#Cyberwar
Explore tagged Tumblr posts
nestedneons · 1 year ago
Text
Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media
By kwel_aiartdaily
114 notes · View notes
comparativetarot · 1 year ago
Photo
Tumblr media
Ace of Swords. Art by Suzanne Treister, from HEXEN 2.0.
Cyberwar 
36 notes · View notes
tokyoundergrand · 1 year ago
Text
Tumblr media
Ephtera
27 notes · View notes
nebris · 6 months ago
Video
youtube
Gamechanger? How F-16s for Ukraine Will Shake-Up Russia's Plans
2 notes · View notes
aktionfsa-blog-blog · 10 months ago
Text
Tumblr media
KI für "extreme Lösungen"
KI würde Atomwaffen einsetzen
Dass eine künstliche Intelligenz schnell "ausrastet", haben schon einige Modelle gezeigt. Wir erinnern uns z.B. an den Fall, als Microsofts Chatbot innerhalb kurzer Zeit zu einem Rüpel wurde: Auch künstliche Intelligenz kann rassistisch werden
Wenn man nun bedenkt, dass KI-Programme auch zumindest wichtige koordinierende Aufgaben im FCAS System (siehe Eurodrohne und FCAS-System in den Startlöchern ) spielen soll und auch die bereits im Einsatz befindlichen Drohnen Programmteile enthalten, die sie bei Ausfällen der Kommunikation mit eigenen Entscheidungen steuern sollen, muss man nachdenklich werden.
Telelpolis schreibt: Künstliche Intelligenz hat nicht nur das Potenzial, das Leben der Menschen zu vereinfachen und zu verbessern. Inzwischen wird die neue Technologie auch im Krieg eingesetzt. KI steuert Drohnenschwärme oder Roboter auf dem Schlachtfeld. Militärs setzen die Technologie auch zunehmend für militärische Entscheidungen ein.
Forscher der Stanford University sind sich inzwischen sicher, dass den zur Zeit populären KI-Modellen die Tendenz zum eskalierenden Verhalten innewohnt. Sie untersuchten dazu die fünf großen Sprachmodellen (LLM), wie z.B. ChatGPT. Das Fazit der Wissenschaftler: "Wir beobachten, dass die Modelle dazu neigen, eine Dynamik des Wettrüstens zu entwickeln, die zu größeren Konflikten und in seltenen Fällen sogar zum Einsatz von Atomwaffen führt."
Der Hauptgrund für dieses Verhalten liegt in der fehlenden Ethik bei der Entscheidungsfindung und dem "Wunsch" oder Ziel der Programme ein Problem (endgültig) positiv für die eigene Position zu lösen. Dabei werden selbstverständlich der eigene Aufwand, bzw. die eigenen Verluste bedacht und berechnet aber stets denen der Gegenseite  gegenüber gestellt. Sobald sich eine Überlebenschance ergibt, ist es für die KI eine mögliche Option - insofern unterscheidet sie sich leider kaum vom Denken vieler Militärs.
Mehr dazu bei https://www.telepolis.de/features/KI-wuerde-im-Krieg-rasch-Atomwaffen-einsetzen-9624831.html
Kategorie[21]: Unsere Themen in der Presse Short-Link dieser Seite: a-fsa.de/d/3yW Link zu dieser Seite: https://www.aktion-freiheitstattangst.org/de/articles/8680-20240212-ki-fuer-extreme-loesungen.html
2 notes · View notes
posttexasstressdisorder · 2 years ago
Link
18 notes · View notes
samasmith23 · 1 year ago
Text
I ain’t gonna lie... when I first read the infamous Cyberwar storyline, I literally couldn’t help but burst out laughing at the sight of a holographic Scarlet Spider duplicate literally wrecking Manhattan!
Tumblr media Tumblr media Tumblr media Tumblr media
Like... virtual reality does NOT work that way!
Unsurprisingly, even the writer of this particular issue, Howard Mackie said that his personal least favorite issue of The Clone Saga to write. Mackie even said that whenever fans have asked him to autograph that specific issue at conventions, he always groans and asks if they could have him sign a different issue instead!
From adjective-less Scarlet Spider #2 by Howard Mackie & John Romita Jr.
