Thursday, March 28, 2024

WikiLeaks Founder Julian Assange Arrested at Ecuadorian Embassy in London

The Wikileaks founder Julian Assange arrested at the Ecuadorean Embassy in London after Ecuador withdrew asylum provided to him.

Julian Paul Assange is an Australian computer Hacker and the Founder &
editor-in-chief of WikiLeaks.

He also faces US federal conspiracy charges related to one of the largest ever leaks of most sensitive government secrets.

Assange aged 47 spent almost 7 years in the embassy to avoid extradition to Sweden, he has been in the Ecuadorean embassy in 2012.

Julian Assange Arrested immediately by Metropolitan Police Service (MPS) at the Embassy of Ecuador after Ecuadorian government’s withdrawal of asylum.

https://www.youtube.com/watch?v=rY6v63jMyl4

Metropolitan police said, “He has been taken into custody at a central London police station where he will remain, before being presented before Westminster Magistrates’ Court as soon as is possible.”

President of Ecuador said that “we sovereignly decided to withdraw the diplomatic asylum to Julian Assange for repeatedly violating international conventions and protocol of coexistence.”

Assange was arrested by British police as he failed to surrender in the Westminster Magistrates’ Court in August 2012, were he is under investigation of sexual assault.

He could face UK legal proceedings and possibly he could be extradited to the US for Wikileaks related allegations.

Wikileaks tweeted that, Ecuador has illegally terminated Assange political asylum in violation of international law.

Also, WikiLeaks said, “Julian Assange did not “walk out of the embassy”. The Ecuadorian ambassador invited British police into the embassy and he was immediately arrested. “

Sajid Javid, Home Secretary, added “Nearly seven years after entering the Ecuadorian embassy, I can confirm Julian Assange is now in police custody and rightly facing justice in the UK. I would like to thank Ecuador for its cooperation with the Metropolitan police for its professionalism. No one is above the law.”

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated

Also Read:

Ex-CIA Employee Charged for Leaking Powerful CIA Hacking Tools to WiKiLeaks

U.S Identified the Suspect Who Behind the major CIA Hacking Tools Leak and Provide to WikiLeaks

Website

Latest articles

GoPlus’s Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats

GoPlus Labs, the leading Web3 security infrastructure provider, has unveiled a groundbreaking report highlighting...

Wireshark 4.2.4 Released: What’s New!

Wireshark stands as the undisputed leader, offering unparalleled tools for troubleshooting, analysis, development, and...

Zoom Unveils AI-Powered All-In-One AI Work Workplace

Zoom has taken a monumental leap forward by introducing Zoom Workplace, an all-encompassing AI-powered...

iPhone Users Beware! Darcula Phishing Service Attacking Via iMessage

Phishing allows hackers to exploit human vulnerabilities and trick users into revealing sensitive information...

2 Chrome Zero-Days Exploited at Pwn2Own 2024: Patch Now

Google has announced a crucial update to its Chrome browser, addressing several vulnerabilities, including...

The Moon Malware Hacked 6,000 ASUS Routers in 72hours to Use for Proxy

Black Lotus Labs discovered a multi-year campaign by TheMoon malware targeting vulnerable routers and...
Guru baran
Guru baranhttps://gbhackers.com
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Mitigating Vulnerability Types & 0-day Threats

Mitigating Vulnerability & 0-day Threats

Alert Fatigue that helps no one as security teams need to triage 100s of vulnerabilities.

  • The problem of vulnerability fatigue today
  • Difference between CVSS-specific vulnerability vs risk-based vulnerability
  • Evaluating vulnerabilities based on the business impact/risk
  • Automation to reduce alert fatigue and enhance security posture significantly

Related Articles