Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

As part of a campaign that started in March 2021, the threat actor targeted a telecoms company in Pakistan, as well as other organizations. [Read More]
Lithuania said it had been hit by an "intense" cyberattack, probably Russian, days after Moscow protested restrictions Vilnius imposed on the rail transit of certain goods to Kaliningrad. [Read More]
CrowdStrike researchers find evidence of ransomware actors deploying zero-day exploits against Mitel VOIP appliances sitting on the network perimeter. [Read More]
Mainly focused on intellectual property theft and cyberespionage, the state-sponsored hacking group was seen deploying a broad range of ransomware families. [Read More]
State-backed Russian hackers have engaged in “strategic espionage” against governments, think tanks, businesses and aid groups in 42 countries supporting Kyiv, Microsoft says in a new report. [Read More]
Focused on government organizations and military entities, the group is characterized by the use of two malware families: the Samurai backdoor and the Ninja trojan. [Read More]
Air raid sirens sounded in Israeli cities on Sunday and it appears they may have been triggered by hackers possibly operating out of Iran. [Read More]
Big-game malware hunters at Volexity call attention to a sophisticated Chinese APT caught recently exploiting a Sophos firewall zero-day to plant backdoors and launch man-in-the-middle attacks. [Read More]
The modular surveillanceware is likely developed by Italian vendor RCS Lab, which operates in the same market as Pegasus developer NSO Group Technologies and FinFisher creator Gamma Group. [Read More]
Microsoft is acquiring Miburo, a cyber threat analysis and research company that specializes in foreign information operations. [Read More]

FEATURES, INSIGHTS // Cyberwarfare

rss icon

Galina Antova's picture
There are seven immediate steps you can take to put your organization on the path toward better situational awareness and risk reduction to protect critical infrastructure.
Landon Winkelvoss's picture
In the event of Russian cyberwarfare, reviewing the industries, styles, and objectives of their attacks can help organizations to prepare and implement more robust defenses.
Idan Aharoni's picture
Plausible deniability provides a massive operational leeway to military operations in cyberspace, enabling governments to take actions without risking an all-out war.
Gunter Ollmann's picture
While global corporations have been targeted by Iran-linked threat actors, the escalating tensions in recent weeks will inevitably bring more repercussions as tools and tactics change with new strategic goals.
Justin Fier's picture
Against the ongoing backdrop of cyber conflict between nation states and escalating warnings from the Department of Homeland Security, critical infrastructure is becoming a central target for threat actors.
Galina Antova's picture
We must recognize industrial cyberattacks as tactics in a new form of “economic warfare” being waged between nation-states to gain economic and political advantage without having to pay the price of open combat.
Oliver Rochford's picture
The lifting of certain sanctions may provide an alternative incentive to limit certain types of cyberwar activity.
Josh Lefkowitz's picture
It’s critical to recognize that there will always be virtual ways in which terrorists and other criminals can create threats that no border process or physical security program can stop.
Ryan Naraine's picture
Thomas Rid, Professor in the Department of War Studies at King’s College London, joins the podcast to discuss the lack of nuance in the crypto debate and the future of global cyber conflict.
James McFarlin's picture
If there were any lingering doubts that cybersecurity is a geopolitical issue with global implications, such opinions were cast on the rocks by discussions this past week at the 2015 World Economic Forum in Davos, Switzerland.