Advertisement · 728 × 90
#
Hashtag
#cyberwarfare
Advertisement · 728 × 90
Comparaison de la route du MSC Antonia montrant, à gauche, la trajectoire réelle du navire et son point d’échouement, et à droite la route falsifiée par spoofing. Les lignes rouges et noires à droite indiquent les positions GPS trompeuses où le navire semblait soudain apparaître. Ces trajectoires erronées ont semé la confusion parmi les navigateurs et ont conduit à l’échouement. Images réalisées à partir de données de VT Explorer. Anna Raymaker

Comparaison de la route du MSC Antonia montrant, à gauche, la trajectoire réelle du navire et son point d’échouement, et à droite la route falsifiée par spoofing. Les lignes rouges et noires à droite indiquent les positions GPS trompeuses où le navire semblait soudain apparaître. Ces trajectoires erronées ont semé la confusion parmi les navigateurs et ont conduit à l’échouement. Images réalisées à partir de données de VT Explorer. Anna Raymaker

[8/8] Enfin, la connectivité accrue des navires, via internet satellitaire, multiplie les points d’entrée pour les cyberattaques. L’océan n’est plus un espace vide, mais un territoire numérique disputé, où circulent flux commerciaux et conflits invisibles. #HGGSP #geography #GPS #cyberwarfare

3 0 0 0
Preview
Quand le GPS devient une arme en mer : comment la guerre électronique menace les navires et leurs équipages Brouillage, spoofing et autres attaques numériques montrent à quel point le transport maritime moderne dépend de signaux GPS fragiles – et combien leurs perturbations peuvent mettre les équipages en d...

[1/8] Anna Raymaker (Georgia Institute of Technology) analyse l’essor du #spoofing #GPS en mer. Elle montre comment la guerre électronique transforme l’espace maritime en un environnement numérique instable, où la position même des navires devient incertaine. #HGGSP #geography #cyberwarfare

4 2 1 0
Preview
How Stuxnet changed cyberwarfare - Negative PID For a long time, people have thought of the Internet as a completely separate world from reality. It was difficult to conceive that something that happened

How Stuxnet changed cyberwarfare

negativepid.blog/how...

#stuxnet #cyberwarfare #espionage #sabotage #hackers #PPT #Cybersecurity #cyberattacks #cyberThreats #onlineSecurity #negativepid

0 0 0 0

Cyber warfare is reshaping global conflicts, blending traditional and digital battlefields. Nations must bolster cybersecurity to navigate this evolving threat landscape. #CyberWarfare #CyberSecurity #AI Link: thedailytechfeed.com/cyber-warfar...

0 0 0 0
Preview
What is the Lazarus group? - Negative PID At the beginning of December 2025, some of the members of the Lazarus group were caught on camera while conducting infiltration through a fake-job scheme. But

What is the Lazarus group?

negativepid.blog/wha...

#lazarus #cyberwarfare #organizedCrime #stateSponsoredCrime #cyberUnits #LazarusGroup #hackers #onlineRecruitment #Cybersecurity #cyberattacks #cyberThreats #onlineSecurity #negativepid

0 0 0 0

Who has 2 thumbs and just finished their Masters in #cyberwarfare ? Not me; I'm a Corgi and lack opposable thumbs. But I did finally finish my Masters Degree in Cyber Warfare.

1 0 1 0

FBI Director's email 'hacked by Iran-linked group,' per CBS. Funny how attribution is always so definitive without evidence when it suits a narrative. Remember Stuxnet 2010? #ThePiaz #CyberWarfare Follow @The_Piaz

Read more: piaz.news/article/fbi-director-s-p...

0 0 0 0

RE: mastodon.social/@RonSupportsYou/11630338...

Elon Musk and #DOGE fired many government employees. Then Kash Patel fired even more government employees. If government cybersecurity experts were replaced by clowns who treasured their MAGA hats, it would explain why it was so […]

0 0 0 0
Post image Post image Post image

Das muß viel weiter gehen:
#CyberWarfare
#DigitalViolationsOfGenevaConventions

youtu.be/RwvfKlD512Y

0 1 1 0
Russia The Russia-aligned APT group Pawn Storm (APT28) is targeting the defense supply chain of Ukraine and its allies with new PRISMEX malware and a Windows zero-day, CVE-2026-21513.

