#in cyber operations
Explore tagged Tumblr posts
Text
#Cyber Crime Expert#Mukesh Choudhary is the Founder and CEO of Cyberops and a leading cyber security expert in India. With over 14 years of experience#in cyber operations#Cyber Security Specialist#Mukesh has received multiple awards and has trained thousands of law enforcement and security officials. He serves as the Chief Cyber Crime
0 notes
Text
i'm going on a short vacation w my mom and bff so i'll be afk for a few days ^w^ baiii
#ill be sure to take lots of chococat vacation pics...#also the system my work uses got hit w a huge cyber attack w a ransom which shut down all operations#i couldn't have picked a better time to Not be there lol
11 notes
·
View notes
Text
youtube
Sega Ages 2500 Series Vol. 31: Cyber Troopers Virtual-On (AM3 - Sega Model 2 / PS2 - 1995 / 2007)
#Virtual On#Cyber Troopers#sega ages#sega saturn#PS2#PlayStation 2#bonus features#art gallery#model viewer#mechs#virtuaoids#VirtualOn#operation moongate#AM3#zplayz#arena fighter#Youtube#cyber troopers virtual on#Virtual-On#longplay#longplays
60 notes
·
View notes
Text
8 notes
·
View notes
Text
💻Opere Shoujo👾 My team of Y2K-inspired magical girls, Cookie, Chip and Cypher!
I made a blog post on my character design process for these three on my Patreon and Ko-Fi too~
youtube
#my art#artwork#digital#procreate#art blog#manga#anime#oc#original character#oc blog#mahou shoujo#magical girl#mahou shoujo oc#magical girl oc#opere shoujo#cookie#chip#cipher#y2k#y2k aesthetic#frutiger aero#frutiger aero aesthetic#cyber#artists on tumblr#Youtube#elle baston ocs
31 notes
·
View notes
Text
[A 100yo veteran of the Great Patriotic War, Ibrahim-Pasha, from Degestan votes in the Russian Presidential elections on Saturday. The Russian Presidential elections are being held from March 15th - March 17th, 2024]
🇷🇺 🚨
MORE THAN 90'000 CYBER ATTACKS ON RUSSIAN ELECTION RESOURCES REPELLED ON FIRST DAY OF VOTING
More than 90k cyber attacks on Russian voting resources were repelled on the first day of voting in the Russian Federation's Presidential elections, according to the Chief of the Solar Group, Igor Lyapunov, a subsidiary of Rostelecom, Russia's largest provider of digital services.
Reporting on the cyber attacks said that this equated to 8 times the number of cyber attacks attempted on the Unified Voting Day of the previous year.
“Of course, yesterday a very large number of attacks and attempted attacks occurred on our resources - more than 90 thousand cyber attacks were carried out on the resources of election portals, on the resources of the Central Election Commission, on remote electronic voting, on the resources of State Services," Lyapunov told reporters with the Russian news agency Ria Novosti.
"This is a large number, which is eight times higher the number of cyber attacks that were recorded last year on Single Voting Day. All these attacks were repelled," Lyapunov added.
The Solar Group chief recounted a large cyber attack that occured mid-day against the digital election portal (DEG) which entered through the application portal, emulating requests from other users of the DEG, with a peak of more than 2.5 million requests per second. Pointing to the attack, Lyapunov noted that "of course, such a load caused delays on the portal."
Within an hour of the cyber attack, a team with the Solar Group managed to process and block the hack, while more than 100 fake phishing resources with a similar profile to the remote electronic voting platform, and the Central Election Commission website, managed to be processed and blocked by their teams on the first day of voting.
“If in the first two months of this year - January, February, we blocked about 60 such resources (phishing - ed.), then yesterday more than 100 such fake resources were blocked. These are portals similar to DEG, these are portals similar to The Central Election Commission, these are similar portals that talk about exit polls - this is all great counteraction to information attacks,” Lyapunov told Ria Novosti.