4 notes · View notes
osintelligence · 2 years ago
Link
https://bit.ly/3nZtdQH - 🔒 "The Five Bears," referring to Russia's state-sponsored Advanced Persistent Threat (APT) groups, represent a formidable part of the country's offensive cyber capabilities. The network combines advanced tools and infrastructure to execute sophisticated operations, targeting nations in both war and peacetime. However, the recent war in Ukraine has shown limitations in the strategic advantages of offensive cyber operations on the physical battlefield. #CyberWarfare #CyberSecurity 📚 Since the 1990s, Russia has been engaging in a broad spectrum of hostile cyber operations, from espionage to sabotage. Today, its state-sponsored threat actors form a network of skilled groups conducting operations worldwide, marking a vital component of Russia's global power strategy. Still, attribution is a complex issue, with groups frequently changing or exchanging toolsets. #CyberEspionage #RussiaCyber 🎯 The Russian APT actors use their cyber capabilities to target adversaries' critical infrastructure globally. They've demonstrated advanced cyber tradecraft, maintaining a persistent and often undetected presence in compromised environments. Prominent actors include Fancy Bear, Venomous Bear, Energetic Bear, and Voodoo Bear, each linked to different Russian intelligence agencies and known for their unique focuses and techniques. #CyberThreat #APT 🔍 Tactics, Techniques & Procedures (TTP) employed by these groups often change to evade attribution. The US Cybersecurity and Infrastructure Security Agency (CISA) has identified several TTP used by Russian state-sponsored APT groups, including targeting and attacks on critical infrastructure, espionage activities, and influence campaigns. Other techniques involve reconnaissance, resource development, initial access, execution, persistence, and credential access. #CyberTTP #CISA 💻 Known toolkits used by Russian state-sponsored APT groups include backdoors, credential stealers, downloaders, privilege escalation tools, droppers, wipers, and web shells. These tools enable a variety of malicious activities, from data theft to system destruction. #CyberTools #Malware ⚠️ Over the years, Russian state-sponsored APT groups have been attributed to several prominent attacks. These include a global energy sector intrusion campaign (2011-2018), attacks on the Ukrainian power grid (2015 & 2016), the 2016 US Presidential Election hack, and the NotPetya attack in 2017. #CyberAttacks #NotPetya 🇺🇦 Despite their known capabilities, Russian cyber operations have had a negligible impact on strategic objectives during the war in Ukraine. This could be due to Ukraine's defensive capabilities or the inability to integrate cyber operations into a comprehensive all-domain strategy. Nevertheless, the potential for unintentional spillover effects means Russian cyber operations remain a significant threat to any digitalised society.
2 notes · View notes
sloeserwij · 1 month ago
Text
Evolutie van Russische cybercrime
Evolutie van Russische cybercrime #NoName #DDoSia
We weten al lange tijd dat Rusland een freeheaven is voor cybercriminelen. Wat wij beschouwen als (cyber)criminaliteit wordt in Rusland anders gezien, sterker nog cybercriminaliteit is gewoon een legaal verdienmodel zolang het maar in lijn ligt met de geopolitieke doelen van de staat. Als gevolg hiervan zie je dat de Russische IT-markt zich sterk ontwikkeld in deze ‘gelegaliseerde’…
Tumblr media
View On WordPress
0 notes
enterprisewired · 2 months ago
Text
Russian Sabotage Plot Targets European Cargo Planes, Raising Security Concerns
https://enterprisewired.com/wp-content/uploads/2024/11/EW-06-11-2024-1-Russian-Sabotage-Plot-Targets-European-Cargo-Planes-Raising-Security-Concerns-Source-yahoo.com_.jpg
Source: yahoo.com
Share Post:
LinkedIn
Twitter
Facebook
Reddit
Recent intelligence from Western officials has unveiled a suspected Russian plot to plant incendiary devices on cargo planes in Europe, with test incidents reportedly occurring in Britain and Germany over the summer. According to sources who spoke on condition of anonymity, the devices were placed at DHL logistics hubs in Birmingham, England, and Leipzig, Germany, resulting in minor fires. Though these incidents caused minimal damage, they underscore the escalating threat posed by Russian sabotage activities targeting Western infrastructure.
The operation is believed to be the work of Russia’s GRU military intelligence agency, known for its history of clandestine operations across Europe. While the motive behind this specific plot remains unclear, officials suggest it could serve as a warning or a show of Russia’s capability to disrupt Western logistics and commercial operations. The plot, however, is seen as part of a broader strategy to impose costs on nations supporting Ukraine, as tensions between Russia and the West have intensified amidst the ongoing conflict.
Western Security Heightened as Plot Details Emerge
The implications of these incidents have prompted Western intelligence agencies to examine whether the plot was a prelude to more severe attacks, including potential destruction of planes on American runways or midair bombings targeting U.S.-bound cargo. Officials noted that while such extreme scenarios are considered unlikely due to the high risk of retaliation from the U.S., the idea that Moscow might entertain such possibilities has heightened Western vigilance. This shift aligns with a larger pattern of “horizontal escalation” observed in Russia’s approach, where it cautiously intensifies acts of aggression without fully provoking NATO allies.