🇷🇺 Russia's APT28 (Pawn Storm) is targeting the defense supply chain with new 'PRISMEX' malware, exploiting a Windows zero-day (CVE-2026-21513). 🛡️ #APT28 #PawnStorm #ZeroDay #CyberWarfare

0 0 0 0
Post image

PwC’s Annual Threat Dynamics 2026 report warns AI is reshaping cybersecurity empowering both attackers and defenders.

Read Full Article: deccanfounders.com/2026/27/news...

#PwC #CyberSecurity #CyberWarfare #AI #ReaperAI #DeccanFounders

0 0 0 0
Preview
Iran Conflict Reveals Hybrid Warfare Is The New Normal In Global Security To expect a decisive resolution is a dangerous delusion; the more realistic expectation is a future of evolving, managed instability

Cyber strikes, proxy battles, and economic coercion define modern conflict, making persistent regional and global instability inevitable.
By Daman A. Bozdar, Mustafa. Bozdar

Read: thefridaytimes.com/27-Mar-2026/...

#USIranConflict #Israel #militarystrategy #MiddleEast #instability #cyberwarfare

0 0 0 0
Preview
Book Review - Strategic Reckoning: Perspectives on Deterrence and Escalation - Stratheia A detailed review of Strategic Reckoning analyzing deterrence, escalation, and South Asia’s security after the 2025 conflict.

From cyber warfare to precision strikes— The 2025 conflict marked a shift to multi-domain warfare strategies.
#Defense #Deterrence #CyberWarfare
stratheia.com/book-review-...

1 0 0 0
Video

Now it’s time to drop something HUGE for the cybersecurity community.💥

⏳ Stay tuned: cyberwarfare.live

#CyberWarFare #InfosecCommunity #CyberSecurityTraining #TechLaunch #ComingSoon #CyberSkills #LearnCyber #StayTuned #CWL

0 0 0 0
Preview
Iran Conflict Reveals Hybrid Warfare Is The New Normal In Global Security To expect a decisive resolution is a dangerous delusion; the more realistic expectation is a future of evolving, managed instability

U.S.–Israel attacks on Iran show hybrid warfare is the new reality, disrupting the Middle East and challenging global stability.
By Daman A. Bozdar, Mustafa. Bozdar

Read more: www.thefridaytimes.com/27-Mar-2026/...

#USIranConflict #Israel #militarystrategy #MiddleEast #instability #cyberwarfare

0 0 0 0
Preview
Defining the red line for cyberwar: who decides and what's at stake Former NSA leaders debate escalation rules for cyber attacks, revealing fundamental disagreement on thresholds for military response.

Defining the red line for cyberwar: who decides and what's at stake

#Cybersecurity #CyberWarfare #NSA #NationalSecurity #AusNews

thedailyperspective.org/article/2026-03-25-defin...

0 0 0 0
Poland Cyberattacks Surged in 2025, Suspected Pro-Russian Actors Targeted Critical Infrastructure Cyberattacks in Poland in 2025 surged, culminating in suspected Russian threat actors executing a destructive energy-sector breach using advanced wiping malware.

Full Article: www.technadu.com/poland-cyber...

💬 What’s your take on the growing targeting of critical infrastructure? Comment below.
#Cybersecurity #CriticalInfrastructure #CyberWarfare #Infosec #ThreatIntelligence

0 0 0 0
The Company Google Doesn’t Want You To Know About
The Company Google Doesn’t Want You To Know About YouTube video by Scammer Payback

Never forget I was always aware before these effects unfurled, infiltrated before you knew it folks. I used to help admin a community proton account years ago as a silent support.

#gdpr #proton #signal #google #deaddrops #surveillance #cyberwarfare #intelligence #tools

youtu.be/bboXocSePnQ?...