“Of course, when we talk about such an unprecedented level of cyber attacks, we must understand that the collective West is fighting against us. We see attacks from Ukraine , from IP addresses of Western Europe , North America . And, of course, in terms of the level of professionalism of cyber attacks, we can understand that the most professional, special groups working in our country work," Lyapunov concluded.
Voting for the President of the Russian Federation has been scheduled for three days spanning March 15th, 16th and 17th, with most voting expected to occur on the last day of voting. Current President, Vladimir Putin is expected to win by a substantially large margin, according to opinion polls conducted prior to voting.
#source1
#source2
#videosource
@WorkerSolidarityNews
#russia#russia news#russian news#russian politics#politics#geopolitics#cyber attack#cyber attacks#digital warfare#news#world news#global news#international news#breaking news#current events#ria novosti#russian presidential elections#russian election#russian president#war in ukraine#ukraine war#special military operation
4 notes
·
View notes
Text
Checked my rota to see my holiday request has been rejected for no reason, then immediately earned the shop £1k in my first hour without anyone batting an eyelash. I really need to leave this place
3 notes
·
View notes
Text
Ok, now that you wiped away your tears of laughter, here’s how you can change your web browser and search engine:
- download one of the browsers that put privacy and security first. Here’s a great list. Examples include: Brave, Mozilla Firefox, and for more advanced users: Tor, Ungoogled
- use a VPN. There’s free and paid options.
- change your default search engine to something other than Google. Your online traffic matters. Which websites you load matters. Think of your time and clicks as online currency. Ecosia is a great Bing/Microsoft based search engine that also plants trees with every search! And it gives great results. Another one is DuckDuckGo. Here’s a list of alternative search engines.
Hot tip: the operating systems also collect data whenever you use an online keyboard (and suggested text). Don’t want them to know what you’re typing? You can download a free privacy keyboard for Android (haven’t found one for iOS yet but Apple says the data is stored on device only. Let’s hope so🤞).
Another idea for advanced users: operating systems (such as macOS and Windows) still collect tons of data about you, and cost money if you want to install them on a 2nd hand device, for example. You can use operating systems that are completely free, open-source and user-friendly, such as Ubuntu.
Now go and roam the internet, be free, and donate to open-source programs if you can 😘
#signal boost#fuck ai#search engines#google#firefox#mozilla#brave#ungoogled#android#ios#operating system#privacy#online privacy#cyber security#security#data privacy#data protection#vpn#stay safe#tips and tricks#web browsers
23K notes
·
View notes
Text
Achieving NIST and DORA Compliance: How We Can Help Companies Build Cybersecurity and Operational Resilience
In today’s fast-paced digital environment, cybersecurity and operational resilience are at the forefront of corporate priorities. With the increasing frequency of cyberattacks and strict regulatory requirements, companies must adapt and align with internationally recognised frameworks and regulations such as the National Institute of Standards and Technology (NIST) and the Digital Operational…
#AIO compliance solutions.#AIO Legal Services#AML compliance#business continuity#corporate governance#cyber risk mitigation#cybersecurity framework#data protection#digital security#DORA compliance#EU Regulations#GDPR compliance#ICT risk management#incident response#legal services for businesses#NIST compliance#operational resilience#regulatory compliance#risk management#third-party risk management
0 notes
Text
eGirl4Rent PMC: Official Press Release – Call of Duty Mobile Recruitment
eGirl4Rent PMC: Official Press Release – Call of Duty Mobile Recruitment For Immediate Release California HQ, eGirl4Rent PMC – We are thrilled to announce that Paladin Jade and the eGirl4Rent Paladinarinas are actively recruiting for Call of Duty Mobile, where we merge our elite skills as a private military corporation with the competitive, adrenaline-pumping action of eSports. Yes, you heard…
#ArtbyJadeAnnByrne#bedrock#bedrock Minecraft#Call of Duty Mobile#CarePackage#Chaos and Destruction#ciberseguridad#Clan Recruitment#Clan Wars#clandestine operations#Combat Ready#Competitive Gaming#contractor militar privado#contractor privado militar#contractors privados#cyber intelligence#cyber warfare#defensa cibernética#digital soldier#digital warfare#Dominate the Leaderboard#eGirl4Rent#eGirl4Rent PMC#egirl4rent server#Elite Players Only#espions numériques#Esports#eSports Army#eSports team#FPS Dominance
0 notes
Text
AI, Cybersecurity, and National Sovereignty
Introduction: The Role of AI in Cybersecurity
As artificial intelligence (AI) becomes integral to national security, cyber threats increasingly exploit AI-driven vulnerabilities. Both India and China face the challenge of securing their cyber infrastructure while mitigating espionage and offensive cyber operations. The risks include large-scale data breaches, intellectual property theft, and attacks on critical infrastructure. With AI enhancing the scope and speed of cyberattacks, national sovereignty is increasingly threatened by cyber vulnerabilities that transcend borders.
