Categories
Uncategorized

The Ever-Growing Iranian Cyber Threat (Mansour Piroti, BESA Center)

Iran cyberterrorism image by Jorgen Schaefer The Iranian regime has been a considerable threat to global cybersecurity ever since 2012, when it committed cyberattacks on US financial institutions in retaliation for the high-profile Stuxnet attack on its nuclear program. In the wake of the Stuxnet attack, the Tehran regime vastly ramped up its cyber capabilities, transforming […]

Categories
Uncategorized

What’s Working and What Isn’t in Researching Influence Operations? (Alicia Wanless, Lawfare)

All Eye Overlord by Aswin Behera. (Source: Cyber Visuals) The world first learned about Russian attempts to manipulate the information environment in 2013. Staff hired by the Internet Research Agency (IRA) posed as Americans online posting divisive comments to social media. Continued activities during the 2016 U.S. presidential election put influence operations on center stage […]

Categories
Uncategorized

The symbol and the risk (by Marco Emanuele)

After twenty years, September 11, 2001 (which we have raised as a symbol that traces a new era) still speaks to us. We look at that date with the fear due to an event that has left us stunned, speechless. That day, in fact, we all thought: how is it possible to attack the heart […]

Categories
Uncategorized

USA/Defense/Cyber – Which Systems Can Be Improved With Better UX? All Of them (Breaking Defense)

BARRY ROSENBERG writes: Visual Logic provides human-centered design consulting, better known as user experience (UX), for DoD contractors who are modernizing software applications, building advanced vehicle dashboards, mission critical consoles, and demonstrating innovative research and development concepts, to name a few. The company has extensive expertise in helping to improve usability and accelerating training for […]

Categories
Uncategorized

India/Cyber – India: A very colonial hangover (The Interpreter)

EDMOND ROY writes: In the 1830’s Lord Thomas Babington Macaulay set about drafting a piece of legislation that would outlive not just him but also the empire that gave him the license to do so. Indeed, it’s a cruel irony that Macaulay’s world view, long discredited in the former colony, has found an almost sacrosanct following within successive […]

Categories
Uncategorized

Cyber – BlackMatter ransomware group claims to be Darkside and REvil succesor (Security Affairs)

Pierluigi Paganini writes: BlackMatter ransomware gang, a new threat actor appears in the threat landscape and claims to combine TTPs of Darkside and REvil. go to Security Affairs: BlackMatter ransomware group claims to be Darkside and REvil succesorSecurity Affairs

Categories
Uncategorized

Cyber – Flaws in Zimbra could allow to takeover webmail server of a targeted organization (Security Affairs)

Pierluigi Paganini writes: Researchers discovered flaws in Zimbra email collaboration software that could allow attackers to compromise email accounts by sending a malicious email. go to Security Affairs: Flaws in Zimbra could allow to takeover webmail server of an organizationSecurity Affairs

Categories
Uncategorized

Cyber – South Africa’s logistics company Transnet SOC hit by a ransomware attack (Security Affairs)

Pierluigi Paganini writes: Transnet SOC Ltd, a large South African rail, port and pipeline company, announced it was hit by a disruptive cyber attack. go to Security Affairs: South Africa’s logistics company Transnet SOC hit by ransomware attackSecurity Affairs

Categories
Uncategorized

Cyber – DIVD discloses three new unpatched Kaseya Unitrends zero-days (Security Affairs)

Pierluigi Paganini writes: Experts found three new zero-day flaws in the Kaseya Unitrends service and warn users to avoid exposing the service to the Internet. go to Security Affairs: DIVD discloses three new unpatched Kaseya Unitrends zero-daysSecurity Affairs

Categories
Uncategorized

China/Cyber – China’s National Cybersecurity Center A Base for Military-Civil Fusion in the Cyber Domain (CSET)

by Dakota Cary CSET writes: China’s National Cybersecurity Center (NCC) resides on a 40 km2 plot in Wuhan. As one indication of its significance, the Chinese Communist Party’s highest-ranking members have an oversight committee for the facility. Over the next decade, the NCC will provide the talent, innovation, and indigenization of cyber capabilities that China’s […]

Categories
Uncategorized

USA/Cyber/Defense – US Cyber Command touts acquisition advancements (Defense News)

Mark Pomerleau writes: During a forum to present capability needs to industry, U.S. Cyber Command leaders gave their take on how the operation has improved its acquisition practices and structures over the last few years. go to Defense News: US Cyber Command touts acquisition advancements (c4isrnet.com)

Categories
Uncategorized

Cyber – Hackers flooded the Babuk ransomware gang’s forum with gay porn images (Security Affairs)

Pierluigi Paganini writes: The Babuk ransomware operators seem to have suffered a ransomware attack, threat actors flooded their forum gay orgy porn images. go to Security Affairs: Hackers flooded the Babuk ransomware gang’s forum with porn imagesSecurity Affairs