Nov 2025 to read inbox

Nov 2025 to read inbox

524 bookmarks
Newest
RAMBO: Leaking Secrets from Air-Gap Computers by Spelling Covert Radio Signals from Computer RAM
RAMBO: Leaking Secrets from Air-Gap Computers by Spelling Covert Radio Signals from Computer RAM
In this paper, we show how malware can manipulate RAM to generate radio signals at clock frequencies. These signals are modified and encoded in a particular encoding allowing them to be received from a distance away. The attacker can encode sensitive information (keylogging, documents, images, biometric information, etc.) and exfiltrate it via these radio signals. An attacker with appropriate hardware can receive the electromagnetic signals, demodulate and decode the data, and retrieve the exfiltrated information.
·arxiv.org·
RAMBO: Leaking Secrets from Air-Gap Computers by Spelling Covert Radio Signals from Computer RAM
RAMBO: Leaking Secrets from Air-Gap Computers by Spelling Covert...
RAMBO: Leaking Secrets from Air-Gap Computers by Spelling Covert...
Air-gapped systems are physically separated from external networks, including the Internet. This isolation is achieved by keeping the air-gap computers disconnected from wired or wireless networks, preventing direct or remote communication with other devices or networks. Air-gap measures may be used in sensitive environments where security and isolation are critical to prevent private and confidential information leakage. In this paper, we present an attack allowing adversaries to leak information from air-gapped computers. We show that malware on a compromised computer can generate radio signals from memory buses (RAM). Using software-generated radio signals, malware can encode sensitive information such as files, images, keylogging, biometric information, and encryption keys. With software-defined radio (SDR) hardware, and a simple off-the-shelf antenna, an attacker can intercept transmitted raw radio signals from a distance. The signals can then be decoded and translated back into binary information. We discuss the design and implementation and present related work and evaluation results. This paper presents fast modification methods to leak data from air-gapped computers at 1000 bits per second. Finally, we propose countermeasures to mitigate this out-of-band air-gap threat.
·arxiv.org·
RAMBO: Leaking Secrets from Air-Gap Computers by Spelling Covert...
August 25, 2025 Russian state cyber group Static Tundra exploiting Cisco devices, FBI warns
August 25, 2025 Russian state cyber group Static Tundra exploiting Cisco devices, FBI warns
A Russian cyber-espionage group is increasingly targeting unpatched Cisco networking devices through a vulnerability first discovered in 2018, the FBI warned.
he group was successful in compromising the business systems of the Wolf Creek Nuclear Operating Corporation in Burlington, Kansas, through spearphishing. They also found success using "watering hole" attacks, which captured the login credentials of energy sector engineers through compromised websites.
·therecord.media·
August 25, 2025 Russian state cyber group Static Tundra exploiting Cisco devices, FBI warns
Russian Disinformation Campaign “DoppelGänger” Unmasked: A Web of Dece
Russian Disinformation Campaign “DoppelGänger” Unmasked: A Web of Dece
The European Union’s Disinformation Lab (EU DisinfoLab) has recently exposed a sophisticated Russian influence campaign known as “DoppelGänger.”
Russian Social Design Agency and Structura National Technologies. DoppelGänger promotes pro-Russian narratives and infiltrates Europe’s media landscape by disseminating disinformation through a network of cloned websites, fake articles, and social media manipulation
disinformation campaign uses social media bots to spread its pro-Russian narratives with a multi-stage website obfuscation to mask links between the bots and inauthentic sources. Additionally, Russian actors likely paid for sponsored posts to increase these sites’ visibility and bypass moderation attempts used by social media companies.
·cybercom.mil·
Russian Disinformation Campaign “DoppelGänger” Unmasked: A Web of Dece
Perspective: Irregular Warfare in Strategic Competition and Gray Zones, Prosecuting Authoritarian Subversion and Exploitative Use of Corruption and Criminality to Weaken Democracy | Small Wars Journal by Arizona State University
Perspective: Irregular Warfare in Strategic Competition and Gray Zones, Prosecuting Authoritarian Subversion and Exploitative Use of Corruption and Criminality to Weaken Democracy | Small Wars Journal by Arizona State University
This commentary summarizes the author’s presentation to the United States Department of Defense (DoD) Strategic Multi-Layer Assessment (SMA) Speaker Series at the Pentagon, Washington, DC on 22 August 2024.The author is Executive Director of the International Coalition Against Illicit Economies (ICAIE) Read more
·smallwarsjournal.com·
Perspective: Irregular Warfare in Strategic Competition and Gray Zones, Prosecuting Authoritarian Subversion and Exploitative Use of Corruption and Criminality to Weaken Democracy | Small Wars Journal by Arizona State University
RussianSpaceWeb.com
RussianSpaceWeb.com
History and news on the Russian space program by Anatoly Zak | Editor: Alain Chabot
·russianspaceweb.com·
RussianSpaceWeb.com
What is DNS? | How DNS works
What is DNS? | How DNS works
DNS, or the domain name system, is the phonebook of the Internet, connecting web browsers with websites. Learn more about how DNS works and what DNS servers do.
·cloudflare.com·
What is DNS? | How DNS works