#1 Trusted Cybersecurity News Platform Followed by 4.50+ million
The Hacker News Logo
Subscribe – Get Latest News
SaaS Security

cyber offensive | Breaking Cybersecurity News | The Hacker News

U.S. Department of Defense Officials are potential target of cyber espionage via social networking sites

U.S. Department of Defense Officials are potential target of cyber espionage via social networking sites

May 16, 2013
In the recent months I had the opportunity to conduct an interesting study on the use of Social Media in the Military Sector, large diffusion of media platforms makes them very attractive for governments and intelligence agencies . Social media platforms reveal enormous potentiality that could be exploited also in critical sectors such as military and defense. Modern social media networks are actively used by every government, the US, China and Russia are the most active in this field, but also emerging cyber countries like Iran and North Korea demonstrates an increasing interest in the matter. The principal uses of social media for government are Psychological Operations (PsyOps) OSInt Cyber espionage Offensive purposes On May 10th the Illinois Air National Guard 183rd Fighter Wing published a notice in the monthly issue of a newsletter titled Falcon View. The notice, that seems to be authentic, dedicates a paragraph to the use of social networking sites for
#OpIsrael - 7 APRIL Anonymous calls to army for massive attack against Israel

#OpIsrael - 7 APRIL Anonymous calls to army for massive attack against Israel

Apr 06, 2013
We are on the eve of the fateful day, April 7th , the collective of Anonymous announced a massive cyber attack against the state of Israel as part of the campaign started in the last months and named #OpIsrael . The hacktivists are conducting a massive call to army to recruit new forces and inform all the members of collective of the cyber attack planned against Israeli network infrastructures. The hacktivists protest against Israeli bombing of Palestinian territory expressing solidarity with the Palestinian people condemning Israeli Government and its decisions.  The hackers motivated to The Hackers Post website their participation with following statement: " Israel isn't stopping human rights violations. It's to show solidarity with newly recognized Palestinian state." "the hacking teams have decided to unite against Israel as one entity…Israel should be getting prepared to be erased from the internet. " Anonymous has promised to ' erase Israel from the internet ' in a coordin
How to Accelerate Vendor Risk Assessments in the Age of SaaS Sprawl

How to Accelerate Vendor Risk Assessments in the Age of SaaS Sprawl

Mar 21, 2024SaaS Security / Endpoint Security
In today's digital-first business environment dominated by SaaS applications, organizations increasingly depend on third-party vendors for essential cloud services and software solutions. As more vendors and services are added to the mix, the complexity and potential vulnerabilities within the  SaaS supply chain  snowball quickly. That's why effective vendor risk management (VRM) is a critical strategy in identifying, assessing, and mitigating risks to protect organizational assets and data integrity. Meanwhile, common approaches to vendor risk assessments are too slow and static for the modern world of SaaS. Most organizations have simply adapted their legacy evaluation techniques for on-premise software to apply to SaaS providers. This not only creates massive bottlenecks, but also causes organizations to inadvertently accept far too much risk. To effectively adapt to the realities of modern work, two major aspects need to change: the timeline of initial assessment must shorte
Cybersecurity Resources