Security Experts:

long dotted


The U.S. Justice Department on charged seven Russian intelligence officers with hacking anti-doping agencies and other organizations hours after Western officials leveled new accusations against Moscow's secretive GRU military spy agency. [Read More]
UK and Australia officially blame Russia, specifically its GRU military intelligence service, for the Bad Rabbit ransomware attack and operations targeting WADA, DNC and a TV station in the UK [Read More]
Many of North Korea’s financially motivated attacks, including some previously attributed to Lazarus, have been linked by FireEye to a group named APT38 [Read More]
The United States is expected to make its offensive cyber warfare capabilities available to NATO, officials said, as the alliance seeks to strengthen its defenses against Russian electronic attacks. [Read More]
North Korea’s nuclear and missile tests have stopped, but its hacking operations to gather intelligence and raise funds for the sanction-strapped government in Pyongyang may be gathering steam [Read More]
Senate Homeland Security and Governmental Affairs Committee votes to approve several cybersecurity bills, including for incident response, a diagnostics and mitigation program, cyber workforce rotation, supply chain security, and safeguarding federal information systems [Read More]
The discovery of new VPNFilter modules answers most unanswered questions about the malware itself, but researchers haven’t figured out what the threat actor plans on doing next [Read More]
A former National Security Agency hacker whose leak of extremely top secret online spying materials led to the US government ban on Kaspersky software was sentenced to 66 months in prison. [Read More]
The United States is taking off the gloves in the growing, shadowy cyber war waged with China, Russia and other rivals, National Security Advisor John Bolton said. [Read More]
U.S. Department of Defense releases new cyber strategy, which supersedes the 2015 strategy, and the focus is on Russia and China [Read More]

FEATURES, INSIGHTS // Cyberwarfare

rss icon

Oliver Rochford's picture
All warfare is based on deception. There is sufficient evidence to prove that China utilizes cyber-espionage, but are cyber attacks being overly attributed to China?
Oliver Rochford's picture
We have an entire commercial class of security professional, but very few hackers. Where are our cyberwarriors? Where will they be when we really need them? With us, or against us?
Alan Wlasuk's picture
The world’s expectations of breach-proof SSL certification agencies have been shattered. As expected all of the ruling bodies that control the Internet have rallied to identify the root causes of these breaches and are working on future preventable mechanisms.
Idan Aharoni's picture
The worlds of counter terrorism and fraud prevention should increase their ties. Systems that are already implemented in one world may be applied to the other. Solution providers and policy makers from both worlds need to meet up and share ideas, thoughts and experience for the benefit of both.
Robert Vamosi's picture
Protecting Internet connected devices from the start and protecting them at the chip level needs to be a priority. But do we really need a full-scale cyber attack to make that so?
Alan Wlasuk's picture
Cyber Will be part of any future conflict, whether it's a nation state or terrorism, according to a long time CIA veteran. We are looking towards a time when nations will launch online attacks and extremist groups will add cyber attacks to their tactics.
Ram Mohan's picture
Soldiers more comfortable studying code on a laptop screen than staring down the sights of a rifle will play a key role in future battles. The weapons stockpiles of the future will include stashes of zero-day vulnerabilities, botnets, control codes and sophisticated malware.
Mike Lennon's picture
Many experts believe the incident was a state-sponsored attack connected to foreign governments, and though the IMF has been quiet on the issue, if this is the case, it’s likely that the attacker is an IMF member.
Irida Xheneti's picture
The risks are real, and growing more complex by the month. That doesn't mean you're powerless to keep your infrastructure and data secure.
Noa Bar-Yosef's picture
Governments around the globe are adopting very different approaches to how citizens can engage online. Sometimes it has proven to be a double-edged sword.