• DHS Scraps ‘Cybersecurity Exercise’ in Atlanta Planned on ELECTION DAY, Blames Cancellation on ‘Disinformation’ & ‘Threats’ https://www.infowars.com/posts/dhs-scraps-cybersecurity-exercise-in-atlanta-planned-on-election-day-blames-cancellation-on-disinformation-threats
    DHS Scraps ‘Cybersecurity Exercise’ in Atlanta Planned on ELECTION DAY, Blames Cancellation on ‘Disinformation’ & ‘Threats’ https://www.infowars.com/posts/dhs-scraps-cybersecurity-exercise-in-atlanta-planned-on-election-day-blames-cancellation-on-disinformation-threats
    0 Comments 0 Shares 740 Views
  • Breaking: Major National Cybersecurity Exercise on Election Day; What???
    https://jonrappoport.substack.com/p/major-national-cybersecurity-exercise-on-election-day?utm_source=cross-post&publication_id=806546&post_id=150556404&utm_campaign=702469&isFreemail=true&r=djel3&triedRedirect=true&utm_medium=email&fbclid=IwY2xjawGEvKlleHRuA2FlbQIxMAABHRQwcZzj1A3wccWxJA4jGB4fjXq6MZsGsC_7cecB6F7chin66jlFsw16Eg_aem_ll2ZyTijFGbjAitWxFAeFw

    Background: “AFCEA [Armed Forces Communications & Electronics Association International] Atlanta [Chapter] Homeland Security Conference on Critical Infrastructure, November 6-7, 2024, with a large scale cybersecurity exercise on November 5, 2024” (link in footnote)

    —On Nov. 5, ELECTION DAY, there will be a special cybersecurity exercise at the Conference.

    Get this. The exercise is described as a large-scale interactive event, with participants from federal, state, county, city government agencies, academia, and industry.

    The exercise will simulate a cyber-attack on “critical infrastructure.”

    That’s right. It’s a so-called “Jack Voltaic”-type exercise, which was developed to test responses to attacks on large infrastructures.

    QUITE odd to schedule the exercise on Election Day.
    Breaking: Major National Cybersecurity Exercise on Election Day; What??? https://jonrappoport.substack.com/p/major-national-cybersecurity-exercise-on-election-day?utm_source=cross-post&publication_id=806546&post_id=150556404&utm_campaign=702469&isFreemail=true&r=djel3&triedRedirect=true&utm_medium=email&fbclid=IwY2xjawGEvKlleHRuA2FlbQIxMAABHRQwcZzj1A3wccWxJA4jGB4fjXq6MZsGsC_7cecB6F7chin66jlFsw16Eg_aem_ll2ZyTijFGbjAitWxFAeFw Background: “AFCEA [Armed Forces Communications & Electronics Association International] Atlanta [Chapter] Homeland Security Conference on Critical Infrastructure, November 6-7, 2024, with a large scale cybersecurity exercise on November 5, 2024” (link in footnote) —On Nov. 5, ELECTION DAY, there will be a special cybersecurity exercise at the Conference. Get this. The exercise is described as a large-scale interactive event, with participants from federal, state, county, city government agencies, academia, and industry. The exercise will simulate a cyber-attack on “critical infrastructure.” That’s right. It’s a so-called “Jack Voltaic”-type exercise, which was developed to test responses to attacks on large infrastructures. QUITE odd to schedule the exercise on Election Day.
    0 Comments 0 Shares 1K Views
  • Google loses major antitrust case to Department of Justice over search engine monopolization
    https://justthenews.com/politics-policy/cybersecurity/google-loses-major-antitrust-case-department-justice
    -US District Judge Amit Mehta Mehta ruled that Google must stop its anticompetitive behavior, where it monopolizes exclusive contracts that make it the default search engine on smartphones and computers. The antitrust lawsuit during Trump 1st Term. Could Trump 2nd Term break up more Big Tech monopolies?
    Google loses major antitrust case to Department of Justice over search engine monopolization https://justthenews.com/politics-policy/cybersecurity/google-loses-major-antitrust-case-department-justice -US District Judge Amit Mehta Mehta ruled that Google must stop its anticompetitive behavior, where it monopolizes exclusive contracts that make it the default search engine on smartphones and computers. The antitrust lawsuit during Trump 1st Term. Could Trump 2nd Term break up more Big Tech monopolies?
    JUSTTHENEWS.COM
    Google loses major antitrust case to Department of Justice over search engine monopolization
    US District Judge Amit Mehta Mehta ruled that Google must stop its anticompetitive behavior, where it monopolizes exclusive contracts that make it the default search engine on smartphones and computers.
    Like
    1
    0 Comments 0 Shares 1K Views
  • Huh, say that again President Trump, They gave the DNC server to Crowdstrike?

