both criminals and defenders vie to gain the upper hand using new and emerging technologies. Every technology that enables our cyber teams to pinpoint and resolve threats and prevent attacks more quickly and accurately also benefits cybercriminals.

article thumbnail

SiteLock INFINITY Wins 2017 Cloud Computing Excellence Award

SiteLock

We are excited to announce that SiteLock ® INFINITY™ was recently recognized as a winner of the 2017 Cloud Computing Excellence Awards by TMC’s Cloud Computing Magazine. INFINITY is a state of the art malware and vulnerability remediation service featuring unique, patent-pending technology.

article thumbnail

Keeping the Internet Secure

Adam Shostack

Today, a global coalition led by civil society and technology experts sent a letter asking the government of Australia to abandon plans to introduce legislation that would undermine strong encryption. Read the full announcement here ). I’m pleased to have joined in this effort by Accessnow, and you can sign, too, at [link].

Internet 100
article thumbnail

Rethinking the detection of child sexual abuse imagery on the internet

Elie

A critical part of child sexual abuse criminal world is the creation and distribution of child sexual abuse imagery (CSAI) on the Internet. To combat this crime efficiently and illuminate current defense short-coming, it is vital to understand how CSAI content is disseminated on the Internet.

article thumbnail

The War in Technology: A Digital Iron Curtain Goes Up

SecureWorld News

Many threats that have until now been theoretical—like creation of a "Ru-net" as an alternative to the Internet—are becoming a reality. Cutting off Internet access to a country the size of Texas is not as simple as cutting a few cables or bombing a few cell towers. There are many tech angles to the war in Ukraine.