16 Jun 2017

Experts warn Congress of the return of Chinese IP theft

“Hackers working for the Chinese government again appear to be conducting economic espionage against private U.S. companies and other American organizations, experts told lawmakers Tuesday during an open Senate Committee on Foreign Relations hearing.” Source: Experts warn Congress of the return of Chinese IP theft

Read More
15 Jun 2017

Wikileaks Unveils ‘Cherry Blossom’ — CIA’s Wireless Router Hacking Framework

“WikiLeaks has published a new batch of the ongoing Vault 7 leak, this time detailing a framework – which is being used by the CIA for monitoring the Internet activity of the targeted systems by exploiting vulnerabilities in Wi-Fi devices. Dubbed ‘Cherry Blossom,’ the framework was allegedly designed by the

Read More
15 Jun 2017

Russia eyes controlling soldiers’ online accounts to boost secrecy

“The Russian Defense Ministry has drawn up a draft law allowing it to ban soldiers from posting certain personal data on social networks, something that reporters and researchers have used in the past to monitor Russia’s activities in Syria and Ukraine.” Source: Russia eyes controlling soldiers’ online accounts to boost

Read More
15 Jun 2017

Cyber ‘beat cop’ needed to add context for SWAT teams

“In cyberspace, understanding the terrain is a critical component for success. When it comes to mission or weapon systems, in the experience of one combatant command official, there needs to be a beat cop performing a daily patrol to provide context to the SWAT team when an incident happens.” Source:

Read More
15 Jun 2017

Israeli spy agency to launch anonymous technology investment fund

“The Mossad, Israel’s primary intelligence agency, is preparing to launch a technology investment fund that will support Israeli-based hi-tech startups, with an eye to utilizing cutting-edge technologies in its spy operations. Israeli spy services are known internationally for their advanced use of technology in intelligence collection and special operations. But

Read More
15 Jun 2017

DHS, FBI Alert About North Korean Hacking Campaign

“It’s rare for the government to attribute cyber mischief to a nation-state. The FBI and Homeland Security Department released technical details Wednesday about a North Korean government-linked hacking group fingered in numerous cyber operations, including the historic breach at Sony Pictures Entertainment in 2015.” Source: DHS, FBI Alert About North Korean

Read More
15 Jun 2017

CIA’s Cloud is ‘Pretty Close’ to Invincible, CIO Says

“Speaking Wednesday at the AWS Public Sector Summit in Washington, D.C., Edwards gave a glimpse at unclassified advancements in how the 17 agencies of the intelligence community use the C2S cloud. Broadly, he said cloud computing at the CIA has led to improved security, upped mission impact and avoided costs

Read More
14 Jun 2017

Cybersecurity firms warn of easily modified malware that could cause power outages

“Two cybersecurity firms have uncovered malicious software that they believe caused a December 2016 Ukraine power outage, they said on Monday, warning that the malware could be easily modified to harm critical infrastructure operations around the globe.” Source: Cybersecurity firms warn of easily modified malware that could cause power outages

Read More
13 Jun 2017

Communist Party rebukes China’s internet watchdog for ‘lax’ control over cyberspace

“The stern criticism from the party’s top discipline watchdog came after officers conducted a month-long inspection of the Cyberspace Administration from early March to early April.” Source: Communist Party rebukes China’s internet watchdog for ‘lax’ control over cyberspace | South China Morning Post

Read More
12 Jun 2017

Crash Override Malware Took Down Ukraine’s Power Grid Last December

“AT MIDNIGHT, A week before last Christmas, hackers struck an electric transmission station north of the city of Kiev, blacking out a portion of the Ukrainian capital equivalent to a fifth of its total power capacity. The outage lasted about an hour—hardly a catastrophe. But now, cybersecurity researchers have found

Read More