    CrowdStrike is a publicly traded cybersecurity technology company, so it is owned by its shareholders. It was co-founded by George Kurtz (CEO), Dmitri Alperovitch, and Gregg Marston in 2011.

    CrowdStrike has received investments from a variety of sources, including venture capital firms and public investors. Some notable investors in CrowdStrike include:
    Warburg Pincus: A private equity firm that was an early investor.

    Accel: A venture capital firm that has been a significant investor in CrowdStrike.
    CapitalG: Google's growth equity investment fund, which has also invested in the company.

    IVP (Institutional Venture Partners): Another venture capital firm that has invested in CrowdStrike.

    Since CrowdStrike is a publicly traded company, many institutional and retail investors also own shares of the company.

    CrowdStrike has a significant amount of institutional investors. Some of the largest shareholders include Vanguard Group Inc., BlackRock Inc., Jennison Associates LLC, Clearbridge Investments LLC, Morgan Stanley, and Norges Bank​ (MarketBeat)​. Additionally, firms like Bank Julius Baer & Co. Ltd Zurich and Renaissance Technologies LLC have also made substantial investments in CrowdStrike stock​ (MarketBeat)​.
    OK, now it all makes sense.
    Huh, say that again President Trump, They gave the DNC server to Crowdstrike? CrowdStrike is a publicly traded cybersecurity technology company, so it is owned by its shareholders. It was co-founded by George Kurtz (CEO), Dmitri Alperovitch, and Gregg Marston in 2011. CrowdStrike has received investments from a variety of sources, including venture capital firms and public investors. Some notable investors in CrowdStrike include: Warburg Pincus: A private equity firm that was an early investor. Accel: A venture capital firm that has been a significant investor in CrowdStrike. CapitalG: Google's growth equity investment fund, which has also invested in the company. IVP (Institutional Venture Partners): Another venture capital firm that has invested in CrowdStrike. Since CrowdStrike is a publicly traded company, many institutional and retail investors also own shares of the company. CrowdStrike has a significant amount of institutional investors. Some of the largest shareholders include Vanguard Group Inc., BlackRock Inc., Jennison Associates LLC, Clearbridge Investments LLC, Morgan Stanley, and Norges Bank​ (MarketBeat)​. Additionally, firms like Bank Julius Baer & Co. Ltd Zurich and Renaissance Technologies LLC have also made substantial investments in CrowdStrike stock​ (MarketBeat)​. OK, now it all makes sense.
    0 Comments 0 Shares 2K Views 0
  • Deepfakes in Mass Media potentially spreading misinformation and influencing public opinion.

    HR software is used by global corporations to SMEs to free up their time to focus on employee engagement and strategic issues.

    Governments and organizations will need to develop new regulations and ethical guidelines to address the misuse of deepfakes and enhance cybersecurity measures.
    Deepfakes in Mass Media potentially spreading misinformation and influencing public opinion. HR software is used by global corporations to SMEs to free up their time to focus on employee engagement and strategic issues. Governments and organizations will need to develop new regulations and ethical guidelines to address the misuse of deepfakes and enhance cybersecurity measures.
    Like
    1
    0 Comments 0 Shares 2K Views
  • Jessica Lyons - Truck-to-truck worm could infect – and disrupt – entire US commercial fleet:

    https://www.theregister.com/2024/03/22/boffins_tucktotruck_worm

    #CommercialTransportation #ElectronicLoggingDevice #ELD #Malware #ComputerWorm #RemoteAccess #RemoteMonitoring #RemoteManagement #RMM #OverTheAirUpdate #OTA #WiFi #Bluetooth #Cybersecurity #NetworkSecurity #InfrastructureSecurity #ComputerScience
    Jessica Lyons - Truck-to-truck worm could infect – and disrupt – entire US commercial fleet: https://www.theregister.com/2024/03/22/boffins_tucktotruck_worm #CommercialTransportation #ElectronicLoggingDevice #ELD #Malware #ComputerWorm #RemoteAccess #RemoteMonitoring #RemoteManagement #RMM #OverTheAirUpdate #OTA #WiFi #Bluetooth #Cybersecurity #NetworkSecurity #InfrastructureSecurity #ComputerScience
    WWW.THEREGISTER.COM
    Truck-to-truck worm could infect entire US fleet
    The device that makes it possible is required in all American big rigs, and has poor security
    0 Comments 0 Shares 5K Views
  • Hacktivist \ハクティヴィスト\ (hakutivisuto) - a person who engages in the practice of promoting a political agenda by hacking, especially by defacing or disabling websites.

    This design was inspired by an 'Anacyclic Spiral'—a design element influenced by both the Fibonacci sequence and the upward-coiling nature of a spiral. We progress from small to large, from bottom to top.

    Traditional 2D Design for the Anacyclic Spiral Design Style - https://www.redbubble.com/i/t-shirt/H-Hacktivist-Subject-Computer-Ethics-Transliteration-Katakana-Design-Style-Anacyclic-Spiral-WearYourDictionary-by-WearYourWords/159473351.JZXP1?asc=u

    Experimental Bevel Design for the Anacyclic Spiral Design Style - https://www.redbubble.com/i/t-shirt/H-Hacktivist-Subject-Computer-Ethics-Transliteration-Katakana-Design-Style-Anacyclic-Spiral-Moribund-Murdoch-and-Tech-by-TechMurdoch/159473726.JZXP1?asc=u

    #JapaneseCharacters #Transliteration #WearYourDictionary [See: Hacktivist] #Cybersecurity #ComputerEthics #Activism
    Hacktivist \ハクティヴィスト\ (hakutivisuto) - a person who engages in the practice of promoting a political agenda by hacking, especially by defacing or disabling websites. This design was inspired by an 'Anacyclic Spiral'—a design element influenced by both the Fibonacci sequence and the upward-coiling nature of a spiral. We progress from small to large, from bottom to top. Traditional 2D Design for the Anacyclic Spiral Design Style - https://www.redbubble.com/i/t-shirt/H-Hacktivist-Subject-Computer-Ethics-Transliteration-Katakana-Design-Style-Anacyclic-Spiral-WearYourDictionary-by-WearYourWords/159473351.JZXP1?asc=u Experimental Bevel Design for the Anacyclic Spiral Design Style - https://www.redbubble.com/i/t-shirt/H-Hacktivist-Subject-Computer-Ethics-Transliteration-Katakana-Design-Style-Anacyclic-Spiral-Moribund-Murdoch-and-Tech-by-TechMurdoch/159473726.JZXP1?asc=u #JapaneseCharacters #Transliteration #WearYourDictionary [See: Hacktivist] #Cybersecurity #ComputerEthics #Activism
    1 Comments 0 Shares 4K Views
  • McDonald’s Technology Outage Forces Restaurant Closures. As the USA, Australia, Japan, Hong Kong and the United Kingdom, Italy. IT failure were reported worldwide Friday that Chicago-based McDonald’s Corp. said the problems were not related to a cybersecurity issue.
    McDonald’s Technology Outage Forces Restaurant Closures. As the USA, Australia, Japan, Hong Kong and the United Kingdom, Italy. IT failure were reported worldwide Friday that Chicago-based McDonald’s Corp. said the problems were not related to a cybersecurity issue.
    0 Comments 0 Shares 3K Views
  • According to Yonhap, #north_korea’s state-sponsored hackers were responsible for cryptocurrency theft worth nearly $1.7 billion in 2022. The UN Panel of Experts on UNSC sanctions against Pyongyang also confirmed that North Korea’s state-sponsored hackers were responsible for cryptocurrency theft worth nearly $1.7 billion last year The White House has emphasized the need to enhance cybersecurity, highlighting cyber thefts committed by North Korean actors. It said poor cybersecurity has allowed North Korea to steal over $1 billion in cryptocurrency. Experts have said that the country, facing heavy sanctions, is turning to #crypto_theft to fund its #nuclear_arsenal.
    According to Yonhap, #north_korea’s state-sponsored hackers were responsible for cryptocurrency theft worth nearly $1.7 billion in 2022. The UN Panel of Experts on UNSC sanctions against Pyongyang also confirmed that North Korea’s state-sponsored hackers were responsible for cryptocurrency theft worth nearly $1.7 billion last year The White House has emphasized the need to enhance cybersecurity, highlighting cyber thefts committed by North Korean actors. It said poor cybersecurity has allowed North Korea to steal over $1 billion in cryptocurrency. Experts have said that the country, facing heavy sanctions, is turning to #crypto_theft to fund its #nuclear_arsenal.
    0 Comments 0 Shares 10K Views
  • How Many Secrets Is the President Hiding?
    https://rumble.com/v3yt1wg-hearing-on-the-weaponization-of-the-federal-government.html
    Story at-a-glance