0 0 0 0
Preview
Stryker Attack Prompts Scrutiny of Enterprise Device Management Tools A significant shift has occurred in the strategic calculus behind destructive cyber operations in recent years, expanding beyond the confines of traditional critical infrastructures into lesser-noticed yet equally vital ecosystems underpinning modern economies.  State-aligned threat actors are increasingly focusing their efforts on organizations embedded within logistics and supply chain frameworks that support entire industries through their operational continuity. A single, well-placed intrusion at these junctions can have a far-reaching impact on interconnected networks, reverberating across multiple interconnected networks with minimal direct involvement.  Healthcare supply chains, however, stand out as especially vulnerable in this context. As central channels of delivery of care, medical technology companies, pharmaceutical distributors, and logistics companies operate as central hubs for the delivery of care, providing support for large healthcare networks.  The scale of these organizations, their interdependence, and their operational criticality make them high-value targets, which allows adversaries to inflict widespread damage indirectly, without exposing themselves to the immediate impact and consequences associated with attacking frontline healthcare organizations. It is against this backdrop that a less examined yet increasingly consequential risk is becoming increasingly evident one that is not related to adversaries' offensive tooling, but rather to the systems organizations use to orchestrate and secure their own environments.  As part of the evolving force multipliers role of device and endpoint management platforms, designed to provide centralized control, visibility, and resilience at scale, these platforms are now emerging as force multipliers. Several recent cyber incidents have provided urgency to this issue, including the recent incident involving Stryker Corporation, where an intrusion into its Microsoft-based environment caused rapid operational disruptions across the company's global footprint.  In response to the company's disclosure of the breach approximately a week later, the Cybersecurity and Infrastructure Security Agency issued a formal alert stating that malicious activity was targeting endpoint management systems within U.S. organizations.  A broader investigation was initiated after the Stryker event triggered it. Through coordination with the Federal Bureau of Investigation, the agency has undertaken efforts to determine the scope of the threat and identify potential affected entities. As illustrated in mid-March, such access can provide a systemic leverage.  An incident occurred on March 11, 2019, causing Stryker's order processing functions to be interrupted, its manufacturing throughput to be restricted, and outbound shipments to be delayed. These effects are consistent with interference at the management level as opposed to a single, isolated system compromise.  The subsequent reporting indicated the incident may have involved the wiping of about 200,000 managed devices as well as the exfiltration of approximately 50 terabytes of data, indicating that both destructive and intelligence-gathering objectives were involved.  A later claim of responsibility was made by Handala, which described the operation as retaliatory in nature after a strike in southern Iran, emphasizing the growing intersection between geopolitical signaling and supply chain disruption in contemporary cyber campaigns.  During the course of the incident, it became increasingly evident that such a compromise would have practical consequences. Several key operational capabilities, including order processing, manufacturing execution, and distribution, were lost as a result of the intrusion, effectively limiting Stryker Corporation's ability to service demand across a globally distributed network. As a result of this disruption, traceable to Microsoft's environment, supply chain processes were immediately slowed down, creating bottlenecks beyond internal systems that led to downstream delivery commitments.  Consequently, the organization initiated its incident response protocol, undertaking containment and forensic analysis, assisted by external cybersecurity specialists, in order to determine the scope, entry vectors, and persistence mechanisms of the incident. Observations from industry observers indicate that Microsoft Intune may be misused as an integral part of a network attack chain, based on preliminary assessments.  Apparently, Lucie Cardiet of Vectra AI has found that threat actors may have exploited the platform's legitimate administration capabilities to remotely wipe managed endpoints, triggering large-scale factory resets on corporate laptops and mobile devices. The implementation of such an approach is technically straightforward, but operationally disruptive at scale, particularly in environments where endpoint integrity is a primary component of production systems and logistics operations.  As a result of these device resets, widespread reconfiguration efforts were necessary, interrupting the availability of inventory management systems, production scheduling platforms, and coordination tools crucial to ensuring supply continuity.  Applied cumulatively, these disruptions delayed manufacturing cycles and affected the timely processing and fulfillment of orders across multiple facilities, demonstrating the rapid occurrence of tangible operational paralysis that can be caused by control-plane compromises. There is evidence from the incident that the pattern of advanced enterprise intrusions is increasingly characterized by the convergence of compromised privileged identities, trusted management infrastructure, and intentional misuse of administrative functions, resulting in disruption of the enterprise.  