Archive for the ‘NSA’ Category

Reality Trailer: Sydney Sweeney Is In Trouble As NSA Whistleblower Reality Winner – /Film

The footage focuses very prominently on Sweeney's face, looking like a ghost, sort of like her life is over. In many ways (not to spoil it) it probably is. We see men with badges going through her things, taking pictures, and bagging up items. It's clear someone believes a crime was committed, and it's probably every otherwise upstanding citizen's worst nightmare. To provide a bit more context, here is the synopsis for the film that was provided by the Berlin Film Festival ahead of its premiere:

The social media profile of a young woman includes pictures of her pets, her friends, and her exercise routine. But on June 2, 2017, the posts come to an end. This film begins on the following day and contains verbatim dialogue from the unedited transcript of an FBI audio recording. The audience witnesses the protagonist played by Sydney Sweeney arriving at her home in Georgia, only to be met by two men outside who politely inform her that they have a search warrant. What follows is a chamber piece focusing on the interrogation of whistle-blower Reality Winner and the search of her home.

The minimal cast also includes Josh Hamilton as Agent Garrick and Marchnt Davis as Agent Taylor. Tina Satter is in the director's chair, making her feature directorial debut. Meanwhile, Sweeney is becoming a real mainstay at HBO between this film as well as her roles on "Euphoria" and "The White Lotus." Plus, she's starring in Sony's "Madame Web" movie next year. Sweeney is undoubtedly having one heck of a moment.

"Reality" premieres May 29 on Max.

Here is the original post:
Reality Trailer: Sydney Sweeney Is In Trouble As NSA Whistleblower Reality Winner - /Film

NSA Part of Coalition Highlighting Cybersecurity Best Practices for … – National Security Agency

FORT MEADE, Md. - The Cybersecurity and Infrastructure Security Agency (CISA), National Security Agency (NSA), and Federal Bureau of Investigation (FBI) are partnering with international partners cybersecurity agencies to publish cybersecurity best practices for smart cities, which integrate public services into a connected environment to increase efficiencies and improve the quality of life in various communities.Seven agencies from five countries has published the Cybersecurity Information Sheet, Cybersecurity Best Practices for Smart Cities, highlighting how the integration of operational technology into a connected environment has many benefits, but can also be an attractive target for malicious cyber actors to steal critical infrastructure data and proprietary information, conduct ransomware operations, or launch destructive cyberattacks.

The report examines risks deriving from three areas: a large interconnected attack surface, the ICT supply chain and vendors, and the automation of infrastructure operations.

The authoring agencies also provide recommendations to help organizations balance efficiency and innovation with cybersecurity, privacy protections, and national security. They recommend that organizations implement these best practices to ensure the safe and secure operation of infrastructure systems, protection of citizens private data, and security of sensitive government and business data.

Read the full report.

View CISA's resource library for this report.Visit our full library for more cybersecurity information and technical guidance.

NSA Media RelationsMediaRelations@nsa.gov443-634-0721

Read the original here:
NSA Part of Coalition Highlighting Cybersecurity Best Practices for ... - National Security Agency

NCSC-UK, NSA, and Partners Advise about APT28 Exploitation of … – National Security Agency

FORT MEADE, Md. - The National Security Agency (NSA) has partnered with the UKs National Cyber Security Centre (NCSC), the Federal Bureau of Investigation (FBI), and the Cybersecurity and Infrastructure Security Agency (CISA) to publish a joint Cybersecurity Advisory (CSA) report on the tactics, techniques, and procedures (TTPs) associated with APT28s exploitation of Cisco routers.

APT28 is also known as the Russian General Staff Main Intelligence Directorate (GRU) 85th Special Service Center (GTsSS) military intelligence unit 26165, Fancy Bear, STRONTIUM, Pawn Storm, the Sednit Gang, and Sofacy.

The transatlantic coalition published the APT28 exploits known vulnerability to carry out reconnaissance and deploy malware on Cisco routers CSA indicating that APT28 cyber actors masqueraded Simple Network Management protocol (SNMP) to exploit CVE-2017-6742 (Cisco Bug ID: CSCve54313) and access vulnerable Cisco routers worldwide. This included U.S. Government institutions, approximately 250 Ukrainian victims, and a small number based in Europe.

These cyber actors continue to leverage a known vulnerability to exploit unpatched Cisco routers to conduct reconnaissance and deploy malware to enable unauthenticated access. See NCSCs Jaguar Tooth malware analysis report for details.

SNMP is designed to allow administrators to monitor and configure network devices remotely, but it can also be misused to obtain sensitive network information and, if vulnerable, exploit devices to penetrate a network.