AI-Driven Cyber Threats and Espionage
China has heavily integrated AI into its cyber capabilities, using it to enhance espionage, cyber warfare, and information manipulation. AI-enabled cyber operations allow China to gather vast amounts of intelligence data through advanced hacking techniques. These tools are often deployed through state-sponsored groups, exploiting zero-day vulnerabilities and penetrating government and corporate networks worldwide.
For example, in 2021, China was accused of orchestrating a large-scale cyber-attack targeting Microsoft Exchange servers, affecting over 30,000 organizations globally. This attack was designed to facilitate espionage, capturing sensitive information ranging from corporate intellectual property to government data. China's cyber operations underscore the increasing use of AI in orchestrating sophisticated, large-scale intrusions that threaten national sovereignty.
India, while lagging behind China in offensive cyber capabilities, faces persistent cyber espionage threats from Chinese state-sponsored actors. The most notable incidents occurred during the 2020 India-China border standoff, where Chinese hackers targeted India's critical infrastructure, including power grids and government networks. These attacks highlight the vulnerabilities in India's cybersecurity architecture and its need to enhance AI-driven defenses.
Vulnerabilities and National Sovereignty
AI-driven cyber threats pose significant risks to national sovereignty. For India, the challenges are magnified by the relatively underdeveloped nature of its cybersecurity infrastructure. Although the establishment of the Defence Cyber Agency in 2018 marked a step forward, India still lacks the offensive cyber capabilities and AI sophistication of China. India's defensive posture primarily focuses on securing critical infrastructure and mitigating cyber intrusions, but it remains vulnerable to cyber espionage and attacks on its digital economy.
China's integration of AI into both military and civilian cyber systems, through its Military-Civil Fusion policy, has bolstered its ability to conduct large-scale cyber operations with deniability. This fusion allows China to leverage private sector innovations for military purposes, making it a formidable cyber power in the Indo-Pacific region.
Case Studies: Cyber Confrontations
In 2019, a significant cyberattack targeted India's Kudankulam Nuclear Power Plant, which was traced back to North Korea, but was believed to be part of a broader effort involving Chinese actors. This incident highlighted the potential for AI-enhanced malware to target critical infrastructure, posing severe risks to national security.
Similarly, the 2020 Mumbai blackout, reportedly linked to Chinese hackers, emphasized how AI-driven cyberattacks can disrupt essential services, creating chaos in times of geopolitical tension. These incidents illustrate how AI-driven cyber capabilities are increasingly weaponized, posing severe risks to India's sovereignty and its ability to protect critical infrastructure.
Implications for Future Conflicts
As AI continues to evolve, the cyber domain will become a primary battleground in future conflicts between India and China. AI-enhanced cyber operations provide both nations with the ability to conduct espionage, sabotage, and information warfare remotely, without direct military engagement. For China, these tools are integral to its broader geopolitical strategy, while India must develop its AI and cybersecurity capabilities to protect its national sovereignty and counteract cyber threats.