In the field of security, this alignment is often referred to as a "lethal trifecta," a technique that enables adversaries to inflict systemic damage without using conventional malware techniques. According to investigators, Stryker Corporation was compromised as a result of an intrusion centered on administrative access to its Microsoft Identity and Device Management stack, allowing attackers to utilize enterprise-approved tools in their operations.  Intune platforms, such as Microsoft's, which provide centralized control over device fleets, are naturally equipped with high-impact capabilities. These capabilities can range from the enforcement of policies to the provision of remote wipe functions that can be repurposed into mechanisms for disruption if commandeered.  Employees have been abruptly locked out of corporate systems across geographical boundaries, suggesting that administrative actions have been coordinated. This is consistent with "living off the land" techniques that exploit native enterprise controls in order to avoid detection and maximize operational consequences. It is evident that the scale of disruption underscores the structural dependence that is inherent within the global healthcare supply chain.  Stryker, one of the most prominent companies in the sector, operates in dozens of countries and employs tens of thousands of people. In the event that internal systems underlying manufacturing and order fulfillment were rendered inaccessible, the effects spread rapidly across the organization's international operations.  Many facilities, including major hubs in Ireland, reported experiencing widespread downtime, with employees being unable to access company network services. In spite of the fact that the company stated that its medical devices continued to function safely in clinical settings due to their segregation from affected corporate systems, the incident nevertheless highlights the fragility of interconnected supply chains.  Medical technology providers serve as critical intermediaries and disruptions at this level can have an adverse effect on distributors, healthcare providers, and ultimately the timeline for delivering patient care. On a technical level, the breach indicates that attacker priorities have shifted from endpoint compromise to identity dominance.  Identity-centric operations are increasingly replacing traditional intrusion models, which typically involve malware deployment, lateral movement, and persistence mechanisms. These adversaries use credential, authentication token, or privileged session vulnerabilities to gain control over the enterprise control planes. After being embedded within identity infrastructure, attackers are able to interact with administrative portals, SaaS management consoles, and device orchestration platforms as if they were legitimate operators. Because actions are executed through trusted channels, malicious activity is significantly less visible. It is therefore important to note that the extent to which the attackers have affected the network is determined by the scope of privileges that the compromised identities possess.  Additionally, it is evident that the attacker's intent has shifted from financial extortion to outright disruption. Although ransomware continues to dominate the threat landscape, these incidents are more closely associated with destructive operations, which are aimed at disabling systems and degrading functionality rather than extracting payment. In light of the reported scale of device resets and data exfiltration, it appears the campaign was intended to disrupt operational continuity, echoing tactics employed in previous wiper-style attacks often associated with state-aligned actors. Operations of this type are often designed to disrupt organizations for maximum disruption, rather than to maximize financial gain, and are frequently deployed to signal strategic intent.  As evidenced by the attribution claims surrounding the incident, the group Handala defined the operation within the framework of broader geopolitical tensions, indicating that it was aimed at retaliation. Even if such claims are not capable of being fully attributed to such entities, the narrative is consistent with an observation that private sector entities - particularly those involved in critical supply chains - are increasingly at risk of state-linked cyber activity.  Cyberspace geopolitical contestation is no longer confined to peripheral targets, but encompasses integral elements of healthcare, manufacturing, and logistics. A recalibration of enterprise security priorities is particularly necessary in environments in which identity systems and management platforms serve as the operational backbone. These events emphasize the need to refocus enterprise security priorities.  The tactics that are employed today are increasingly misaligned with defenses centered around endpoint detection and malware prevention. Organizations must instead adopt a security posture that focuses on identity-centric risk management, enforcing strict privilege governance, performing continuous authentication validation, and monitoring administrative actions across control planes at the granular level.  Additionally, it is crucial that enterprise management tools themselves be hardened, ensuring that high impact functions such as remote wipe, policy enforcement, and system-wide configuration changes are subject to layered authorization controls and real-time anomaly detection. For industries embedded in critical supply chains, resilience planning extends to the capability of sustaining operations when control-plane disruptions occur, as well as the prevention of intrusions.  Ultimately, Stryker's incident serves as a reminder that in modern enterprise settings, the most trusted of systems can inadvertently turn into the most damaging failure points-and their secure operation requires a degree of scrutiny commensurate with their impact. It can also be argued that the Stryker incident provides a useful illustration of how modern cyber operations can transcend isolated breaches into instruments that can cause widespread disruptions throughout global networks.

