Thursday, March 19, 2020

The US cleared the Coyote Block 2 counter-drone weapon for sales to American allies, the developer Raytheon said in a press release on Tuesday.
"Delivering this enhanced version of the combat-proven Coyote strengthens our allies' defences against enemy drones", Raytheon Land Warfare Systems Vice President Sam Deneke said in the release. "Block 2 is fast, effective and protects troops on the battlefield".
Powered by a jet engine, the new weapon can be launched from the ground to destroy drones and other aerial threats, the release said.
Defence websites describe the Coyote as a 'kamikaze drone' because the machine is designed to either crash into small, unmanned aircraft or to explode nearby.
The US is developing other anti-drone weapons using lasers or microwave bursts to disable the unmanned aerial weapons.
In February, Raytheon announced that it had completed the first radar antenna for the US Army’s low-tier missile 

The worldwide network of telescopes, which last spring published the first ever image of a black hole, has canceled its annual observations of the cosmos due to the coronavirus pandemic,

The worldwide network of telescopes, which last spring published the first ever image of a black hole, has canceled its annual observations of the cosmos due to the coronavirus pandemic, it was announced in a statement on Tuesday.
This cooperation, collectively known as Event Horizon Telescope (EHT), announced that its 2020 project would be canceled due to the shutting down of the individual telescopes that make up the network.
The closures come as part of the global response to the outbreak of Covid-19.
"Progress on the scientific goals of the EHT Collaboration is secondary to the health and well-being of our collaboration members, our families, our institutions, and the people who work at the observatory and correlator facilities that support our efforts," representatives of the collaboration said.
Due to annual weather patterns and "celestial mechanics," the network is only able to make observations in March and April. As the pandemic and it's total impact are expected to only get worse, the EHT team does not believe they will be able to be up and running by April.
The closures do not mean the end to the search, however, as the network announced that they would be focusing on "a rich trove of data" from 2017 and 2018 observations and devoting their full concentration to the "completion of scientific publications".
Observations are scheduled to resume in the spring of 2021, when the network plans to include a total of 11 facilities in its search across the globe.

Lockheed Martin Corp has released a promotional video that appears to show a simulated airstrike on Russian weaponry.


Lockheed Martin Corp has released a promotional video that appears to show a simulated airstrike on Russian weaponry.
More than halfway into the promo, CGI footage shows strikes by Lockheed’s planes on Russia’s trademark S-400 anti-air systems and a road-mobile Topol-M intercontinental ballistic missile system, as the voice-over narrates about the “ever-evolving threats” to US security.
Lockheed’s new video is dedicated to the weapons manufacturer’s Advanced Development Programmes, also known as Skunk Works, the elite division tasked with top-secret research and development.
It appears to show mostly concepts of new machines, with the only real-life aircraft being the troubled F35 jet.
The S-400 (NATO reporting name: SA-21 Growler) is one of the most advanced anti-missile weapons currently made; it has caused a great deal of concern in the US over its acquisition by Turkey and India, with Washington repeatedly threatening to retaliate should they move ahead with the deals.
The Topol-M (NATO designation SS-27), which is being gradually replaced by the newer Yars systems, is one of the most recent intercontinental ballistic missiles to be deployed by Russia. It normally carries a single nuclear warhead with an 800-kt yield, which is 40 times the destructive power of the atomic bomb dropped on Nagasaki in 1945.

Wednesday, March 18, 2020

A vulnerablity in slack ease the hijacking of accounts

Slack developers fixed a vulnerability that allowed to capture other people’s accounts. The problem was discovered in November 2019 by information security researcher Ivan Castodio (Evan Custodio).
Castodio discovered the vulnerability using HTTP Request Smuggling attacks and proprietary tools. In essence, the bug allowed to steal session cookies through HTTP Request Smuggling and establish control over other people’s accounts.
The researcher writes that the vulnerability was “extremely critical” for both Slack and all clients and organizations using the platform. The fact is that exploiting the bug could lead to “serious compromise of the majority of customer data,” and attackers could create automated bots that would carry out continuous attacks, intercept victims’ sessions and steal everything they could get to. The scheme of such an attack can be seen below.
Slack developers quickly fixed this vulnerability, and the researcher was paid $ 6,500 under the bug bounty program.
In addition, another dangerous bag found by Detectify specialists was fixed in Slack. The vulnerability allowed attackers to steal user authentication tokens, which then could provide complete control over messages and the victim’s account. According to experts who found the problem, hackers, in fact, could create malicious sites to steal XOXS tokens. Disclosure of this error brought Detectify specialists $ 3,000 for the reward program for vulnerabilities.

DRC's capital kinshasha locked by Insecurity as a result of a gang of young men termed as" KULUNA" whose acts are similar to those we call ABOBUTAYIMBWA in Kampala."


