Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Google and Mandiant separately warn that nation-state APT actors, ransomware gangs and private mercenary exploit firms are burning through zero-days at record pace. [Read More]
Okta's CISO issues a public statement to stress that the impact from the incident was “significantly smaller than we initially scoped.” [Read More]
Thousands of participants will respond to a series of simulated cyberattacks that crippled the government, military, and critical infrastructure operations of a fictional country. [Read More]
North Korean state-sponsored threat actors use trojanized Windows and macOS applications to compromise systems and move laterally within targeted environments. [Read More]
Security researchers have found fresh evidence linking a pair of mercenary Israeli hacking companies to mobile malware attacks on members of Catalan civil society. [Read More]
The FBI warns that cybercriminals have extensive knowledge of a victim's background information and use it to prove their legitimacy to the victims. [Read More]
GitHub warns that compromised OAuth user tokens were abused to download data belonging to dozens of organizations. [Read More]
North Korea's Lazarus APT group is moving beyond financial crime and into cyberespionage activities. [Read More]
The attribution was contained in a notice from the U.S. Treasury that announced sanctions against the Ethereum address that received the stolen funds. [Read More]
Venture capital firm Insight Partners leads a Series B funding round for DoControl. [Read More]

FEATURES, INSIGHTS // Cyberwarfare

rss icon

Oliver Rochford's picture
It remains to be seen how the big powers will come to agree on the precise rules to govern cyber operations – currently the international legal status is uncertain, but the little players had better concentrate on improving old and developing new defensive measures.
Oliver Rochford's picture
Cyberwar, at least the type where infrastructure or actual lives are targeted and destroyed, will not just happen for the fun of it. There are consequences to any such activity, as recent policy activity and policy makers make clear.
Oliver Rochford's picture
It is because of the ambiguities and problems of definition and categorization that an International Agreement on acceptable and agreed cyber operations is the wisest and safest course of action.
Oliver Rochford's picture
One of the main criticisms that opponents of the Cyberwar Meme raise, is that much of the reporting on the subject is sensationalist, or worse, war- or fear-mongering. Aside from the implication that anyone warning about the dangers of cyberwarfare is accused of having ulterior motives, it also implies that there is no real danger.
Matthew Stern's picture
How do reconnaissance and surveillance relate to cyber space? In traditional warfare they are key to finding the enemy or to confirm or deny their course of action. These capabilities are also essential in cyber space.
Oliver Rochford's picture
All warfare is based on deception. There is sufficient evidence to prove that China utilizes cyber-espionage, but are cyber attacks being overly attributed to China?
Oliver Rochford's picture
We have an entire commercial class of security professional, but very few hackers. Where are our cyberwarriors? Where will they be when we really need them? With us, or against us?
Alan Wlasuk's picture
The world’s expectations of breach-proof SSL certification agencies have been shattered. As expected all of the ruling bodies that control the Internet have rallied to identify the root causes of these breaches and are working on future preventable mechanisms.
Idan Aharoni's picture
The worlds of counter terrorism and fraud prevention should increase their ties. Systems that are already implemented in one world may be applied to the other. Solution providers and policy makers from both worlds need to meet up and share ideas, thoughts and experience for the benefit of both.
Robert Vamosi's picture
Protecting Internet connected devices from the start and protecting them at the chip level needs to be a priority. But do we really need a full-scale cyber attack to make that so?