Archive for the ‘Cyber War’ Category

Hacking Weapons Systems

The Cyberweapons Arms Race

Leave a Comment

FCC Boots Chinese Telecom Companies, Citing Security

he Federal Communications Commission‚Äôs (FCC) Public Safety and Homeland Security Bureau on March 12 identified five Chinese companies they said posed a threat to U.S. national security. These companies are: Huawei Technologies Co., ZTE Corp., Hytera Communications Corp., Hangzhou Hikvision Digital Technology Co. and Dahua Technology Co. The declaration, according to the FCC, is in accordance […]

Leave a Comment

India and China’s Conflict Goes Cyber

RedEcho China‚Äôs RedEcho sent a clear signal to India that, while China may engage in fisticuffs along the line of control, they were willing to escalate the low-intensity conflict into the cyber domain targeting India‚Äôs infrastructure. We talked with Recorded Future‚Äôs Insikt Group about the RedEcho activity to learn if neighboring nations, or those involved […]

Leave a Comment

Microsoft releases open-source CodeQL queries to assess Solorigate compromise

Microsoft announced the release of open-source CodeQL queries that it experts used during its investigation into the SolarWinds supply-chain attack In early 2021, the US agencies FBI, CISA, ODNI, and the NSA released a¬†joint statement¬†that blames Russia for the¬†SolarWinds¬†supply chain attack. The four agencies were part of the task force Cyber Unified Coordination Group (UCG) […]

Leave a Comment

Including Hackers in NATO Wargames

Leave a Comment

Is China the World’s Greatest Cyber Power?

While the US, Russia, Israel, and several European nations all have sophisticated cyber capabilities, one threat intelligence firm argues that China’s aggressive approach to cyber operations has made it perhaps the world’s greatest cyber power. Source: Is China the World’s Greatest Cyber Power? Is China the World’s Greatest Cyber Power? “The goal is simple: break […]

Leave a Comment

Operation In(ter)ception: Aerospace and military companies in the crosshairs of cyberspies

Aerospace and military companies in the crosshairs of CyberSpies | CyberWar ESET research uncovers attacks against several high-profile aerospace and military companies in Europe and the Middle East, with several hints suggesting a possible link to the Lazarus group. Source: Operation In(ter)ception: Aerospace and military companies in the crosshairs of cyberspies | WeLiveSecurity This blogpost […]

Leave a Comment

Elite CIA unit that developed hacking tools failed to secure its own systems, allowing massive leak, an internal report found

The publication of ‚ÄėVault 7‚Äô cyber tools by WikiLeaks marked the largest data loss in agency history, a task force concluded. The theft of top-secret computer hacking tools from the CIA in 2016 was the result of a workplace culture in which the agency‚Äôs elite computer hackers ‚Äúprioritized building cyber weapons at the expense of […]

Leave a Comment

China, Leverage, and Values

If there is a new tech cold war, it is one with shots fired over a decade ago, largely by China. The questions going forward are about both leverage and values. Source: China, Leverage, and Values 5G is a war the US is about to lose warns DoD more on Cyber War …   Jack […]

Leave a Comment

Cyber Readiness Report 2019

Cyber Readiness Report 2019 – By Hiscox

Leave a Comment

Senators want Huawei equipment removed from US power grid because of security concerns

Huawei may well be causing excitement with its foldable smartphone, the Mate X, but the company’s troubles in the US continue. The American government has already banned the use of some Huawe… Source: Senators want Huawei equipment removed from US power grid because of security concerns

Leave a Comment

Are Hackers Winning The Denial Of Service Wars?

DDoS attacks may not be the quickest route to profitability for bad actors, but given the importance of this attack technique to nation-state cyberwar adversaries, we can expect continued innovation on the part of the hackers. Enterprises cannot afford to relax their efforts to combat such attacks. Source: Are Hackers Winning The Denial Of Service […]

Leave a Comment