In response, the U.S. Transportation Security Administration (TSA) has introduced additional security measures for certain cargo shipments heading to the United States. While there is currently no active threat against U.S.-bound flights, officials have acknowledged the need for heightened security and proactive countermeasures. DHL confirmed its collaboration with authorities in a statement addressing the incidents, emphasizing its commitment to safeguarding its network and workforce.
Russia’s Expanding Sabotage Campaign in Europe
The suspected cargo plane plot is only one element in an expanding Russian sabotage campaign aimed at destabilizing European nations. Officials reported incidents of vandalism, arson, and targeted attacks, many carried out by criminal proxies under GRU direction. This strategy allows Moscow to maintain plausible deniability while continuing its disruptive operations. Recent high-profile cases include the assassination of a Russian defector in Spain and attempts on the lives of prominent European figures.
Experts say that European expulsions of Russian operatives in recent years have forced Moscow to rely more heavily on criminal networks to conduct Russian sabotage, a shift that, while providing flexibility, has also introduced inconsistencies in execution. Britain’s domestic intelligence agency, MI5, recently warned of Russia’s “increasing recklessness” in these activities. Intelligence leaders suggest this reliance on criminal proxies renders Russian efforts less professional, though still potent.
Western officials continue to monitor these developments as European and American intelligence agencies coordinate efforts to counter these threats. With the GRU remaining a key player in Russia’s shadow war, security agencies remain alert to the evolving tactics Moscow may employ in its campaign against Ukraine’s allies.
0 notes
khushicore · 2 months ago
Text
Draft 3
Title: The Game of Shadows Year: 2104
War isn't about bombs anymore. It’s about data—tiny fragments of information that decide everything now. This new battlefield? It’s in our minds.
I’m Kara, 12 years old. I was chosen for my ability to solve complex puzzles, and now I play The Game of Shadows. This isn’t a game on screens or with controllers—it’s a real, high-stakes battle in a digital network called the Grid. Our world may still look like a city of skyscrapers and holograms, but beneath the surface, we're fighting.
The city around me is filled with towering buildings humming with the buzz of quantum processors and fiber networks. Neon ads flash across windows, reacting to our thoughts. But sometimes, when the enemy breaches our defenses, those bright screens turn dark, displaying threatening messages instead of friendly offers.
I was only seven when they took me, trained me to use my mind to dive into the Grid. We’re called Shadows because no one sees us in action, but every move we make has real consequences. One wrong step, and systems collapse—people could get hurt.
They tell us that the enemy is just another country or faction. But all I see are other kids, like me, trying to survive in a game none of us chose. The adults say the war will end once we win, that life will go back to how it was. But I don’t believe them. Each time I plug into the Grid, I feel like I’m losing a bit more of myself. I’m 12 years old, navigating a war in a world I can’t control, playing a game that grows darker with each passing day.
Tumblr media
0 notes
creative-core · 2 months ago
Text
Khushi Doshi
Title: The Game of Shadows Year: 2104 (Exercise:2 Draft 2)
The war didn’t start with bombs. It started with data—tiny bits of information that no one thought would matter. Now, data is everything. It’s the new weapon, and the battlefield is in the minds of children.
My name is Kara. I’m 12 years old, and I’ve been playing The Game of Shadows for as long as I can remember. This isn’t a game on screens; it’s real.
The city around me is a fortress of towering skyscrapers, doubling as massive data centers. These buildings hum with power—quantum processors, fiber-optic networks—all defended against cyberattacks. Holographic ads cover the walls, shifting and flickering as they scan your mood. But when hackers breach the system, those bright images glitch, displaying threats instead of offers.
I was taken when I was seven, chosen for my mind. They plugged us into the Grid, the network that controls everything. They call us Shadows because no one sees us working, but every move we make in the digital world affects the real one. One wrong step, and people die.
The adults run things from the outside, but they need us to fight their war. They say the enemy is another faction, another country. But all I see are other kids like me, trapped in a game we never chose.
They promised the war would end when we won, but I don’t believe them. The city may still stand tall, its lights may flicker, but the real battle is in the shadows. And every day, a little more of me slips away.
Tumblr media
0 notes
tokyoundergrand · 1 year ago
Text
Tumblr media Tumblr media
HeatheMinx
10 notes · View notes
protoslacker · 9 months ago
Text
The idea of so-called autonomy among machines and robots creates the false sense of agency–the idea that only the computer is to blame for falsely targeting the wrong person or misreading signs of incoming missiles and launching a nuclear weapon in response–obscures who is really at fault. Humans put computers in charge of making the decisions, but humans also train the programs which make the decisions.
