22 Jun 2018

Olympic hackers now targetting biochem attack prevention infrastructure

According to researchers at Kaspersky, the hackers behind the Pyeongchang Olympics attacks have started to target organizations working to protect and respond to biological and chemical attacks. Researchers cite similar tactics and markers connecting these attacks to the Olympic Destroyer group. Targets are primarily people connected to Spiez Convergence, an

Read More
22 Jun 2018

NSA moves its data to the “Intelligence Community GovCloud”

As part of a multi-year transition into a “big data fusion environment,” the NSA has successfully moved most of its data into the classified cloud computing system the “Intelligence Community GovCloud.” This new system allows analysts to access intel across sources, as well as employ machine learning and algorithms. The

Read More
22 Jun 2018

Army embedding cyber planners in each brigade

Cyber and Electromagnetic Activities (CEMA) cells are being inserted into brigades to provide cyber support and capabilities in roles that have been compared to those of artillery planners. The cells could allow a commander to target local ISPs and routers to prevent their use by enemy forces. They could also

Read More
20 Jun 2018

Securing the Federal Cybersecurity Supply Chain

A new bipartisan bill would require federal agencies to conduct more extensive and thorough background checks on contractors’ and suppliers’ cyber security supply chains. The current system is described as “extremely complex,” but “ill-equipped” to deal with twice and three-times removed security risks like those in the recent Kaspersky and

Read More
20 Jun 2018

Chinese hackers breach satellite, defense companies

Security researchers at Symantec identified a major breach of satellite operators, defense contractors, and telecoms in the U.S. and southeast Asia by Chinese hackers. Symantec reported that the hack was likely driven by national espionage efforts working to intercept military and civilian communications. The hacks had the capabilities of changing

Read More
19 Jun 2018

China’s Belt and Road extends to space, too

China’s Belt-and-Road-Initiative (BRI) is a multi-trillion dollars investment in the infrastructure of Asia, Africa, and Europe, including oceans. Currently including around 70 countries, the project has begun reaching into space, as high tech satellites have begun to accompany infrastructure development projects in many countries. As a part of the BRI,

Read More
18 Jun 2018

Justice Dept report details ‘micro-jamming’ technology

A new Justice Department report has issued details on a “micro-jamming” technology capable of disabling a cell-phone within a 20-foot radius. These capabilities are “a step forward countering the security threat posed by contraband cellphones” in jail, according to one Department of Justice representative. Difficulties with previous jamming technologies were,

Read More
15 Jun 2018

Smart lock hackable ‘in seconds’

A new “smart lock” padlock advertised as the “world’s first smart fingerprint padlock” was hacked in under 45 minutes by researches from Pen Test Partners (PTP). Once the flaw was identified, the team was able to unlock any of the locks using a smartphone in less than 2 seconds. In

Read More
14 Jun 2018

Political Sites Hacked Leading into Mexican Election

A major opposition party’s website was hacked on Tuesday after it published documents criticizing the leading party candidate. The cyber attack took place during a televised debate. No attribution has been provided, but several experts note that even if Russia isn’t behind this particular attack, they have established precedent for

Read More
14 Jun 2018

Pentagon suspends purchase and use of commercial drones, citing cybersecurity

The Pentagon has, once again, suspended the purchase and use of commercial drones ‘in order to develop a strategy that assesses and mitigates potential cyber risks of their use.’ The memo also underscored the sufficiency of operations without such commercially-produced drones, writing that ‘military services and combatant commands continue to

Read More