-
Cyberspace: The New Battleground in Modern-Day Warfare
Twenty-first century battles are now being fought digitally, as well as with missiles on land, sea and air. Bolstering cybersecurity is thus becoming ever more important as nation states wage war in new and complex arenas.
-
-
Computer Security Researchers Aim to Prevent Tech Abuse
Tech abuse often exists within a larger web of harm. Assailants can abuse their victims through tech including spyware, also known as stalkerware, and through inappropriate use of location-tracking features in phones and other devices. They harass their former partners on social media, hack into email accounts, and more. Researchers have created a new approach to helping survivors of domestic abuse stop assailants from hacking into their devices and social media to surveil, harass and hurt them.
-
-
Hacker Underground | Belarus to Join the Fight | Western Arms, and more
Vladimir Putin accused of war crimes, while Belarus’s military is ready to join the war on Russia’s side. Ukraine hackers vow to stop Russia, as fears grow the Russia’s likely cyber attack on Ukraine will spill over into other countries.
-
-
Why Putin’s War with Ukraine Is a Miscalculation
Putin’s invasion of Ukraine is a geopolitical earthquake that will cause repercussions far beyond Europe. But the Russian president might be planting the seeds for the demise of his regime by overreaching.
-
-
Wide Range of Possible Targets for Russian Cyberstrikes, from Infrastructure to Smartphones
For years prior to Russia’s invasion of Ukraine, Vladimir Putin’s government waged cyberwar aimed at destabilizing the country’s infrastructure, government, and financial systems, including several distributed-denial-of-service (DDoS) attacks in the run-up to this week’s assault. What are Russia’s cyberwarfare capabilities, and what would a cyberattack against the U.S. look like?
-
-
The U.S. Digital Security Challenges: Q&A with Frederic Lemieux
The U.S. is facing many digital challenges: Ransomware attacks; critical infrastructure vulnerability; exploitation of flaws in widely used software packages such as SolarWinds; potential Russian cyberattacks resulting from the Ukraine crisis; shortage of cybersecurity talent which leaves many government and private sector positions vacant; and many more. HSNW talked with Georgetown’s Professor Frederic Lemieux, a recognized expert in the fields of global threats and homeland security.
-
-
A Security Technique Fools Would-Be Cyber Attackers
Multiple programs running on the same computer may not be able to directly access each other’s hidden information, but because they share the same memory hardware, their secrets could be stolen by a malicious program through a “memory timing side-channel attack.” Researchers demonstrate a method that safeguards a computer program’s secret information while enabling faster computation.
-
-
How AI Is Shaping the Cybersecurity Arms Race
The average business receives 10,000 alerts every day from the various software tools it uses to monitor for intruders, malware and other threats. Dealing with this avalanche of alerts is achallenge which underscores the need for better ways to stem the tide of cyber-breaches.
-
-
What to Expect with Cyber Surprise
The cyber domain has three critical characteristics which differentiate it from the kinetic domain: it is connected across the globe; it is pervasive in the economic life-blood of the world; and it is asymmetric in its ability to enable power projection. What, then, can we expect from a strategic surprise which we expect Russia to launch as part of its campaign in Ukraine? “We are about to see what war in the cyber era really looks like and, truthfully, nobody can tell you what will happen next,” Paul Rosenzweig writes.
-
-
There Is No Cyber “Shock and Awe”: Plausible Threats in the Ukraine Conflict
People are talking about cyberwar again. Claims are made that any Russian military action in Ukraine will be preceded, accompanied by, and followed by devastating cyberattacks aimed at Ukraine and countries assisting Ukraine. Lennart Maschmeyer and Nadita Kostyuk write that “Cyber operations are not strategically irrelevant, nor are surprise cyber strikes of strategic relevance impossible. Rather, in assessing their threat we should distinguish what is possible in theory from what is feasible, and thus probable, in practice.”
-
-
New Cybersecurity Advisory: Protecting Cleared Defense Contractor Networks Against Russian Hackers
Over the last two years, CISA, FBI and NSA continue observing regular targeting of both large and small Cleared Defense Contractors and subcontractors. Agencies strongly encourage organizations to apply recommended mitigation steps to reduce risk of compromise.
-
-
Possible Russian Cyberattacks Could Reverberate Globally: U.S., Allies
The United States and its Western allies are bracing for the possibility that a Russian invasion of Ukraine would have a ripple effect in cyberspace, even if Western entities are not initially the intended target.
-
-
New Cybersecurity Advisory: Protecting Cleared Defense Contractor Networks Against Russian Hackers
Over the last two years, CISA, FBI and NSA continue observing regular targeting of both large and small Cleared Defense Contractors and subcontractors. Agencies strongly encourage organizations to apply recommended mitigation steps to reduce risk of compromise.
-
-
China Suspected of Targeting U.S. Organizations with Cyberattacks
Media giant News Corp is investigating a cyberattack that has accessed the email and documents of some of its employees and journalists. “Mandiant assesses that those behind this activity have a China nexus, and we believe they are likely involved in espionage activities to collect intelligence to benefit China’s interests,” Dave Wong, Mandiant vice president and incident responder, said.
-
-
CISA Supports Inaugural U.S. Cyber Games
CISA last week announces its founding sponsorship of the first-ever US Cyber Team, which will compete, as part of the US Cyber Games, in the International Cybersecurity Challenge (ICC) June 14-17, 2022 in Athens, Greece. “Cyber competitions are a fundamental element of developing the next generation of cybersecurity talent. Games help motivate the future workforce, and keep the current workforce sharp, maintaining a thriving community of cybersecurity professionals,” noted CISA Director Jen Easterly.
-
More headlines
The long view
Ransomware Attacks: Death Threats, Endangered Patients and Millions of Dollars in Damages
A ransomware attack on Change Healthcare, a company that processes 15 billion health care transactions annually and deals with 1 in 3 patient records in the United States, is continuing to cause massive disruptions nearly three weeks later. The incident, which started on February 21, has been called the “most significant cyberattack on the U.S. health care system” by the American Hospital Association. It is just the latest example of an increasing trend.
Chinese Government Hackers Targeted Critics of China, U.S. Businesses and Politicians
An indictment was unsealed Monday charging seven nationals of the People’s Republic of China (PRC) with conspiracy to commit computer intrusions and conspiracy to commit wire fraud for their involvement in a PRC-based hacking group that spent approximately 14 years targeting U.S. and foreign critics, businesses, and political officials in furtherance of the PRC’s economic espionage and foreign intelligence objectives.
Autonomous Vehicle Technology Vulnerable to Road Object Spoofing and Vanishing Attacks
Researchers have demonstrated the potentially hazardous vulnerabilities associated with the technology called LiDAR, or Light Detection and Ranging, many autonomous vehicles use to navigate streets, roads and highways. The researchers have shown how to use lasers to fool LiDAR into “seeing” objects that are not present and missing those that are – deficiencies that can cause unwarranted and unsafe braking or collisions.