China Vows Resistance Amidst Escalating Tariff Threats #Somalia #China #escalating #resistance #Tariff #threats #vows
https://tinyurl.com/25b4zf9y
China Vows Resistance Amidst Escalating Tariff Threats #Somalia #China #escalating #resistance #Tariff #threats #vows
https://tinyurl.com/25b4zf9y
Angered by ugly American tariffs and threats, and alarmed by reports of tourists being arrested at the border, citizens of other countries are choosing to travel elsewhere – #CanadaLetter
#ElbowsUp #Canada #CanadaStrong #tourism #tariffs #trade #travel #threats
Morphing Meerkat PhaaS Using DNS Reconnaissance To Generate Phishing Pages Based on Target https://cybersecuritynews.com/morphing-meerkat-phaas-using-dns-reconnaissance/ #CyberSecurityNews #cybersecuritynews #phishing #Threats
Trump’s order also toys with innovative new abuses of power.
It directs the nonpartisan, independent Election Assistance Commission
to tighten ID measures
— a directive far beyond the scope of presidential authority.
But precedent, and the rule of law, have not often dissuaded the Trump administration.
Ominous language in the order directs states to provide voter roll information to Immigration and Customs Enforcement and the Department of Homeland Security (DHS).
(The text also goes out of its way to praise the rather dystopian biometric voter ID measures in use in India.)
Later, the executive order stipulates that state voter lists must be made available for
review by the DHS and “the DOGE Administrator”
— this presumably referring to private citizen and public embarrassment Elon Musk.
In other words, the infamously intrusive DHS,
now with the infamously disruptive DOGE,
will be given some sort of authority over state voter rolls,
many of which are already subjected to baseless and illegal purges.
We can only imagine what sort of further mangling the flunkies of DOGE might have in mind.
After all, we’ve seen what kind of technical “upgrades” and other impending disasters they intend to carry out at the Social Security Administration (SSA).
(In fact, the executive order even contains a roundabout means of facilitating DOGE and Trump’s access to the SSA,
dictating that the SSA commissioner must provide SSA data for voting eligibility determinations.
This may be intended to circumvent legal barriers to DOGE intervention.)
Speaking of #security #threats,
the Trump administration has already hampered the "Cybersecurity and Infrastructure Security Agency" ( #CISA ), placing its 17-member election security team on administrative leave
and “under review.”
CISA is tasked with addressing election threats,
from cyberattacks to violence against poll workers.
Here, it seems likely that Trump is pursuing another petty #vendetta.
The president is evidently a bit bitter about CISA’s efforts to contradict his misinformation about COVID and the 2020 election,
as comments from DHS chief Kristi Noem
(who claimed the agency has ventured “far off mission”)
have hinted.
Yet another blow to electoral integrity arrived with the defunding of the Center for Internet Security
and the subsequent closure of its subsidiary, the "Election Infrastructure Information Sharing and Analysis Center"
( EI-ISAC ).
EI-ISAC,
alongside the "Multi-State Information Sharing and Analysis Center",
served as a technical support and advisory arm on internet security.
Shuttering it may now leave open possible avenues for cyberattacks,
foreign interference, and other uncertain threats, according to Politico.
Unfortunately, Trump’s recent executive order contains even more diktats:
requiring the reporting of foreign nationals to the DHS,
unsourced claims of illicit foreign contributions to direct-democracy ballot initiatives
(which the right generally does not like),
and additional stringent demands to serve up voter information to unaccountable agencies,
for purposes unknown.
The most chilling section, though, might be the one titled “Prosecuting Election Crimes.”
It defines as a #criminal anyone who
“registered or voted despite being ineligible,”
“committed election fraud,”
“provided false information [on] forms,”
“threatened voters or election officials,”
or “engaged in unlawful conduct to interfere in the election process.”
Worth noting that some of these definitions are enormously subjective.
If it comes to prosecuting activists or political opponents
— which has become an acute possibility
— the listed violations will surely provide for some generously broad legal interpretations.
Lastly, the Trump administration appears keen to ensure its threats do not ring hollow. The order promises to penalize recalcitrant states by conditioning their funding on obedience.
The administration reserves itself the right to
“cease providing Federal funds to States that do not comply[.]”
