Category: Cyber warfare

Application security, Cyber warfare, Cyber-crime, Security

Twitter Spy Case Highlights Risks for Big Tech Platforms

November 11, 2019

Via: Security Week

The allegations of spying by former Twitter employees for Saudi Arabia underscore the risks for Silicon Valley firms holding sensitive data which make the platforms ripe for espionage. The two Saudis and one US citizen allegedly worked together to unmask […]

Cyber warfare, Cyber-crime

The Future of Cybercrime: Where Are We Headed?

September 18, 2019

Via: Security Intelligence

By 2024, the collective cost of data breaches will reach $5 trillion, according to a study by Juniper Research. The study predicted this astronomical amount will be the result of an increase in fines due, in large part, to the […]

Cyber warfare, Cyber-crime, Hacker, Threats & Malware

U.S. Sanctions North Korean Group Behind WannaCry, Sony Hacks

September 16, 2019

Via: Threat Post

The U.S. has slapped sanctions on three well-known North Korean state-sponsored hacker groups – including the group that was tied to the 2017 WannaCry ransomware attacks and the 2014 cyberattack on Sony Pictures Entertainment. The three that were sanctioned are […]

Cyber warfare, Cyber-crime, Malware

US Puts Sanctions on N.Korea Hacking Groups Behind Major Thefts

September 13, 2019

Via: Security Week

The Treasury said the three groups — dubbed Lazarus Group, Bluenoroff and Andariel — were behind major thefts from financial institutions and cryptocurrency exchanges, as well as the 2018 WannaCry hack that crippled Britain’s National Health Service. All three are […]

Cyber warfare, Cyber-crime, Network security, Security

Cyber risk assessment of U.S. election commissions finds critical areas for improvement

September 13, 2019

Via: Help Net Security

Many election commissions are focused on quickly adapting and updating their cybersecurity; however, commissions still need to dedicate resources to updating outdated operating systems and protecting their email domains from being spoofed, according to NormShield. The report, which examined more […]

Cyber warfare

US cyberattack temporarily paralyzed the ability of Iran to target oil tankers in the Gulf

September 2, 2019

Via: Security Affairs

The New York Times revealed that the US carried out a cyberattack in June on a database used by Iran’s Islamic Revolutionary Guard Corps to plot attacks on oil tankers in the Gulf. “A secret cyberattack against Iran in June […]

Cyber warfare, Cyber-crime, Mobile, Privacy protection

Chinese Border Patrol Installs High Tech Surveillance on Travelers’ Phones

July 5, 2019

Via: Hot for Security

China’s border patrol has reportedly been installing surveillance software on border crossers’ phones without their knowledge, according to an investigation by the Guardian, The New York Times and Süddeutsche Zeitung. The software, the investigation claims, tracks travelers’ movement and secretly […]

Cyber warfare, Cyber-crime

Chinese Cyber-Spies Target Government Organizations in Middle East

May 29, 2019

Via: Security Week

Also tracked as APT27, TG-3390, Bronze Union, and Lucky Mouse, the threat group has been active since at least 2010, targeting hundreds of organizations worldwide, including U.S. defense contractors, financial services firms, a European drone maker, and a national data […]

Cyber warfare, Cyber-crime, Hacker, Threats & Malware

Rubio says hackers penetrated Florida elections systems

April 29, 2019

Via: The Hill

Sen. Marco Rubio (R-Fla.) told The New York Times on Friday that hackers penetrated a Florida county’s elections system in 2016. Rubio’s comments come a week after special counsel Robert Mueller’s report revealed that Russians sent malicious software to Florida […]

Cyber warfare, Network security

The impact of cyber-enabled economic warfare escalation

February 6, 2019

Via: Help Net Security

The results of a tabletop exercise on cyber-enabled economic warfare find that when a large-scale destructive cyberattack occurs, the United States and the private sector must already have in place the resources and methods to share information in order to […]