Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

The European Union on Friday condemned alleged Russian cyber attacks that have targeted Germany in the run up to this weekend's election for Chancellor Angela Merkel's successor. [Read More]
Active since at least 2019, the hacking group is mainly focused on hotels, but also targeted engineering and law firms, and international organizations. [Read More]
The Port of Houston, a critical piece of infrastructure along the Gulf Coast, issued a statement saying it had successfully defended against an attempted hack in August and “no operational data or systems were impacted.” [Read More]
Cowbell Cyber aims to fill a gap in the cyber-insurance ecosystem with products that continuously monitor customers systems to find weaknesses that can be fixed so that insurance can be offered with greater confidence. [Read More]
The company will use the investment to expand marketing and sales initiatives and accelerate product roadmap. [Read More]
An Indian media conglomerate, a police department and the agency responsible for the country’s national identification database have been hacked, likely by a state-sponsored Chinese group. [Read More]
Adversaries used malicious documents targeting the MSHTML vulnerability tracked as CVE-2021-40444 to compromise Russian state rocket center and interior ministry. [Read More]
Netgear warns that an attacker on the same network as a vulnerable device could intercept and manipulate router traffic to execute code as root. [Read More]
The iOS 15 makeover also includes patches for at least 22 documented security vulnerabilities, some serious enough to expose iPhone and iPad users to arbitrary code execution attacks. [Read More]
The Alaska health department says the cyberattack discovered earlier this year was conducted by state-sponsored hackers. [Read More]

FEATURES, INSIGHTS // Cyberwarfare

rss icon

Oliver Rochford's picture
It is because of the ambiguities and problems of definition and categorization that an International Agreement on acceptable and agreed cyber operations is the wisest and safest course of action.
Oliver Rochford's picture
One of the main criticisms that opponents of the Cyberwar Meme raise, is that much of the reporting on the subject is sensationalist, or worse, war- or fear-mongering. Aside from the implication that anyone warning about the dangers of cyberwarfare is accused of having ulterior motives, it also implies that there is no real danger.
Matthew Stern's picture
How do reconnaissance and surveillance relate to cyber space? In traditional warfare they are key to finding the enemy or to confirm or deny their course of action. These capabilities are also essential in cyber space.
Oliver Rochford's picture
All warfare is based on deception. There is sufficient evidence to prove that China utilizes cyber-espionage, but are cyber attacks being overly attributed to China?
Oliver Rochford's picture
We have an entire commercial class of security professional, but very few hackers. Where are our cyberwarriors? Where will they be when we really need them? With us, or against us?
Alan Wlasuk's picture
The world’s expectations of breach-proof SSL certification agencies have been shattered. As expected all of the ruling bodies that control the Internet have rallied to identify the root causes of these breaches and are working on future preventable mechanisms.
Idan Aharoni's picture
The worlds of counter terrorism and fraud prevention should increase their ties. Systems that are already implemented in one world may be applied to the other. Solution providers and policy makers from both worlds need to meet up and share ideas, thoughts and experience for the benefit of both.
Robert Vamosi's picture
Protecting Internet connected devices from the start and protecting them at the chip level needs to be a priority. But do we really need a full-scale cyber attack to make that so?
Alan Wlasuk's picture
Cyber Will be part of any future conflict, whether it's a nation state or terrorism, according to a long time CIA veteran. We are looking towards a time when nations will launch online attacks and extremist groups will add cyber attacks to their tactics.
Ram Mohan's picture
Soldiers more comfortable studying code on a laptop screen than staring down the sights of a rifle will play a key role in future battles. The weapons stockpiles of the future will include stashes of zero-day vulnerabilities, botnets, control codes and sophisticated malware.