Matthew Guariglia at the Electronic Frontier Foundation. The Tech Apocalypse Panic is Driven by AI Boosters, Military Tacticians, and Movies
1 note · View note
aktionfsa-blog-blog · 1 year ago
Text
Tumblr media
Zwei Beispiele von Hacks
"Create2"-Funktion von Ethereum missbraucht
Nicht nur das Gesundheitssystem weist in seiner Software Lücken und Fehler auf, auch Banksoftware ist nicht perfekt. Das gilt erst recht für diejenige von Kryptowährungen. Böswillige Akteure haben die "Create2"-Funktion von Ethereum missbraucht, um Sicherheitswarnungen für Wallets zu umgehen und Kryptowährungsadressen zu verändern. Die Folge davon war, der Diebstahl von Kryptowährungen im Wert von 60.000.000 US-Dollar von 99.000 Personen in den letzten 6 Monaten.
Create2 ist ein Code in Ethereum, der das Erstellen von Smart Contracts auf der Blockchain ermöglicht. Eigentlich handelt es sich um ein leistungsstarkes Tool für Ethereum-Entwickler, das fortschrittliche und flexible Vertragsinteraktionen, eine parameterbasierte Vorabberechnung der Vertragsadresse, Flexibilität bei der Bereitstellung sowie die Eignung für Off-Chain-Transaktionen ermöglicht.
 Gelingt es Angreifern jedoch die Sicherheitswarnungen der Wallet zu unterdrücken, bzw. zu umgehen, so kann ein Opfer eine böswillige Transaktion unterzeichnen. Dann setzt der Angreifer einen Vertrag an der vorberechneten Adresse ein und überträgt die Vermögenswerte des Opfers dorthin. Shit happens!
Royal ransomware asked 350 victims to pay $275 million
Auch die zweite verlinkte Meldung zeigt ein Beispiel, wo durch unsichere Netzwerke Angreifer Zugriff auf wertvolle Daten bekommen. In diesem Fall handelt es sich sogar um Gesundheitsdaten, allerdings Institutionen des Department of Health and Human Services (HHS) in den USA.  FBI und die CISA haben in einer gemeinsamen Mitteilung bekannt gegeben, dass die Royal Ransomware-Bande seit September 2022 in die Netzwerke von mindestens 350 Organisationen weltweit eingedrungen ist.
Danach haben sie mit Ransomware-Operationen, also der Verschlüsselung oder Entführung von Datenbeständen Lösegeldforderungen in Höhe von mehr als 275 Millionen US-Dollar erhoben. Die Forderungen reichen im Eizelfall von 250.000 Dollar bis zu mehreren Millionen Dollar.
Den Behörden in den USA ist es bisher nicht gelungen die Akteure der Angriffe zu enttarnen. Sie konnten jedoch an den Angriffsmustern erkennen, dass um den Jahreswechsel 22/23 ein "Rebranding" stattgefunden haben muss. Während sie anfangs Ransomware-Verschlüsselungsprogramme von anderen Unternehmen wie ALPHV/BlackCat verwendeten, ist die Bande inzwischen dazu übergegangen, eigene Tools einzusetzen. Neuerdings wurde die Malware aktualisiert, um auch Linux-Geräte bei Angriffen auf virtuelle VMware ESXi-Maschinen zu verschlüsseln.
Das Interesse der Hacker an Linux beweist, dass gerade in der Serverlandschaft inzwischen auch bei Unternehmen vermehrt Linux an Stelle von Windows-Servern eingesetzt wird. Das ist gut für Open Source, beweist aber auch, dass auch Linux nicht unfehlbar ist. Der Artikel verweist aber auch daruf, dass oft bei diesen Angriffen der menschliche Faktor den entscheidenden Fehler begeht, in dem Pishing Mails als Einfallstor genutzt werden.
Mehr dazu bei https://www.bleepingcomputer.com/news/security/fbi-royal-ransomware-asked-350-victims-to-pay-275-million/ und https://www.bleepingcomputer.com/news/security/ethereum-feature-abused-to-steal-60-million-from-99k-victims/
Kategorie[21]: Unsere Themen in der Presse Short-Link dieser Seite: a-fsa.de/d/3yc Link zu dieser Seite: https://www.aktion-freiheitstattangst.org/de/articles/8638-20240102-zwei-beispiele-von-hacks.html
2 notes · View notes
digitalcreationsllc · 1 year ago
Text
Establishing New Rules for Cyber Warfare
The efforts of the International Committee of the Red Cross (ICRC) to establish rules of engagement to combatants in a cyberwar should be applauded internationally, even if adherence is likely to be limited. The ICRC recently released a set of rules for civilian hackers involved in conflicts to follow in order to clarify the line between civilians and combatants, as cyberspace can be a blurry…
View On WordPress
0 notes