Tblisi Public Transit Speakers Hacked, Play Pro-EU Messages

Today, on what marks the 58th day of protests against the new Georgian government, an interesting turn of events caused Tblisi's bus system to suspend fares.
Today, on what marks the 58th day of protests against the new Georgian government, an interesting turn of events caused Tblisi's bus system to suspend fares.
On June 27th, Ukrainian hackers from the "Кібер Спротив" (Cyber Resistance) team have leaked a trove of internal communications belonging to former Russian president and current Chairman of Russia's Security Council, Dmitry Medvedev.
As Russia’s invasion of Ukraine has evolved into a slow, grinding war, an apparent deadlock in cyberspace has led pro-Russian threat actors to turn their attention to foreign targets seen as responsible for keeping Ukraine in the fight. This increase…
For the past 24 hours, Swiss government and infrastructure websites have been crippled by a series of distributed denial-of-service (DDoS) attacks, claimed by a pro-Russian hacking group known as ‘NoName057(16)‘. The ongoing attacks are occurring just days ahead of a…
"We continue our destructive activities, for the glory of our homeland." Says an official statement by Russian cybercriminals, Killnet, on their Telegram channel.
Verification is an essential principle in all journalism, but perhaps doubly so when delving into a world of questionable legality in online spaces. Finding leads on a cybercrime or cyberwarfare beat can be as simple as following some sketchy communication channels and seeing what makes waves in them. Unfortunately, the nature of the offenses require a lot of technical expertise to solidify attribution.
In the first week of December, Ukraine successfully executed multiple UAV-based attacks deep into Russian territory. Despite expert analysis demystifying details of the strikes before the week was over, rumors still abounded about the attacks, which included speculation of Ukraine's development of some secretive, long-ranged, unmanned platform. Is a new, secret weapon in the skies over eastern Europe? Whether or not such a device yet exists, there's a strong case to be made that one of Europe's most understated and innovative drone producers may have its stride again under fire.
On November 21st, Ukraine's Computer Emergency Response Team (CERT-UA) was alerted to a new string of ransomware attacks, strongly indicated to be the Russian advanced persistent threat dubbed Sandworm.
On the afternoon of November 19th, the Armed Forces of Ukraine alleged that a group of hackers briefly subjected Russian viewers to a pro-Ukrainian propaganda reel on their behalf.
Throughout the Summer, the US-built M142 HIMARS established itself as a symbol of Ukraine's ability to strike back against building Russian momentum, perhaps even edging out the Bayraktar TB2 as the meme weapon du jour in the heated social media war. While there's no denying that the HIMARS are having a measurable impact, UA artillery units have already been making use of a home-grown development that, in the long term, may make the biggest difference in the conflict's asymmetrical artillery duals. This is the GIS Arta targeting system, and the effects of its innovation may outlast that of any other tool seen in this conflict.