Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

srael's Mossad spy agency is starting a fund to invest in technology firms creating products that could assist its work, including those involving robotics and encryption, the prime minister's office said Tuesday. [Read More]
The CIA had top-level intelligence last August that Russian President Vladimir Putin personally ordered an operation to help Donald Trump win the US presidential race, the Washington Post reported Friday. [Read More]
Hackers sponsored by the Russian government targeted election-related networks in 21 U.S. states, says the DHS [Read More]
Arbor Networks used IP addresses provided by US-CERT to analyze North Korea’s Hidden Cobra DDoS attacks [Read More]
Canada's electronic eavesdropping agency warned Friday that hackers and foreign states may try to sway its elections in 2019, after hacktivists tried but failed to influence the 2015 ballot that brought Justin Trudeau's Liberals to power. [Read More]
Industry professionals comment on the CrashOverride/Industroyer malware used in the December 2016 Ukraine power grid attack [Read More]
Researchers spotted a new cyber espionage campaign involving Kasperagent malware. Targets unclear, but Palestine-themed documents used as decoy [Read More]
Flashpoint's mid-year Business Risk Intelligence Report analyzes data from geopolitics and the deep and dark web to show how threat actors and their motivations have evolved over the first six months of 2017. [Read More]
US-CERT has issued an alert to warn organizations of North Korea’s Hidden Cobra activity, particularly one of its DDoS botnets [Read More]
Several flaws at risk of being exploited, including ones disclosed by Shadow Brokers, have been patched by Microsoft in Windows XP and other older versions of the OS [Read More]

FEATURES, INSIGHTS // Cyberwarfare

rss icon

Eric Knapp's picture
Enemy infrastructure is and always has been an important military target. The difference is that with increasingly automated and connected infrastructure, the ability for an enemy to target these systems digitally has increased, putting these systems at greater risk.
Mark Hatton's picture
I believe that no other nation can match the capabilities of the United States military, but at the same time, matching the level of resources and investment in cyber being made by nation states such as China could prove impossible.
Danelle Au's picture
The building blocks for a robust cybersecurity strategy are not uniquely different from security requirements for a traditional enterprise...
Oliver Rochford's picture
When the Chinese government states that it is not behind most of these attacks – it is possibly telling the truth. That the Chinese government has offensive cyber capabilities are not disputed. What is not a given is that all of this activity has been officially prompted or sanctioned.
Oliver Rochford's picture
It remains to be seen how the big powers will come to agree on the precise rules to govern cyber operations – currently the international legal status is uncertain, but the little players had better concentrate on improving old and developing new defensive measures.
Oliver Rochford's picture
Cyberwar, at least the type where infrastructure or actual lives are targeted and destroyed, will not just happen for the fun of it. There are consequences to any such activity, as recent policy activity and policy makers make clear.
Oliver Rochford's picture
It is because of the ambiguities and problems of definition and categorization that an International Agreement on acceptable and agreed cyber operations is the wisest and safest course of action.
Oliver Rochford's picture
One of the main criticisms that opponents of the Cyberwar Meme raise, is that much of the reporting on the subject is sensationalist, or worse, war- or fear-mongering. Aside from the implication that anyone warning about the dangers of cyberwarfare is accused of having ulterior motives, it also implies that there is no real danger.
Matthew Stern's picture
How do reconnaissance and surveillance relate to cyber space? In traditional warfare they are key to finding the enemy or to confirm or deny their course of action. These capabilities are also essential in cyber space.
Oliver Rochford's picture
All warfare is based on deception. There is sufficient evidence to prove that China utilizes cyber-espionage, but are cyber attacks being overly attributed to China?