Security Experts:

long dotted


Hackers protest election-related cyberattacks by hijacking many Cisco switches in Iran and Russia - but do the attacks involve the recently disclosed CVE-2018-0171 vulnerability? [Read More]
The recently discovered KevDroid Android backdoor is tied to the North Korean hacking group APT37, Palo Alto Networks researchers have discovered. [Read More]
Cisco advises organizations to patch and secure switches to protect them against attacks abusing the Smart Install protocol. Hundreds of thousands of systems exposed and critical infrastructure is at risk [Read More]
Organizations are getting better at discovering breaches internally, with the detection time dropping to 57.5 days in 2017 from 80 days in 2016, according to FireEye’s Mandiant [Read More]
Several natural gas pipeline operators in the United States affected by a cyberattack that hit a communications system provided by a third party [Read More]
The Pentagon is investing in a new generation of satellites that will provide the military with better accuracy and have better anti-jamming capabilities. [Read More]
The United States imposed sanctions on Friday on 10 Iranians and an Iranian company for alleged hacking of hundreds of universities in the US and abroad and the theft of "valuable intellectual property and data." [Read More]
Slingshot, the cyber espionage campaign recently exposed by Kaspersky, is a US government operation targeting terrorists, according to a report [Read More]
US efforts to conduct offensive and defensive operations in cyberspace are falling short, General John Hyten, who leads US Strategic Command (STRATCOM), said. [Read More]
Russia-linked cyberspy group Dragonfly compromised a Cisco router and abused it to harvest credentials later used to hack energy companies in the UK [Read More]

FEATURES, INSIGHTS // Cyberwarfare

rss icon

Oliver Rochford's picture
We have an entire commercial class of security professional, but very few hackers. Where are our cyberwarriors? Where will they be when we really need them? With us, or against us?
Alan Wlasuk's picture
The world’s expectations of breach-proof SSL certification agencies have been shattered. As expected all of the ruling bodies that control the Internet have rallied to identify the root causes of these breaches and are working on future preventable mechanisms.
Idan Aharoni's picture
The worlds of counter terrorism and fraud prevention should increase their ties. Systems that are already implemented in one world may be applied to the other. Solution providers and policy makers from both worlds need to meet up and share ideas, thoughts and experience for the benefit of both.
Robert Vamosi's picture
Protecting Internet connected devices from the start and protecting them at the chip level needs to be a priority. But do we really need a full-scale cyber attack to make that so?
Alan Wlasuk's picture
Cyber Will be part of any future conflict, whether it's a nation state or terrorism, according to a long time CIA veteran. We are looking towards a time when nations will launch online attacks and extremist groups will add cyber attacks to their tactics.
Ram Mohan's picture
Soldiers more comfortable studying code on a laptop screen than staring down the sights of a rifle will play a key role in future battles. The weapons stockpiles of the future will include stashes of zero-day vulnerabilities, botnets, control codes and sophisticated malware.
Mike Lennon's picture
Many experts believe the incident was a state-sponsored attack connected to foreign governments, and though the IMF has been quiet on the issue, if this is the case, it’s likely that the attacker is an IMF member.
Irida Xheneti's picture
The risks are real, and growing more complex by the month. That doesn't mean you're powerless to keep your infrastructure and data secure.
Noa Bar-Yosef's picture
Governments around the globe are adopting very different approaches to how citizens can engage online. Sometimes it has proven to be a double-edged sword.
Terry Cutler's picture
It appears that Canada’s Finance, Defense Research and Development departments, as well as the Treasury Board, were hacked back in February. Although confirmation is pending, the attack seems to be the work of patriot hackers, using computer servers based in China.