Stryker Attack Prompts Scrutiny of Enterprise Device Management Tools #CyberWarfare #Cybersecurity #DataBreach

0 0 0 0
Iran-Linked Pay2Key Ransomware Targeted US Healthcare Amidst Military Conflict A U.S. healthcare organization was targeted by the Iranian ransomware gang Pay2Key in late February, coinciding with military conflict. The attack suggests a motive beyond financial gain.

🇮🇷 Iran-linked Pay2Key ransomware hit a US healthcare org during recent military conflict. Unusually, no data was stolen, suggesting a disruptive, state-directed motive over financial gain. #Ransomware #Pay2Key #Iran #Healthcare #CyberWarfare

0 0 0 0
WTF Wire

WTF Wire

Israel Iran cameras targeting tool war as hacked surveillance helped track leaders, raising fears over AI and #cyberwarfare risks

#WTFWire, #IsraelIran #MiddleEastTensions, #AIWarfare, #SurveillanceTech #HackingThreats #SecurityRisks #DigitalWar #GlobalSecurity

www.wtfwire.com/news/israel-...

0 0 0 0
Preview
Iran built a vast camera network to control dissent. Israel turned it into a targeting tool Israel’s use of Tehran street cameras to help kill Iran’s supreme leader shows how everyday surveillance can turn into a wartime weapon.

#cyber #cybersecurity #cyberwarfare

apnews.com/article/iran...

0 0 0 0
Post image Post image Post image Post image

#feedme #Cynthia economy #santababy
#sagaftra #epsteinfiles #cyberwarfare #tfgbv #nofakesact #imposters #plasticsurgery
Aiding #systemicracism
Destroying #democracy
To sell you the same old, same old
Who have been using weapons of war for decades…
Creating trillionaire’s
#timesup @sagaftra.org

2 0 0 0
Preview
Anonymous in the age of cyberwar - Negative PID In February 2022, a tweet appeared: “The Anonymous collective is officially at war with the Russian government.”

Anonymous in the age of cyberwar

negativepid.blog/ano...

#anonymous #hackers #hackerCollectives #cyberwarfare #ukraine #russia #Cybersecurity #cyberattacks #cyberThreats #onlineSecurity #negativepid

0 0 0 0
Handala Websites Seized by FBI After Stryker Cyberattack An FBI website takedown targeted the Handala hacking group following the destructive Stryker cyberattack and device wiping incident.

👉 Read the full story:
www.technadu.com/handala-webs...

What’s your take on state-linked cyber operations becoming more aggressive? Drop your thoughts below.
#CyberSecurity #DataBreach #ThreatIntelligence #CyberWarfare #Infosec #TechNews

0 0 0 0
Video

Break into the cloud like a pro ☁️💥 Master Azure from an attacker’s mindset with newly launched AzRTS — now just $49.

🚀 Enroll now: cyberwarfare.live/product/azur...

#Azure #CyberSecurity #RedTeam #CloudSecurity #AzRTS #CyberWarfare #TechSkills #LearnToHack #CWL

0 0 0 0
NexTechie Sentinel - The Brief: Analyzing Global Cyber Warfare and the Weaponization of Trusted Services | NexTechie Get more from NexTechie on Patreon

How do state actors hide in the cloud? 🎧 Stream the latest NexTechie Podcast episode to hear how Silver Dragon and Salt Typhoon subvert trusted services for long-term surveillance. The battlefield has shifted to administrative workflows. url.nextechie.in/omWrn1 #CyberWarfare

1 0 0 0
Preview
AI-Powered Cyberattacks Raise Alarm Among IT Leaders Nearly eight out of 10 global IT decision-makers say artificial intelligence now poses a significant security threat to their organization...

AI-Powered Cyberattacks Surge, IT Leaders Sound Alarm — Is Your Organization Ready? jpmellojr.blogspot.com/2026/03/ai-p... #AI #Cybersecurity #CyberAttacks #AIThreats #Armis #Cyberwarfare

0 0 0 0
Preview
How Stuxnet changed cyberwarfare - Negative PID Stuxnet demonstrated that malware can cause physical damage to critical infrastructure, not just steal data or crash systems. Here is what it is.

How Stuxnet changed cyberwarfare

negativepid.blog/how...

#Stuxnet #cyberwarfare #hackers #Cybersecurity #cyberattacks #cyberThreats #onlineSecurity #negativepid

0 0 0 0
EU Sanctions Iranian and Chinese Firms for Cyberattacks Against European Networks The EU imposed sanctions on Chinese and Iranian companies for critical infrastructure hacking and disinformation.

Read more:
www.technadu.com/eu-sanctions...

💬 What do you think - are sanctions an effective way to counter cyberattacks?
#Cybersecurity #Cyberwarfare #Geopolitics #Infosec

0 0 0 0