Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

US efforts to conduct offensive and defensive operations in cyberspace are falling short, General John Hyten, who leads US Strategic Command (STRATCOM), said. [Read More]
Russia-linked cyberspy group Dragonfly compromised a Cisco router and abused it to harvest credentials later used to hack energy companies in the UK [Read More]
Russia-linked threat group Sofacy spotted targeting a European government agency just as the U.S. accused the Kremlin of launching attacks on critical infrastructure [Read More]
Donald Trump's administration on Thursday levied sanctions against Russia's top spy agencies and more than a dozen individuals for trying to influence the 2016 US presidential election and conducting separate cyberattacks. [Read More]
US President Donald Trump blocked an unsolicited bid by Singapore-based Broadcom to take over smartphone chipmaker Qualcomm, citing credible evidence such a deal "threatens to impair the national security of the United States." [Read More]
A China-linked cyber espionage group used new backdoors in an attack aimed at a company that provides services to the UK government [Read More]
Attacks carried out by the Russian group Sofacy (Fancy Bear/APT28) overlap with campaigns conducted by Turla and actors linked to China and the U.S. [Read More]
Slingshot is a sophisticated cyber espionage campaign that targets entities in the Middle East and Africa via routers, and the group behind the operation apparently speaks English [Read More]
Investigation into the September 2017 CCleaner incident reveals what appears to be a stage 3 payload that attackers supposedly intended to deliver to infected users [Read More]
The hackers behind the recent Olympic Destroyer attack planted sophisticated false flags inside their malware in an effort to confuse investigators [Read More]

FEATURES, INSIGHTS // Cyberwarfare

rss icon

Eric Knapp's picture
Enemy infrastructure is and always has been an important military target. The difference is that with increasingly automated and connected infrastructure, the ability for an enemy to target these systems digitally has increased, putting these systems at greater risk.
Mark Hatton's picture
I believe that no other nation can match the capabilities of the United States military, but at the same time, matching the level of resources and investment in cyber being made by nation states such as China could prove impossible.
Danelle Au's picture
The building blocks for a robust cybersecurity strategy are not uniquely different from security requirements for a traditional enterprise...
Oliver Rochford's picture
When the Chinese government states that it is not behind most of these attacks – it is possibly telling the truth. That the Chinese government has offensive cyber capabilities are not disputed. What is not a given is that all of this activity has been officially prompted or sanctioned.
Oliver Rochford's picture
It remains to be seen how the big powers will come to agree on the precise rules to govern cyber operations – currently the international legal status is uncertain, but the little players had better concentrate on improving old and developing new defensive measures.
Oliver Rochford's picture
Cyberwar, at least the type where infrastructure or actual lives are targeted and destroyed, will not just happen for the fun of it. There are consequences to any such activity, as recent policy activity and policy makers make clear.
Oliver Rochford's picture
It is because of the ambiguities and problems of definition and categorization that an International Agreement on acceptable and agreed cyber operations is the wisest and safest course of action.
Oliver Rochford's picture
One of the main criticisms that opponents of the Cyberwar Meme raise, is that much of the reporting on the subject is sensationalist, or worse, war- or fear-mongering. Aside from the implication that anyone warning about the dangers of cyberwarfare is accused of having ulterior motives, it also implies that there is no real danger.
Matthew Stern's picture
How do reconnaissance and surveillance relate to cyber space? In traditional warfare they are key to finding the enemy or to confirm or deny their course of action. These capabilities are also essential in cyber space.
Oliver Rochford's picture
All warfare is based on deception. There is sufficient evidence to prove that China utilizes cyber-espionage, but are cyber attacks being overly attributed to China?