fbpx

WikiLeaks Under Cyber Attack Due to Recent Failed Turkish Military Coup

On Monday July 18th, WikiLeaks tweeted about that they are going through a sustained attack on their infrastructure. All this start happening has after they announced to release a trove of documents detailing the Turkey’s political power structure.

WikiLeaks is best known for its release of classified government and military documents. Earlier on Monday it said that they are preparing to release 300,000 emails and 500,000 documents related to the failed coup operation in Turkey.
According to WikiLeaks, they suggest that the Turkish government is behind the attack on their organization. Furthermore, they said “We are unsure of the true origin of the attack. The timing suggests a Turkish state power faction or its allies”. In a subsequent tweet “We will prevail & publish”.
During the attempted coup in Turkey, it has been reported that Facebook, Twitter, YouTube was blocked. But many residents appear to have gotten around the blocks, posting messages and videos, likely using VPNs or other anonymizing services.
Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

What Makes ICS/OT Infrastructure Vulnerable?

Infrastructure security for operational technologies (OT) and industrial control systems (ICS) varies from IT security in several ways, with the inverse confidentiality, integrity, and...

Everything You Must Know About IT/OT Convergence

What is an Operational Technology (OT)? Operational technology (OT) is a technology that primarily monitors and controls physical operations. It can automate and control machines,...

Understand the OT Security and Its Importance

This article discusses OT security and why it is essential for protecting industrial systems from cyberattacks. We will also discuss common control objectives that can...

What is Deepfake, and how does it Affect Cybersecurity?

Producing deepfake is easy. It is hard to detect. They operate with a description of reality rather than reality itself (e.g., a video). Any...