Sunday, December 04, 2022 // (IG): BB // Bubba3dPrints // Coffee for Bob
The next AMD, Apple and Nvidia chips 100% Made In USA
FROM THE MEDIA: TSMC will begin production on U.S. soil in 2024 at its Arizona plant. Recently, Apple has put pressure on TSMC to benefit from the company’s latest innovations. TSMC, despite its power, does not seem to have much choice because of the protectionist policies that the USA is putting in place, but also because of the geopolitical uncertainty that poses certain threats to the independence of Taiwan. It is in this context that in the next few hours the American president Biden accompanied by the CEO of Apple Tim Cook, but also of NVIDIA, Jensen Huang, the CEO of AMD, Dr. Lisa Su, will be present to attend a ceremony in Arizona announcing the acceleration of the deployment of TSMC on American soil.
READ THE STORY: Overclocking
Elon Musk slams NY Times for ignoring his exposé
FROM THE MEDIA: Elon Musk attacked The New York Times on Saturday for not covering his exposé of how Twitter executives were urged by Biden staff to delete tweets relating to the damaging contents of Hunter Biden's laptop. Other left-leaning outlets including CBS News, ABC and The Washington Post are also yet to cover the 'Twitter Files', despite their contents causing a sensation among American conservatives and free-speech advocates. In response to the alleged lack of coverage from the Times, Musk described the newspaper as an 'unregistered lobbying firm for far left politicians'.
READ THE STORY: DailyMail UK
6 Quadrillion Token Heist Hits BNB Chain-Based DeFi Protocol Ankr
FROM THE MEDIA: Web3 infrastructure provider Ankr is the latest victim of hacking and financial theft. The BNB Chain-Based DeFi protocol has confirmed in a series of tweets that it got hacked, and the attacker managed to steal six quadrillion tokens. The stolen crypto was Ankr Reward Bearing Stake/aBNBc. Lookomchain, an on-chain analytics firm, stated that the hacking occurred on Friday, and the hacker stole around $10 million worth of crypto (USDC coins).
READ THE STORY: HackRead
Russia reaped $1 billion of wheat in occupied Ukraine
FROM THE MEDIA: Ukraine has lost at least $1 billion of wheat that was harvested in areas controlled by Russia, according to research using satellite imagery from NASA’s food security and agriculture program. The analysis gives an idea of what’s happening in occupied territories, where information is tightly controlled. It uses a machine-learning model detecting texture and color changes based on a time-series of satellite images to map where crops have been harvested or left unharvested.
READ THE STORY: Press Herald
China's Emerging Subsurface Presence In The Indian Ocean "
FROM THE MEDIA: From manned submarines to underwater drones, China's stepped-up deployments in the region are concerning to India. According to the United States'“China's Military Power Report 2022,” China's People's Liberation Army Navy (PLAN) is““numerically” the largest navy in the world. The report also highlights that the PLA support base in Djibouti is going to play a crucial role in providing China the capacity to“project and sustain military power at a greater distance.”
READ THE STORY: MENAFN
Counter speech as a strategy to prevent hate speech in Uganda
FROM THE MEDIA: There has been a great deal of hue and cry among the Ugandans over the scale of hate speech targeting certain members of society. Some episodes of hate speech have recently fomented or triggered instances of mob actions as counter measures in certain quarters in Uganda. It is little wonder that Uganda has recently enacted the Computer Misuse Act (2022) with specific provisions to address hate speech online. This approach has had many detractors with good reason prophesying the law will have claw back effects on freedom of expression.
READ THE STORY: Monitor
Cambridge Water customers’ bank details published to dark web after cyber attack
FROM THE MEDIA: Cambridge Water has written to customers to warn them that “criminals may try to use this compromised data to carry out fraud, in particular by submitting fraudulent Direct Debit mandates to your bank or building society using the data compromised in the cyber-attack”. Andy Willicott, managing director of Cambridge Water, said in a statement: “We understand that customers trust us to keep their data safe and I’d personally like to say sorry to all those customers impacted – we’ll be doing what we can to support you through this.”
READ THE STORY: Cambridge Independent
Attack of drones: airborne cybersecurity nightmare
FROM THE MEDIA: Once a niche technology, drones are about to explode in terms of market growth and enterprise adoption. Naturally, threat actors follow the trend and exploit the technology for surveillance, payload delivery, kinetic operations, and even diversion. There exists a class of tiny and highly maneuverable devices that introduce a variety of cybersecurity risks you probably haven’t considered before. Drones currently occupy a unique legal position as they are classified as both aircraft and networked computing devices.
