#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News

missile attack | Breaking Cybersecurity News | The Hacker News

Category — missile attack
Wikileaks Unveils Project Protego: CIA's Secret Missile Control System

Wikileaks Unveils Project Protego: CIA's Secret Missile Control System

Sep 07, 2017
Every week since March Wikileaks has been leaking secrets from the United States Central Intelligence Agency (CIA), which mainly focus on surveillance techniques and hacking tools employed by its agents. However this time, the whistleblower organisation has released something different from its previous Vault 7 leaks , because it's not about hacking and spying; instead, it's a—Missile Control System. Dubbed Project Protego , the PIC-based missile control system is installed on-board a Pratt and Whitney Aircraft (PWA) equipped with missile launch system, which gives it ability to hit air-to-air and air-to-ground targets. The latest leak contains four secret documents in total from the project Protego, along with "37 related documents (proprietary hardware/software manuals from Microchip Technology Inc)," WikiLeaks says. Leaked documents reveal system design, a guide on how to configure and build Protego images, and also suggest that all micro-controller un...
Watch Out for Malware If You're Interested in North Korean Missile Program

Watch Out for Malware If You're Interested in North Korean Missile Program

Jul 06, 2017
If you hold an interest in the North Korean Missile Program and are one of those curious to know capabilities of the recently tested North Korean long-range missile than you could be a target of a new malware campaign. North Korea claims to have conducted the first test of an intercontinental ballistic missile (ICBM), the Hwasong-14 , on 3rd July, and US officials believe the country may have fired a brand-new missile that has not been seen before. Now, just a day after the test missile launch, hackers have started utilizing the news to target people interested in North Korean missile arsenal that has progressed over the decades from crude artillery rockets to testing what the country claims long-range missiles that could strike targets in the United States. Security researchers at Talos Intelligence have discovered a new malware campaign that started on 4th July to target victims with KONNI, an unknown Remote Access Trojan (RAT) that has been in use for over three years. ...
Want to Grow Vulnerability Management into Exposure Management? Start Here!

Want to Grow Vulnerability Management into Exposure Management? Start Here!

Dec 05, 2024Attack Surface / Exposure Management
Vulnerability Management (VM) has long been a cornerstone of organizational cybersecurity. Nearly as old as the discipline of cybersecurity itself, it aims to help organizations identify and address potential security issues before they become serious problems. Yet, in recent years, the limitations of this approach have become increasingly evident.  At its core, Vulnerability Management processes remain essential for identifying and addressing weaknesses. But as time marches on and attack avenues evolve, this approach is beginning to show its age. In a recent report, How to Grow Vulnerability Management into Exposure Management (Gartner, How to Grow Vulnerability Management Into Exposure Management, 8 November 2024, Mitchell Schneider Et Al.), we believe Gartner® addresses this point precisely and demonstrates how organizations can – and must – shift from a vulnerability-centric strategy to a broader Exposure Management (EM) framework. We feel it's more than a worthwhile read an...
German Missile System Hacked; 'Unexplained' Commands Executed Remotely

German Missile System Hacked; 'Unexplained' Commands Executed Remotely

Jul 11, 2015
Now this is a shockingly dangerous threat when hackers are taking over weapons and missiles. This time I am not talking about weapon systems being hackable, but being HACKED! A German Patriot anti-aircraft missile system stationed on Turkish-Syrian border was reportedly hacked and taken over by an unknown " foreign source " who successfully executed " unexplained commands ." Two Attack Vectors Attacks on the Patriot missiles system were detected when "unexplained" orders were given to the weapons via two supposed weak spots. German trade publication Behörden Spiegel reports that the American-made missile system was accessed either through a Computer Chip that directs weapons guidance or through a Real-Time information exchange that provides communication between arms and commands. The publication speculates that the hackers may have stolen sensitive information and accessed missile control that could result in a missile firing ...
cyber security

Innovate Securely: Top Strategies to Harmonize AppSec and R&D Teams

websiteBackslashApplication Security
Tackle common challenges to make security and innovation work seamlessly.
Expert Insights / Articles Videos
Cybersecurity Resources