Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

The European Parliament website was hit by a cyberattack claimed by pro-Russian hackers shortly after lawmakers approved a resolution calling Moscow a "state sponsor of terrorism". [Read More]
Security researchers at Proofpoint call attention to the discovery of a commercial red-teaming attack tool called Nighthawk, warning that the command-and-control framework is likely to be abused by threat actors. [Read More]
Facebook parent Meta says the US military was behind tens of recently removed accounts, pages and groups that were part of an influence operation. [Read More]
Microsoft has warned organizations about the risks associated with Boa, a discontinued web server, after hackers exploited it in attacks aimed at a power grid. [Read More]
A critical vulnerability affecting Omron products has been exploited by a sophisticated piece of malware designed to target industrial control systems (ICS). [Read More]
Bishop Fox has raised more than $154 million in lifetime funding to build and market technology for continuous attack surface management. [Read More]
Chinese state-sponsored threat actor Billbug has been observed targeting a certificate authority and defense and government entities in Asia. [Read More]
The European Union unveiled new proposals to help its armies move faster in times of conflict and to boost cyber security, saying that Russia’s war on Ukraine is a wake-up call to bolster Europe’s defenses. [Read More]
Microsoft has attributed the recent Prestige ransomware attacks in Ukraine to Russian state-sponsored threat actor Iridium. [Read More]
While analyzing Russian cyberespionage group APT29’s LDAP queries to Active Directory, Mandiant identified a vulnerability in the credential roaming functionality in Windows. [Read More]

FEATURES, INSIGHTS // Cyberwarfare

rss icon

Galina Antova's picture
There are seven immediate steps you can take to put your organization on the path toward better situational awareness and risk reduction to protect critical infrastructure.
Landon Winkelvoss's picture
In the event of Russian cyberwarfare, reviewing the industries, styles, and objectives of their attacks can help organizations to prepare and implement more robust defenses.
Idan Aharoni's picture
Plausible deniability provides a massive operational leeway to military operations in cyberspace, enabling governments to take actions without risking an all-out war.
Gunter Ollmann's picture
While global corporations have been targeted by Iran-linked threat actors, the escalating tensions in recent weeks will inevitably bring more repercussions as tools and tactics change with new strategic goals.
Justin Fier's picture
Against the ongoing backdrop of cyber conflict between nation states and escalating warnings from the Department of Homeland Security, critical infrastructure is becoming a central target for threat actors.
Galina Antova's picture
We must recognize industrial cyberattacks as tactics in a new form of “economic warfare” being waged between nation-states to gain economic and political advantage without having to pay the price of open combat.
Oliver Rochford's picture
The lifting of certain sanctions may provide an alternative incentive to limit certain types of cyberwar activity.
Josh Lefkowitz's picture
It’s critical to recognize that there will always be virtual ways in which terrorists and other criminals can create threats that no border process or physical security program can stop.
Ryan Naraine's picture
Thomas Rid, Professor in the Department of War Studies at King’s College London, joins the podcast to discuss the lack of nuance in the crypto debate and the future of global cyber conflict.
James McFarlin's picture
If there were any lingering doubts that cybersecurity is a geopolitical issue with global implications, such opinions were cast on the rocks by discussions this past week at the 2015 World Economic Forum in Davos, Switzerland.