READ THE STORY: security Affairs
New CryWiper wiper targets Russian entities masquerading as a ransomware
FROM THE MEDIA: Researchers from Kaspersky discovered a previously unknown data wiper, dubbed CryWiper, that was employed in destructive attacks against Russian mayor’s offices and courts. The malware masquerades as ransomware, but the analysis of the code demonstrates that it does not actually encrypt, but only destroys data in the infected system. According to Kaspersky, the wiper was first spotted in the fall of 2022 when it was employed in an attack against an organization’s network in the Russian Federation.
READ THE STORY: Security Affairs // HackRead
Google fixed the ninth actively exploited Chrome zeroday this year
FROM THE MEDIA: Google rolled out an emergency security update for the Chrome web browser to address a new zero-day vulnerability, tracked as CVE-2022-4262, that is actively exploited. The CVE-2022-4262 vulnerability is a type confusion bug in the V8 JavaScript. The vulnerability was reported by Clement Lecigne of Google’s Threat Analysis Group on November 29, 2022. “CVE-2022-4262: Type Confusion in V8. Reported by Clement Lecigne of Google’s Threat Analysis Group on 2022-11-29” reads the advisory published by Google. “Google is aware that an exploit for CVE-2022-4262 exists in the wild.”
READ THE STORY: Security Affairs
How To Unravel The Minefield That Is Web App Security
FROM THE MEDIA: Web application security aims to preventatively circumvent the catastrophic effects of a cyberattack or data breach. Common attack vectors against web-based applications include injections, man-in-the-middle (MITM) attacks, and session hijacking amongst other types of exploits. There is no doubt about it: web application security is key, especially when studies find that cybercrime will cost $5.2 trillion in lost value across all industries by 2024.
READ THE STORY: Information Security Buzz
Cloud provider Rackspace hit by ongoing 12-hour Exchange outage
FROM THE MEDIA: American cloud computing services provider Rackspace is investigating a 12-hour-long and still active outage leading to connectivity issues and affecting hosted Microsoft Exchange environments they manage for their customers. The list of impacted services includes MAPI/RPC, POP, IMAP, SMTP, ActiveSync, and the Outlook Web Access (OWA) interface used to access the Hosted Exchange instance to manage email online. "We are investigating an issue that is affecting our Hosted Exchange environments. More details will be posted as they become available," Rackspace said on Friday night, at 02:49 AM EST, when it acknowledged the outage.
READ THE STORY: Bleeping Computer
Medibank prognosis gets worse after more stolen data leaked
FROM THE MEDIA: Australian health insurer Medibank's prognosis following an October data breach keeps getting worse as criminals dumped another batch of stolen customer data on the dark web. The miscreants, believed to be linked to Russia's REvil ransomware gang, posted what they claimed to be the rest of the exfiltrated data on Thursday, adding: "Case closed." Medibank said it's still analyzing the leaked data, which includes six "sipped files in a folder called 'full' containing the raw data that we believed the criminal stole."
READ THE STORY: The Register
Rackspace rocked by ‘security incident’ that has taken out hosted Exchange services
FROM THE MEDIA: UPDATED Some of Rackspace’s hosted Microsoft Exchange services have been taken down by what the company has described as a “security incident”. The company’s most recent incident report at the time of writing, time-stamped 01:57 Eastern Time on December 3rd, offers the following information. “On Friday, Dec 2, 2022, we became aware of an issue impacting our Hosted Exchange environment. We proactively powered down and disconnected the Hosted Exchange environment while we triaged to understand the extent and the severity of the impact. After further analysis, we have determined that this is a security incident.”
READ THE STORY: The Register
Preparing for a Russian cyber offensive against Ukraine this winter
FROM THE MEDIA: As we report more fully below, in the wake of Russian battlefield losses to Ukraine this fall, Moscow has intensified its multi-pronged hybrid technology approach to pressure the sources of Kyiv’s military and political support, domestic and foreign. This approach has included destructive missile and cyber strikes on civilian infrastructure in Ukraine, cyberattacks on Ukrainian and now foreign-based supply chains, and cyber-enabled influence operations[1]—intended to undermine US, EU, and NATO political support for Ukraine, and to shake the confidence and determination of Ukrainian citizens.
READ THE STORY: Microsoft
America’s Critical Infrastructure is Fragile and Vulnerable
FROM THE MEDIA: In May of last year, the 5,500-mile-long Colonial Pipeline shut down for the first time ever. A ransomware attack on the pipeline created fuel shortages on the entire East Coast, driving up gas prices and creating a state of emergency. The attack sparked immense concern over critical infrastructure cyber security. Cyber networks and information systems support critical infrastructure. Transportation systems, energy, financial services, and communications are inherently at risk for cyber-attacks and cyber intrusions.
