Télécommunications

Cybersecurity Brief: Ford Wants to Listen to You, FBI vs. Chinese Botnet, Threat Actor Tactics

Learn more about how we can help your business prevent attacks like this
Contact Us: https://hubs.ly/Q02JyH5Q0
Pentest ROI Calculator Download: https://hubs.ly/Q02wBB5d0

Ford Data Gathering

Ford has sparked controversy with its recent patent application that proposes an in-vehicle advertisement system capable of eavesdropping on passenger conversations. The patent details technology that can monitor trip data, such as vehicle speed and location, alongside user dialogues, parsing conversations for keywords to target relevant ads. This move raises concerns about privacy, with critics pointing out the lack of information on how Ford intends to secure the data it gathers. The company is no stranger to contentious patents, as it also filed one earlier this year for vehicle repossession technology. While Ford claims these filings are exploratory, the potential for intrusive data collection has prompted calls for stronger privacy protections, especially as US lawmakers scrutinize car manufacturers’ data practices.

More Reading: https://www.malwarebytes.com/blog/news/2024/09/ford-seeks-patent-for-conversation-based-advertising

FBI Takes Down Large Botnet

U.S. law enforcement, led by the FBI, has disrupted a major Chinese hacking group known as « Flax Typhoon, » seizing control of thousands of compromised devices, according to FBI Director Christopher Wray. The group, allegedly run by a company called the Integrity Technology Group, posed as an IT firm but was conducting intelligence operations for Chinese government security agencies. Flax Typhoon is accused of compromising over 250,000 devices globally, including critical infrastructure, corporations, and media outlets. This cyber campaign is part of a larger pattern, similar to the previously identified « Volt Typhoon » group, which has also targeted U.S. infrastructure. Despite China’s denial of the accusations, U.S. and allied officials remain focused on dismantling these botnets, marking another round in an ongoing cyber battle with China.

More Reading: https://blog.lumen.com/derailing-the-raptor-train/

Views : 125
cyber security

Source by risk3sixty

Mourad ELGORMA

Fondateur de summarynetworks, passionné des nouvelles technologies et des métiers de Réseautique , Master en réseaux et système de télécommunications. ,j’ai affaire à Pascal, Delphi, Java, MATLAB, php …Connaissance du protocole TCP / IP, des applications Ethernet, des WLAN …Planification, installation et dépannage de problèmes de réseau informatique……Installez, configurez et dépannez les périphériques Cisco IOS. Surveillez les performances du réseau et isolez les défaillances du réseau. VLANs, protocoles de routage (RIPv2, EIGRP, OSPF.)…..Manipuler des systèmes embarqués (matériel et logiciel ex: Beaglebone Black)…Linux (Ubuntu, kali, serveur Mandriva Fedora, …). Microsoft (Windows, Windows Server 2003). ……Paquet tracer, GNS3, VMware Workstation, Virtual Box, Filezilla (client / serveur), EasyPhp, serveur Wamp,Le système de gestion WORDPRESS………Installation des caméras de surveillance ( technologie hikvision DVR………..). ,

Laisser un commentaire

Votre adresse e-mail ne sera pas publiée. Les champs obligatoires sont indiqués avec *