The president of the Senate, Alexis Thambwe Mwamba was critical of the security authorities in Kinshasa following the outbreak of urban crime orchestrated by bandits known as "kuluna".
In his opening speech of the March parliamentary session, he somehow denounced the passivity of the state which, according to his question, would be limited to securing only Gombe, which is one of the 24 communes of the capital.
" We also regret the increase in urban banditry, in cities and major cities of the country, and especially in the city of Kinshasa: complaints of kidnappings, car theft, expatriates and national attacks, are happening to us Plus. The state seems overwhelmed and of of individuals want to impose their law on us. Seeing them act like this, we wonder if in Kinshasa the state is limited to Gombe, and again, we urge law enforcement, to solve this problem ", he said.
He also asked " the Senate Defense and Security Committee to investigate possible ways to address these issues. "
Urban crime has grown on another scale in the capital. Young "kuluna" sometimes operate in machete in view and knowledge of law enforcement to extort valuable goods from passers-by and do not hesitate to hurt them in the event of resistance.
The many messages of the Congolese National Police on their twitter account can witness the gloomy security climate in the city of Kinshasa. No later than Monday, March 16, police wrote: " Kimbanseke, Ngiesi neighborhood in Mabanza yellow land in the surroundings of I bayaka, young kulunas criminals distribute insecurity without being worried. "


Burundi refugees claim that according to a " prophecy ", the DRC " is their promised land





The provincial governments of North and South Kivu, under the support of the Directorate General for Migration (CMD), mobilized to repatriate more than 1600 Burundians who were in an irregular situation in the DRC. These refugees were found in a dealership located in Lac Vert district in Goma. Some sources say they had been installed there since 2018.
The provincial authorities in North Kivu have decided to repatriate them to Burundi, through Bukavu and Uvira, in South Kivu province. On Tuesday, March 2020, 17, the Vice-Governor and CMD received 1609 people from the boats Emmanuel 2 and 3. After identification, these Burundian people boarded 20 FARDC trucks , under the facilitate of CMD and the Congolese National Police. They were sent to Burundi via Kanvinvira to Uvira, which was their front door.
In Bukavu, while some were wondering how they had entered the Congo, in view and at the knowledge of security services, until they were in Goma; others say they would be the refugees who had settled in Kamanyola and said that, according to divine prophecy, the DRC is their promised land.
One of them, Jean-Claude Ngamichaniye, says they had applied for asylum in the DRC. Unfortunately, the Congolese authorities had completely rejected. He adds that in Burundi, they are victims of religious persecution sponsored by the Catholic Church of Burundi.
" We were persecuted by the church of Burundi, which chased us everywhere. She used the financial means (tithes). Loyal Christians were used to track us down and crush us everywhere. They're taking us all over the streets and even in homes. That's why we ran out of the country ", explains Jean-Claude Ngamichaniye.
On the question of whether they have an armed group, this one talks about the "said". Those who insécurisaient the city of Goma were not our members. He then asked the Burundian authorities to open their doors and welcome them with open arms.
These people were reportedly excommuniées and excluded from the Catholic Church for practices that are contrary to church rituals.

The provincial government of South Kivu repatriated more than 1600 Burundi via Kanvinvira to Uvira



According to sources in Goma and Bukavu, Burundian refugees were boarded for their return to Burundi via Kanvinvira in Uvira, in more than 20 FARDC trucks.
The Directorate-General for Migration (CMD) has registered more  people coming to Goma, North Kivu and who were in the irregularities in the DRC, which they call "promised land".
In comparison with the statistics given by the North Kivu provincial government of North Kivu, South Kivu recorded 1609. This increase is due to the fact that some other Burundi who lived in Bukavu and others came on board boats other than Emmanuel 2 and 3 went to the others to return home to Burundi; reveals a frame of CMD.
These refugees are delighted with this return because for them the Congolese government has refused their application for asylum in the DRC. They say they have padder religious persecution. They quote the Catholic church that would have sowed hatred in Burundi.
In addition, they still doubt whether they will be welcomed with open arms, but they call for the involvement of the Burundian authorities in their integration.

The Mayor of Beni denounces the non-assistance of the war displaced by the humanitarian


The Mayor of the city of Beni, bwanakawa Masumbuko Nyonyi denounces the non-assistance of war-displaced people of the war in several areas in the Beni region.
It has been for several weeks since several people fleeing the attacks of the ADF rebels have arrived in the city of Beni and have since received no assistance from the humanitarian organizations.
The sources on the spot once told HERE kivu that these displaced people experience an endless promiscuity in foster families, others spend their nights in churches without putting anything under their teeth.
"It is with sadness that we see that war displaced from Halungupa, Mangina, I and everywhere else who live in the city of Beni so far do not benefit from a certain assistant from the partners" regrets the Mayor of Beni ..
" We found, after having interviewed the various competent authorities, that the very identification of different households had not yet taken place says Mayor bwanakawa Masumbuko Nyonyi, who does not understand on the basis of what references the humanitarian workers who are on the ground distribute - they give them.
On the same occasion, he pleaded for the war-displaced people who have origins in the city of Beni, including the municipality of Rwenziori and I, two communes which have been the target of the rebel attacks of the ADF.