READ THE STORY: IPD
Arabs hack phones of IDF soldiers, publish footage from military service
FROM THE MEDIA: Arab sources have uploaded a video clip showing portions of videos and photographs that they claim to have accessed through hacking the mobile phones of IDF soldiers. The video, titled, "You Are Not Safe," presents photos of soldiers in combat units, including in the Armored Corps, footage of Armored Corps training, a helicopter landing during an exercise, shooting at a firing range, the launch of an Iron Dome intercept missile, IDF soldiers at a military base, soldiers in their living quarters, in an office, and on a bus, preparations for a ceremony, and personal photos of soldiers throughout their military service.
READ THE STORY: Israel National News
The financing of North Korea’s nuclear development comes from digital currency theft. Now that FTX has fallen, may it also
FROM THE MEDIA: The repercussions of FTX, the second-largest cryptocurrency exchange in the world, declaring bankruptcy earlier this month have been felt globally. However, there are some less than innocent people among the numerous victims. Cryptocurrency theft has proven to be a (relatively) easy means for the Democratic People’s Republic of Korea, a nation under stringent sanctions, to finance its growing nuclear weapons. It is well known that for years, North Korea’s military operation under Kim Jong-un has been stealing cryptocurrencies to fund its nuclear and missile programs.
READ THE STORY: Inside Bitcoins
Ransomware attack on India’s premier medical institute likely involved Chinese hackers, ‘foreign state actor’
FROM THE MEDIA: The ransomware cyberattack that crippled the online management system of the All India Institute of Medical Sciences (AIIMS) in New Delhi involved China-based hackers including possibly “a foreign state actor”, reported the indianexpress.com and the timesofindia.com Dec 3, citing preliminary investigation. The cyber incident that took place last month had brought the online management system of the institute to a halt, and raised concerns over the data of crores of patients being compromised, including that of high-profile political personalities.
READ THE STORY: Tibetan Review
Google terminates thousand of YouTube channels in China, Russia, Brazil
FROM THE MEDIA: Google has purged thousands of YouTube channels in China, Russia and Brazil as part of its investigation into coordinated influence operations.
The tech giant terminated 5,197 YouTube channels and 17 Blogger blogs as part of its ongoing investigation into coordinated influence operations linked to China.
"These channels and blogs mostly uploaded spammy content in Chinese about music, entertainment, and lifestyle. A very small subset uploaded content in Chinese and English about China and US foreign affairs," the company said in a blog post.
READ THE STORY: ET
NATO prepares for cyber war
FROM THE MEDIA: Some 150 NATO cybersecurity experts assembled in an unimposing beige building in the heart of Estonia’s snow-covered capital this week to prepare for a cyberwar. It’s a scenario that has become all too real for NATO member states and their allies since the Russian invasion of Ukraine. The conflict has forced Ukraine to defend against both missile attacks and constant efforts by Russian hackers intent on turning off the lights and making life more difficult for their besieged neighbors.
READ THE STORY: Politico
Items of interest
How Semiconductor Chips Changed the Driving Experience Forever—and Not for the Better
FROM THE MEDIA: A confession: Until recently, whenever talk of semiconductor shortages came up, I was under the impression that most cars made do with just a handful of the things. I say a handful. One seemed like it would be enough: one car, one engine, one big fat semiconductor. My estimate was a little short. Some cars come loaded with as many as 3,000. Semiconductors—aka microchips—are big business, as you probably know. According to an organization called World Semiconductor Trade Statistics, more than 932 billion of them were made in 2020, a number so vast I don’t even know what to compare it to.
READ THE STORY: Robb Report
The Case of China's Cyber Army - Hacking the World (Video)
FROM THE MEDIA: The Case of China's Cyber Army - Hacking the World. Chinas Hacker Army has been conducting a world wide Cyber Espionage Campaign. PLA Unit 61398 is suspected to be behind these cyber attacks.
MWI War Council: Cyber Operations in Modern Warfare - Ukraine and Beyond (Video)
FROM THE MEDIA: The Modern War Institute at West Point hosted a multi-disciplinary panel to discuss how the war in Ukraine is—or is not—changing core assumptions about conflict in the cyber domain. In many ways, the war in Ukraine appears to undermine assumptions about the changing nature of warfare, as the most decisive elements have played out on land rather than in new technological domains.
These open source products are reviewed from analysts at InfoDom Securities and provide possible context about current media trends in regard to the realm of cyber security. The stories selected cover a broad array of cyber threats and are intended to aid readers in framing key publicly discussed threats and overall situational awareness. InfoDom Securities does not specifically endorse any third-party claims made in their original material or related links on their sites, and the opinions expressed by third parties are theirs alone. Contact InfoDom Securities at dominanceinformation@gmail.com