Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Major Taiwanese government websites were temporarily forced offline by cyber attacks believed to be linked to China and Russia during US House Speaker Nancy Pelosi's visit to the island. [Read More]
Austria is investigating a report that an Austrian company developed spyware targeting law firms, banks and consultancies in at least three countries. [Read More]
Cybersleuths at Microsoft discover a link between the recent ‘Raspberry Robin’ USB-based worm attacks and the notorious EvilCorp ransomware operation. [Read More]
Over the past year, North Korea-linked threat actor Kimsuky has been observed using a browser extension to steal content from victims’ webmail accounts. [Read More]
In testimony before the the US House Intelligence Committee, security pros at Google and Citizen Lab make fresh calls for a wholesale clampdown on problematic commercial spyware vendors. [Read More]
The House has passed two cybersecurity bills: the Energy Cybersecurity University Leadership Act and the RANSOMWARE Act. [Read More]
Redmond's security research teams intercept multiple zero-day attacks attributed to DSIRF, a private cyber mercenary firm operating out of Austria. [Read More]
A global study of 550 organizations finds the average cost of a data breach reaching all-time high of $4.35 million as businesses struggle with ransomware and lack of zero trust principles. [Read More]
The US government is offering a reward of up to $10 million for information on individuals associated with North Korean state-sponsored hacking groups. [Read More]
Reports say a Greek lawmaker in the European Parliament was targeted with malicious links trying to plant the Predator spyware program. [Read More]

FEATURES, INSIGHTS // Cyberwarfare

rss icon

Galina Antova's picture
There are seven immediate steps you can take to put your organization on the path toward better situational awareness and risk reduction to protect critical infrastructure.
Landon Winkelvoss's picture
In the event of Russian cyberwarfare, reviewing the industries, styles, and objectives of their attacks can help organizations to prepare and implement more robust defenses.
Idan Aharoni's picture
Plausible deniability provides a massive operational leeway to military operations in cyberspace, enabling governments to take actions without risking an all-out war.
Gunter Ollmann's picture
While global corporations have been targeted by Iran-linked threat actors, the escalating tensions in recent weeks will inevitably bring more repercussions as tools and tactics change with new strategic goals.
Justin Fier's picture
Against the ongoing backdrop of cyber conflict between nation states and escalating warnings from the Department of Homeland Security, critical infrastructure is becoming a central target for threat actors.
Galina Antova's picture
We must recognize industrial cyberattacks as tactics in a new form of “economic warfare” being waged between nation-states to gain economic and political advantage without having to pay the price of open combat.
Oliver Rochford's picture
The lifting of certain sanctions may provide an alternative incentive to limit certain types of cyberwar activity.
Josh Lefkowitz's picture
It’s critical to recognize that there will always be virtual ways in which terrorists and other criminals can create threats that no border process or physical security program can stop.
Ryan Naraine's picture
Thomas Rid, Professor in the Department of War Studies at King’s College London, joins the podcast to discuss the lack of nuance in the crypto debate and the future of global cyber conflict.
James McFarlin's picture
If there were any lingering doubts that cybersecurity is a geopolitical issue with global implications, such opinions were cast on the rocks by discussions this past week at the 2015 World Economic Forum in Davos, Switzerland.