Conclusion
The integration of AI into cybersecurity poses both opportunities and challenges for India and China. While China has aggressively developed AI-driven cyber capabilities, India faces an urgent need to enhance its defenses and develop its offensive cyber tools. As cyberattacks become more sophisticated, driven by AI, both nations will continue to grapple with the implications of these developments on national sovereignty and global security.
#AI and cybersecurity#National sovereignty#Cyber espionage#India China cyber conflict#AI driven threats#Cyber warfare#Critical infrastructure#Cyber defense#China cyber strategy#India cybersecurity#AI and national security#Cyberattacks#Espionage operations#AI vulnerabilities#Military Civil Fusion#Cyber sovereignty#Cyber espionage India#AI in geopolitics#AI enhanced malware#Data security
0 notes
Text
5th Generation Warfare Tactics: 7 Mind-Blowing Ways It's Changing the World
hat are your thoughts on 5th generation warfare? Share your insights and questions in the comments below! Let's spark a conversation!
Hey there, fellow netizens and curious cats! 👋 Kumar here, your trusty guide through the digital wilderness. Today, we’re diving headfirst into the mind-bending world of 5th generation warfare tactics. Forget the old-school images of tanks and trenches; this battlefield is all about memes, manipulation, and mind games. 🤯[Facebook – Twitter – Insta] We’re about to embark on a journey through the…
#5GW#5th generation warfare#cyber warfare#cyberattacks#digital battlefield#disinformation#election interference#hybrid warfare#information warfare#misinformation#modern conflict#populism#psychological operations#social engineering#voter apathy
0 notes
Text
If you haven’t started already, start archiving/downloading everything. Save it to an external hard drive if you’re able. Collecting physical media is also a good idea, if you’re able.
Download your own/your favorite fanfics. Save as much as you can from online sources/digital libraries. Recipes, tutorials, history, LGBTQ media, etc. It has been claimed, though I can’t find the exact source if true, that some materials about the Revolutionary War were deleted from the Library of Congress.
It’s always better to be safe than sorry and save and preserve what you can. Remember that cloud storage also is not always reliable!
Library of Congress - millions of books, films and video, audio recordings, photographs, newspapers, maps, manuscripts.
Internet Archive - millions of free texts, movies, software, music, websites, and more. Has been taken offline multiple times because of cyber attacks last month, it has recently started archiving again.
Anna's Archive - 'largest truly open library in human history.’
Queer Liberation Library - queer literature and resources. Does require applying for a library membership to browse and borrow from their collection.
List of art resources - list of art resources complied on tumblr back in 2019. Not sure if all links are still operational now, but the few I clicked on seemed to work.
Alexis Amber - TikToker who is an archivist who's whole page is about archiving. She has a database extensively recording the events of Hurricane Katrina.
I'll be adding more to this list, if anyone else wants to add anything feel free!
8K notes
·
View notes
Text
listen if your "accepting" community has discord servers where you cyberstalk and harass and even SWAT "undesirables" I don't fucking trust you in the slightest and you are NOT the progressive you claim to be
#not all cops wear badges#some wear fucking fursuits#this vague post is brought to you by my partner's friend who is an ongoing victim of this kind of cyber stalking#cool fact! all their “undesirable” traits were blown WAY put of proportion or even made up by the cyber stalkers!#and yes im vagueposting about furries but only bc im one too and theres a really toxic subset of the fandom#and im not thrilled with the shit I've seen happen bc these people hsve been allowed to operate unchecked#vent post#if you clown in my notes you will not be engaged you will be blockrd
0 notes
Video
youtube
New Xbox Games for August 19 to 23 2024
#youtube#xbox#Xbox Series X|S#Series X#SeriesX#SeriesS#Xbox One#XboxOne#Xbobone#trailers#new games#newgames#new releases#Dustborn#Pneumata#Cyber Mission#Mangavania 2#My Lovely Empress#Dadish 3D#Parking Masters#dice assassin#Farming Life#Rise Eterna War#Tiebreak#Aery#Ancient Empires#The Eightfold Path#Island Cities#Magnus Trilogy#Operation
0 notes
Text
Google advances mobile AI in Pixel 9 smartphones
New Post has been published on https://thedigitalinsider.com/google-advances-mobile-ai-in-pixel-9-smartphones/
Google advances mobile AI in Pixel 9 smartphones
.pp-multiple-authors-boxes-wrapper display:none; img width:100%;
Google has unveiled its new range of Pixel 9 smartphones, emphasising their enhanced AI capabilities.
