Thursday, March 28, 2024

WikiLeaks Founder Julian Assange Arrested at Ecuadorian Embassy in London

The Wikileaks founder Julian Assange arrested at the Ecuadorean Embassy in London after Ecuador withdrew asylum provided to him.

Julian Paul Assange is an Australian computer Hacker and the Founder &
editor-in-chief of WikiLeaks.

He also faces US federal conspiracy charges related to one of the largest ever leaks of most sensitive government secrets.

Assange aged 47 spent almost 7 years in the embassy to avoid extradition to Sweden, he has been in the Ecuadorean embassy in 2012.

Julian Assange Arrested immediately by Metropolitan Police Service (MPS) at the Embassy of Ecuador after Ecuadorian government’s withdrawal of asylum.

https://www.youtube.com/watch?v=rY6v63jMyl4

Metropolitan police said, “He has been taken into custody at a central London police station where he will remain, before being presented before Westminster Magistrates’ Court as soon as is possible.”

President of Ecuador said that “we sovereignly decided to withdraw the diplomatic asylum to Julian Assange for repeatedly violating international conventions and protocol of coexistence.”

Assange was arrested by British police as he failed to surrender in the Westminster Magistrates’ Court in August 2012, were he is under investigation of sexual assault.

He could face UK legal proceedings and possibly he could be extradited to the US for Wikileaks related allegations.

Wikileaks tweeted that, Ecuador has illegally terminated Assange political asylum in violation of international law.

Also, WikiLeaks said, “Julian Assange did not “walk out of the embassy”. The Ecuadorian ambassador invited British police into the embassy and he was immediately arrested. “

Sajid Javid, Home Secretary, added “Nearly seven years after entering the Ecuadorian embassy, I can confirm Julian Assange is now in police custody and rightly facing justice in the UK. I would like to thank Ecuador for its cooperation with the Metropolitan police for its professionalism. No one is above the law.”

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated

Also Read:

Ex-CIA Employee Charged for Leaking Powerful CIA Hacking Tools to WiKiLeaks

U.S Identified the Suspect Who Behind the major CIA Hacking Tools Leak and Provide to WikiLeaks

Website

Latest articles

Hackers Actively Exploiting Ray AI Framework Flaw to Hack Thousands of Servers

A critical vulnerability in Ray, an open-source AI framework that is widely utilized across...

Chinese Hackers Attacking Southeast Asian Nations With Malware Packages

Cybersecurity researchers at Unit 42 have uncovered a sophisticated cyberespionage campaign orchestrated by two...

CISA Warns of Hackers Exploiting Microsoft SharePoint Server Vulnerability

Cybersecurity and Infrastructure Security Agency (CISA) has warned about a critical vulnerability in Microsoft...

Microsoft Expands Edge Bounty Program to Include WebView2!

Microsoft announced that Microsoft Edge WebView2 eligibility and specific out-of-scope information are now included...

Beware of Free Android VPN Apps that Turn Your Device into Proxies

Cybersecurity experts have uncovered a cluster of Android VPN applications that covertly transform user...

ZENHAMMER – First Rowhammer Attack Impacting Zen-based AMD Platforms

Despite AMD's growing market share with Zen CPUs, Rowhammer attacks were absent due to...

Airbus to Acquire INFODAS to Strengthen its Cybersecurity Portfolio

Airbus Defence and Space plans to acquire INFODAS, a leading cybersecurity and IT solutions...
Guru baran
Guru baranhttps://gbhackers.com
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Mitigating Vulnerability Types & 0-day Threats

Mitigating Vulnerability & 0-day Threats

Alert Fatigue that helps no one as security teams need to triage 100s of vulnerabilities.

  • The problem of vulnerability fatigue today
  • Difference between CVSS-specific vulnerability vs risk-based vulnerability
  • Evaluating vulnerabilities based on the business impact/risk
  • Automation to reduce alert fatigue and enhance security posture significantly

Related Articles