The authoring agencies recommend following the mitigation advice to defend against this malicious activity and identify indicators of compromise (IoCs) to detect possible activity in networks.Read the full report here. Visit our full library for more cybersecurity information and technical guidance.

NSA Media RelationsMediaRelations@nsa.gov443-634-0721

Continued here:
NCSC-UK, NSA, and Partners Advise about APT28 Exploitation of ... - National Security Agency

Past leaks have exposed NSA surveillance, Guantanamo ops – NewsNation Now

Tyler Wornell and Steven Joachim

6 days ago

The National Security Agency (NSA) is shown 31 May 2006 in Fort Meade, Maryland, a suburb of Washington, DC. The National Security Agency/Central Security Service is Americas cryptologic organization. It coordinates, directs, and performs highly specialized activities to protect US government information systems and produce foreign signals intelligence information. AFP Photo/Paul J. Richards (Photo by Paul J. RICHARDS / AFP) (Photo by PAUL J. RICHARDS/AFP via Getty Images)

(NewsNation) An Air National Guardsman has been arrested for allegedly leaking more than 100 classified documents about the war in Ukraine in whats become one of the major intelligence disclosures in recent years.

The investigation has drawn comparisons to the Edward Snowden case, but former prosecutors see greater parallels with the 2018 prosecution of defense contractor Reality Winner. She was sentenced to more than five years for leaking an intelligence report about Russias interference in the 2016 elections.

Winner shared the information with the media and served more than four years in prison before being released. The documents relating to Ukraine and other intelligence gathered by the United States was initially confined to a small online chat group on the messaging platform Discord.

Heres a brief history of major intelligence leaks over the past 15 years and what they exposed:

Read more:
Past leaks have exposed NSA surveillance, Guantanamo ops - NewsNation Now

Fairwinds Insights Release Notes 11.12-12.2: Spotlight on … – Security Boulevard

This months Fairwinds Insights release notes offer a number of bug fixes and also details of our latest enhancements to Automated Fix Pull Requests (PRs) and our new NSA Hardening Compliance Report. Automated Fix PRs allows you to automatically fix many Kubernetes misconfigurations faster, making it easier for dev teams to make misconfiguration fixes quickly and easily.

This new feature accelerates the remediation of problems, such as security bugs and policy violations, by offering code-level fixes to common Infrastructure-as-Code (IaC) issues that often occur in Kubernetes manifests. Automated Fix PRs gives you the ability to fix multiple IaC issues with one click, then review and approve all of your changes in GitHub.To achieve this, we added permissions to our GitHub integration to write to repository contents. This only applies to repositories you connect to Insights via GitHub, and the changes will always occur on a separate branch. This enables you to review the automated fix PRs before deciding to merge.

To learn more, visit the Github permissions and Auto-Scan pages.

An analysis of IaC scans showed that this new feature can remediate at least 42% of issues automatically. Getting fixes out quickly can help your teams reduce security risks, increase reliability, and control cloud costs.

This month we also added a new NSA Hardening Compliance Report as part of our efforts to support people in implementing NSA recommendations for hardening Kubernetes clusters. This report is available on the Compliance page to help your organization comply with NSA Hardening recommendations. The Insights Agent can automatically check some of the compliance checks for NSA Hardening. For the remaining compliance checks, users can mark the state manually.

Fixed an issue with the Captchas on user register

Small UI fixes in User Settings

Fixed Auto-Scan logs sometimes showing multiple runs

New look for the Add Ons page

Fixed OPA policies not being blocked by admission controller

New Total Savings Available in the Costs page

Fixed and issue where sometimes not all filters showing up in Action Items table

Removed Cost Strategy option from the Costs settings page

Selecting a team in the Action Items table now shows correct Action Items

Added a loading indicator in Reports > History

Multiple fixes to the Costs page

If youre not using Fairwinds Insights yet, try out the new tier to explore the Automated Fix PRs functionality and the NSA Hardening Compliance Report. Insights is available for free for environments up to 20 nodes, two clusters, and one repo. Read how to get started with the Insights Free Tier here. To get more details on how to use the newest features and stay up to date with Fairwinds Insights updates, view the release notes.

*** This is a Security Bloggers Network syndicated blog from Fairwinds | Blog authored by Dakoda Wogan. Read the original post at: https://www.fairwinds.com/blog/fairwinds-insights-release-notes-11.12-12.2-spotlight-on-automated-fix-prs

Read more from the original source:
Fairwinds Insights Release Notes 11.12-12.2: Spotlight on ... - Security Boulevard