The company released the devices much earlier than usual, as Google typically presents new Pixel models in the autumn. However, compared to previous versions, the changes in the new models are revolutionary.
The new smartphones feature more advanced integrations of Google’s AI technology. For instance, one unique Pixel feature allows users to search for information and images within their screenshots, thanks to a more deeply integrated approach. Additionally, through the Gemini chatbot, some features of these smartphones are available as overlays from other apps.
At Alphabet’s Bay View campus in Mountain View, California, Rick Osterloh, the Senior Vice President of Devices and Services at Google, informed visitors that the company plans to focus on practical applications of AI. He spent time describing the “Gemini era” to the audience, which will commence with the creation of Google’s advanced AI model.
The Pixel 9 series offers several models. The base model, the Pixel 9, features a 6.3-inch screen and costs $799. A larger alternative, the Pixel 9 Pro XL, has a 6.8-inch screen. A slightly enhanced version, the Pixel 9 Pro, offers a better camera system, though its price is higher. The final option is the foldable Pixel 9 Pro Fold.
Regarding the initial shipping date, Google stated at the event that the Pixel 9 and Pixel 9 Pro XL would ship in late August. The Pro and Pro Fold models will ship in September, with all models available for preorder starting August 13. During Google’s presentations at the event, Gemini’s new functions were showcased in a live demo, focusing on the latest conversation features. Additionally, the company announced updates to the product’s exterior design, the installation of Google’s advanced camera system, and the integration of the new Tensor G4 chip.
In addition to smartphones, the company unveiled new versions of the Pixel Watch 3 smartwatch and Pixel Buds Pro 2 wireless earbuds. The watch can track the user’s heart rate; if it stops, it will call emergency services. This feature will be available in the UK and the EU.
As reported by IDC, Google’s share in the global smartphone market was less than 1% in the second quarter of 2024. Samsung and Apple took the first and second places, with market shares of 18.9%, and 15.8%, respectively. In the US, Google ranks fourth among smartphone operating systems, holding 4.5% of the market share.
Industry analysts note that although Google Pixel is not among the best-selling smartphones, it showcases some of the benefits of the Android operating system. Android has become the dominant operating system, used by more than 80% of smartphone users worldwide. Consequently, many people, even those who have never used a Google Pixel, may indirectly experience and appreciate the features that Google products offer.
The event also touched upon Google’s further intentions and previous efforts to implement AI across its product lineup to stay at the top of the game. Not long ago, the company integrated AI improvements into its core products, including its search engine. Additionally, Google announced a content-sharing agreement it reached with Peloton. As a result, Fitbit Premium subscribers will have free access to the Peloton training class library.
(Image Credit: Google)
See also: Google’s Gemini 1.5 Pro dethrones GPT-4o
Want to learn more about AI and big data from industry leaders? Check out AI & Big Data Expo taking place in Amsterdam, California, and London. The comprehensive event is co-located with other leading events including Intelligent Automation Conference, BlockX, Digital Transformation Week, and Cyber Security & Cloud Expo.
Explore other upcoming enterprise technology events and webinars powered by TechForge here.
Tags: ai, artificial intelligence, gemini, Google
#2024#agreement#ai#ai & big data expo#ai model#amp#android#Android operating system#apple#applications#approach#apps#artificial#Artificial Intelligence#automation#background#Big Data#chatbot#chip#Cloud#cloud computing#comprehensive#computing#conference#content#cyber#cyber security#cybersecurity#data#Design
0 notes