We’ve already been treated to the ugly sight of Trump withholding funds as a cudgel.
Perhaps he’s emboldened by his success in goading elite universities to kiss the ring,
some so eager to grovel and demonstrate fealty to escape his wrath that they folded preemptively in fear
— or just complicity.
Voting rights advocates are hoping that at least some in the judiciary will not capitulate so easily.
Threat Actor Leaked Data from Major Bulletproof Hosting Medialand https://cybersecuritynews.com/threat-actor-leaked-data-from-medialand/ #CyberSecurityNews #cybersecuritynews #cybersecurity #Threats
Threat Actors Exploit Toll Payment Services in Widespread Hacking Campaign https://gbhackers.com/threat-actors-exploit-toll-payment-services/ #CyberSecurityNews #cybersecurity #Android #THREATS
Threat Actors Use VPS Hosting Providers to Deliver Malware and Evade Detection https://gbhackers.com/threat-actors-use-vps-hosting-providers-to-deliver-malware/ #CyberSecurityNews #cybersecurity #Malware #THREATS
Threat Actors Exploit Fake CAPTCHAs and Cloudflare Turnstile to Distribute LegionLoader https://gbhackers.com/threat-actors-exploit-fake-captchas-and-cloudflare-turnstile/ #CyberSecurityNews #cybersecurity #Malware #THREATS
So. Hey. I know we all hate generative AI for one reason or another. But, uh, maybe we should be building one of these for defense. Or at least red team?
https://www.darkreading.com/threat-intelligence/autonomous-genai-attacker-platform-chat
Sec-Gemini v1 – Google’s New AI Model for Cybersecurity Threat Intelligence https://gbhackers.com/googles-new-ai-model-for-cybersecurity-threat-intelligence/ #CyberSecurityNews #cybersecurity #THREATS #Google #AI
"Nobody can protect you. These are dangerous times."
Journalism is now a captive of the state of Israel and Trump.
Beware of Weaponized Recruitment Emails that Deliver BeaverTail and Tropidoor Malware https://cybersecuritynews.com/beware-of-weaponized-recruitment-emails/ #CyberSecurityNews #cybersecuritynews #Threats #malware
Malicious PyPI Package Targets E-commerce Sites with Automated Carding Script https://gbhackers.com/malicious-pypi-package-targets-e-commerce-sites/ #CyberSecurityNews #cybersecurity #THREATS #Python
Pirate Threats Persistently Haunt Cruise Liners #EastAfrica #Somalia #WestAfrica #Cruise #Haunt #Liners #Persistently #Pirate #threats
https://tinyurl.com/23s9m8n2
War On Reality
"So you're telling that from the river to the sea is a terrorist incitement to genocide while I'm seeing a genocide?" - Abby Martin
Chinese Hackers Actively Exploiting Ivanti VPN Vulnerability to Deploy Malware https://cybersecuritynews.com/chinese-hackers-actively-exploiting-ivanti-vpn-vulnerability/ #CyberSecurityNews #cybersecuritynews #vulnerability #Threats
Frida Penetration Testing Tool Kit Released With New APIs for Threat Monitoring https://cybersecuritynews.com/frida-penetration-testing-tool-kit-released/ #CyberSecurityNews #cybersecuritynews #CyberSecurity #cybersecurity #Threats #API
AI Threats Are Evolving Fast — Learn Practical Defense Tactics in this Expert Webinar – Source:thehackernews.com https://ciso2ciso.com/ai-threats-are-evolving-fast-learn-practical-defense-tactics-in-this-expert-webinar-sourcethehackernews-com/ #rssfeedpostgeneratorecho #CyberSecurityNews #TheHackerNews #threats
QR codes sent in attachments are the new favorite for phishers https://www.malwarebytes.com/blog/news/2025/04/qr-codes-sent-in-attachments-are-the-new-favorite-for-phishers #emailfilters #phishing #Threats #QRcodes #News
Russian Seashell Blizzard Targets Organizations Using Custom-Built Hacking Tools https://gbhackers.com/russian-seashell-blizzard-targets-organizations/ #CyberSecurityNews #cybersecurity #Vulnerability #THREATS