DRC army announced that it has arrested two leaders of the CODECO militia in the village of Ala Pitsi in the village of Ala Pitsi in the territory of Djugu, about 200 km from Bunia (Ituri).

The army announces that it has arrested two leaders of the CODECO militia in the village of Ala Pitsi in the village of Ala Pitsi in the territory of Djugu, about 200 km from Bunia (Ituri). The operation was carried out at three o'clock in the morning by the military of the 3201th Regiment following the information received a few days earlier and following the collaboration of the population.
One of these militiamen known as Tseni Adrionzi Raymond is presented by the Army as the driving brain of the movement led by Ngundjolo. Visé by a police search notice, he was prosecuted for an attempt to create a subversive movement in the territory of Djugu.
" He's the designer, he's the one who plans everything. He worked for a long time in armed groups. He can be seen as the thinking head of the movement ", said Lieutenant Jules Ngongo, Army spokesperson in the area.
The second one, called Kester, is also an influential member of this movement and a close collaborator of Ngudjolo.
" This one was arrested last year but escaped. He was in charge of recruitment operations ", added Lieutenant Jules Ngongo
Two computers and two phones were seized during the FARDC operation.
Another leader of this movement had been arrested two days ago in Djugu.

Tuesday, March 17, 2020

Cyber security companies are warning of the rampant spread of Cyber Corona virus!

The coronavirus pandemic has led to the intensification of internet fraud activity, with hackers picking up on the panic surrounding the virus by sending concerned users fake emails from the ‘World Health Organization’ (WHO) containing viruses that steal personal information, Kaspersky Lab, a Russian cybersecurity and anti-virus maker, has warned.
Konstantin Ignatiev, head of Kaspersky’s web content analysis division, says the company has observed an uptick in the number of spam messages and letters on the subject of coronavirus throughout the world, with numbers estimated in the thousands per day at the moment.
One of the trends picked up by Kaspersky has been the use of phishing emails. “People are receiving fake emails supposedly from the WHO with ‘security measures which must be taken to avoid infection’. As soon as the user clicks the link, he or she is redirected to the phishing site and receives an offer to share personal information which falls into the hands of the hackers,” Ignatiev explains.
Other trends the company has observed include a campaign disguising itself as a message from the World Bank or International Monetary Fund asking for donations to be sent to victims of coronavirus.
Are health agencies like the @CDCgov and
@WHO actually sending you emails asking for personal info? @Kaspersky ’s @emm_david explains. https://t.co/brbXUSbAo4
— Igor Akhmetov (@akhmetow) March 17, 2020
“To avoid fraud, users should install a security programme on their device. It will detect and block phishing attacks before they can cause harm,” says Luis Corrons, a cybersecurity specialist from Avast.
Ruslan Suleymanov, director of information technology at ESET, a Slovakian cybersecurity company, urges users to delete unexpected emails from unknown senders without a second thought, and recommends checking where a suspicious link leads by hovering over it with your mouse. “If you see a URL from one of the short URL services (is.gd, bit.ley, etc.) don’t click on it. It probably leads to a phishing resource. The same goes for emails with attachments,” he said.
Global concerns over coronavirus, which the WHO formally classified as a pandemic last week, have given rise to hacking attacks big and small. On Monday, Bloomberg reported that the US Department of Health and Human Services had suffered a major hacking attack over the weekend, with the goal apparently being to slow down its internet services. An investigation into the attack’s possible source is presently underway.
#BeAware than scammers are using the COVID-19 virus as a new way for scams.
*Do not click on links you do not know in unsolicited emails.
*Fake emails claiming to be from the CDC. Go to the verified CDC website for updates!
*Offering “cures” that do not exist yet!
#BeSmart pic.twitter.com/d49qFZzi17
— Haralson Sheriff (@HaralsonSheriff) March 16, 2020
The US National Security Council, meanwhile, has reported an upsurge in the number of fake tweets about a national quarantine or lockdown amid the outbreak, and has urged Americans not to panic.
Text message rumors of a national #quarantine are FAKE. There is no national lockdown.
@CDCgov has and will continue to post the latest guidance on #COVID19 . #coronavirus
— NSC (@WHNSC) March 16, 2020
Earlier, US cybersecurity experts warned that hackers were generating fake versions of the popular coronavirus tracking map run by Johns Hopkins University to try steal passwords and other user information.