First Circuit Court of Appeals Upholds Eight Months of Warrantless 24/7 Video Surveillance
EFF Legal Intern Talya Nevins contributed to the drafting of this blog post. A federal appellate court in Massachusetts has issued a ruling that effectively allows federal agents in Puerto…
How NOT to Assess an E-voting System
by Vanessa Teague, an Australian computer scientist, cryptographer, and security/privacy expert. (Part 2 of a 5-part series starting here) Australian elections are known for the secret ballot and a long…
DDoS threat to Lithuania continues. Hacktivists hit Iranian steel mill. Bumblebee loader takes C2C markteshare. CISA adds Known Exploited Vulnerabilities. Music piracy. Where do spies go?
Distributed denial-of-service attacks against Lithuania. Dark Crystal RAT described. Iranian steel mill suspends production due to cyberattack. Bumblebee rising. CISA adds to its Known Exploited Vulnerabilities Catalog. Music pirate sites…
Canadian NetWalker ransomware defendant agrees to plead guilty in US court
A Canadian man arrested early last year for his role in the NetWalker ransomware attacks agreed to plead guilty to four charges that could earn him a maximum of 40…
Chinese influence operation aimed to protect Beijing’s stake in rare earth mining, research finds
A Chinese influence operation unsuccessfully tried to mobilize U.S. protests against an Australian rare earths mining company planning an expansion in Texas in an effort to defend Beijing’s dominance in…
BloodHound v4.1.1 released: Active Directory Toolkit
BloodHound is a single page Javascript web application, built on top of Linkurious, compiled with Electron, with a Neo4jdatabase fed by a PowerShell ingestor. BloodHound uses graph theory to reveal the hidden and…