Saturday, August 30, 2025

US Homeland Security News :Venezuela under US cyber attack! Blackout in Greater Caracas and other regions of Venezuela.

Given the available evidence, there is a strong possibility that the power outage was caused by internal problems, infrastructure or human sabotage, not a foreign cyberattack.

The release of this news is more of a psychological nationalism for the Venezuelan people and their weak government officials than a technical and cyber reality...

US Homeland Security News

Google recommends that 2.5 billion Gmail users change their passwords following an advanced phishing attack that started through a Salesforce vulnerability.

 


Google recommends that 2.5 billion Gmail users change their passwords following an advanced phishing attack that started through a Salesforce vulnerability.

The attack included fake phone calls with attackers posing as Google representatives, prompting users to enter their login details.

Google did not specify the extent of the affected users but emphasized the need for an immediate password change. It also recommends enabling two-factor authentication (2FA) and avoiding entering login details during unidentified phone calls.

The password change recommendation was also delivered via messages within Gmail to ensure users take immediate action.

Hackers breached the customer service system of TransUnion in the US through a third-party application, exposing sensitive personal information of about 4.4 million Americans including names, addresses, birth dates, and Social Security numbers, but without credit reports.

 


Hackers breached the customer service system of TransUnion in the US through a third-party application, exposing sensitive personal information of about 4.4 million Americans including names, addresses, birth dates, and Social Security numbers, but without credit reports.


The attack is attributed to the ShinyHunters and UNC6395 groups who exploited vulnerabilities in Salesforce.


TransUnion provides credit rating and financial information management services, so such a leak poses a serious risk of identity theft.


The company offers affected individuals two years of credit monitoring and identity protection services, while a class-action lawsuit against it is under review. Law enforcement authorities continue their investigation.


ESET researchers exposed PromptLock, the world’s first ransomware written using artificial intelligence.

 


ESET researchers exposed PromptLock, the world’s first ransomware written using artificial intelligence.


This is a PoC demonstrating the potential of using a local LLM (gpt-oss:20b via Ollama API) to create Lua scripts in real time, used for file scanning, data theft, and encryption.


The ransomware is written in Golang, runs on Windows and Linux, and uses the SPECK 128-bit encryption algorithm. Its uniqueness lies in the fact that each execution generates different and dynamic code, making it difficult for signature-based detection systems to stop it.


Although this is a demonstration and not a real attack, researchers warn that integrating AI into ransomware could make advanced capabilities accessible even to criminals with little technical knowledge, creating a new generation of more sophisticated ransomware.


ESET’s recommendations for dealing with this are maintaining proper backups, monitoring dynamic script creation, and preparing defenses against AI-based attacks.


#Ransomware #AI #PromptLock #ESET #CyberThreats #Malware

Monday, August 18, 2025

Tom Alexandrovich, a child molester who is the mastermind and founder of the Israeli Cyber Dome.


Tom Artyom Alexandrovich, 38, an Israeli national; executive director of the cyber department of the


Israeli National Cyber Authority, was arrested in Las Vegas, USA, along with eight other men. He was arrested on a felony charge of luring a child using a computer for sexual activity and was released on $10,000 bail and immediately returned to Israel.

Prior to this incident, Alexandrovich was known as a senior manager in Israel’s cybersecurity sector, specifically the Israeli National Cyber Authority. He had recently attended the Black Hat briefings, a cybersecurity conference in Las Vegas.

Under Nevada law, the charge of luring a child using a computer for sexual activity can carry a prison sentence of between one and ten years.

Others arrested with him include:

David Wonnacott-Yahnke, 40

Jose Alberto Perez-Torres, 35

Aniket Brajeshkumar Sadani, 23

James Ramon Reddick, 23

Ramon Manuel Parra Valenzuela, 29

Neal Harrison Creecy, 46

John Charles Duncan, 49

Tom Alexandrovich is a cybersecurity leader and executive specializing in national security cyber defense. He played a key role in designing and building Israel’s groundbreaking “Cyber Dome” program, a national initiative to protect civilian cyberspace. His expertise includes developing national cyber strategies, building high-performance teams, and protecting critical infrastructure and democratic institutions from advanced persistent threats (APTs).

With deep experience in cyber threat intelligence (CTI) and proactive cyber defense, Alexandrovich has shaped national cybersecurity policies not only in Israel but also on the international stage. He has advised senior government officials, managed multi-million dollar cybersecurity budgets, and contributed to the resilience of critical infrastructure and election security.

As the founder of Israel’s Cyber Dome program and the national approach to proactive cyber defense, Alexandrovich has significantly strengthened the country’s cyber resilience. His contributions include co-founding the Israeli National Aviation Cyber Security Program and receiving the Israel Defense Forces Award for Outstanding Achievement.

This incident exemplifies the multi-layered complexities that arise from the intersection of technology, ethics, and politics. The arrest of a senior cybersecurity official not only has a personal dimension, but also raises fundamental questions about the regulatory structure and professional ethics in this field. Given the sensitive place of cybersecurity in international relations, such incidents can have profound implications for strategic cooperation.

From an analytical perspective, this incident highlights the importance of multi-dimensional approaches; Because it cannot be reduced to a single individual error. The ethical, security, and political issues are intertwined, and any strategic analysis must consider these dimensions simultaneously.

Many analysts consider him to be one of the most powerful cyberwarfare officials in the entire Israeli government, a man who operates at the nerve center of the national intelligence and defense apparatus. As head of the data and artificial intelligence division at Israel’s National Cybersecurity Authority, his job is nothing less than protecting Israel’s critical infrastructure from digital attacks—everything from the power grid to airports to the country’s most sensitive information networks.

Officially, the swift response from the Israeli Prime Minister’s Office was an attempt to contain the diplomatic crisis. The clear statement that no arrests had taken place was implicitly intended to calm public opinion and prevent media hype. This approach in crisis diplomacy is a smart move to avoid damaging political relations.

Israel was able to prevent the crisis from escalating by insisting that the issue had no political dimensions; However, the global media coverage highlights the importance of public opinion management. This incident demonstrated that failure to control the media narrative in a timely manner can have serious costs for an institution’s credibility. Therefore, designing a proactive communication strategy is a key imperative in cyber management.

NEW CHAPTER IN CYBER WARFARE Selling American Weapons Information In The Darkweb Sigma NG (Next Generation) 155 mm Self Propelled Howitzer –...