    Over the past year, the House Judiciary Subcommittee on the Weaponization of the Federal Government has released several reports detailing how the government is a) harassing and intimidating citizens to shut down undesirable viewpoints b) using misinformation and propaganda to drive false narratives and c) censoring protected speech using third parties
    November 30, 2023, House Judiciary Committee held another hearing on the Weaponization of the Federal Government. Investigative journalist Michael Shellenberger testified and shared evidence about the existence of a group called the Cyber Threat Intelligence League (CTIL), which consists of military contractors that are censoring Americans and using sophisticated psychological operations against us
    The CTIL was founded by a group of former Israeli and British intelligence agents who initially volunteered their cybersecurity services FOR FREE to multibillion-dollar hospital and health care organizations in the U.S.
    CTIL also offers physical security and “cognitive” security, which are volunteered by U.S. and British military contractors
    The CTIL’s plan to control the information landscape also includes using debanking as financial leverage, pressuring social media platforms to change their terms of service to facilitate censorship and deplatforming under the guise of “terms of service violations,” and more
    How Many Secrets Is the President Hiding? https://rumble.com/v3yt1wg-hearing-on-the-weaponization-of-the-federal-government.html Story at-a-glance Over the past year, the House Judiciary Subcommittee on the Weaponization of the Federal Government has released several reports detailing how the government is a) harassing and intimidating citizens to shut down undesirable viewpoints b) using misinformation and propaganda to drive false narratives and c) censoring protected speech using third parties November 30, 2023, House Judiciary Committee held another hearing on the Weaponization of the Federal Government. Investigative journalist Michael Shellenberger testified and shared evidence about the existence of a group called the Cyber Threat Intelligence League (CTIL), which consists of military contractors that are censoring Americans and using sophisticated psychological operations against us The CTIL was founded by a group of former Israeli and British intelligence agents who initially volunteered their cybersecurity services FOR FREE to multibillion-dollar hospital and health care organizations in the U.S. CTIL also offers physical security and “cognitive” security, which are volunteered by U.S. and British military contractors The CTIL’s plan to control the information landscape also includes using debanking as financial leverage, pressuring social media platforms to change their terms of service to facilitate censorship and deplatforming under the guise of “terms of service violations,” and more
    0 Comments 0 Shares 7K Views
More Results
Sponsored

We are 100% funded for October.

Thanks to everyone who helped out. 🥰

Xephula monthly operating expenses for 2024 - Server: $143/month - Backup Software: $6/month - Object Storage: $6/month - SMTP Service: $10/month - Stripe Processing Fees: ~$10/month - Total: $175/month

Xephula Funding Meter

Please Donate Here