22 Feb 2019

The Cyber Threat Analysis Report Volume 1, Edition 1

OODA Network Expert Michael Tanji provides insightful analysis of the most recent and significant cyber news.

Read More
22 Feb 2019

Key elements of the new National Strategy for Aviation Security

This week the Trump Administration released the new National Strategy for Aviation Security (NSAS) that replaces the previous strategy from 2007. While the 2007 document mainly focused on physical threats from terrorists, criminals and hostile countries, the new NSAS acknowledges the proliferation of “disruptive technologies” that have resulted in new

Read More
22 Feb 2019

The cybersecurity legislation agenda: 5 areas to watch

The growing cyber threat to organizations, government agencies and society at large, has made cybersecurity one of the main priorities of the 116th US Congress. During the first weeks of the new congress, 30 pieces of cybersecurity legislation have been introduced in the House of Representatives, while the Senate was introduced to

Read More
22 Feb 2019

New report questions effectiveness of cyber indictments

While recent articles discussing the Global Threat Report by CrowdStrike have mainly paid attention to the report’s ranking of how long state-backed hackers from various countries take to move laterally across the network of a compromised organization (spoiler alert: Russian hackers were fastest), certain less appreciated findings of the research actually have

Read More
22 Feb 2019

92% of organizations rank users as their primary security concern

KnowBe4 has released a new report detailing how organizations are dealing with the rising threat of cybercrime. The research shows that 95% of organizations are worried about the consequences of a potential data breach, while the top security concern of 92% of organizations is negligent users falling victim to a

Read More
22 Feb 2019

Criminal groups promising salaries averaging $360,000 per year to accomplices

Researchers with Digital Shadows estimate that cyber extortionists are ready to pay yearly salaries averaging $360,000 per year to aspiring crooks that can assist them in extorting high-value targets such as business executives, lawyers and medical experts. Accomplices with special IT related skills such as coding, network administration and penetration

Read More
22 Feb 2019

Human Negligence to Blame for the Majority of Insider Threats

Two new reports highlight the increasing difficulty of businesses to mitigate threats coming from the people within their own organization. According to research by Endera, 87% of security professionals believe that if their company suffers a security breach caused by an insider, the top suspects will be contractors and freelancers.

Read More
21 Feb 2019

NATO troops got catfished & honeypotted on social media, revealing serious vulnerabilities

NATO has carried out an internal cyber security experiment to test the extent to which its troops could be identified and influenced during an exercise by means of social media data. A report on the experiment mentioned that the researchers “identified a significant amount of people taking part in the exercise and

Read More
21 Feb 2019

White House Orders Agencies to Defend the Skies From Cyberattacks

On Tuesday, US President Trump released the National Strategy to Combat Terrorist Travel and the National Strategy for Aviation Security. While the former document aims to “[modernize] the approach of the United States to countering a complex and evolving terrorist threat,” the latter makes the defense against cyber attacks, drones and other emerging threats

Read More
21 Feb 2019

Formjacking Surpasses Ransomware and Cryptojacking as Top Threat of 2018

The latest installment of Symantec’s annual Internet Security Threat Report shows that formjacking was the number one cyber threat in 2018, replacing cryptojacking, i.e. the distribution of malware that uses the resourcing powers of infected systems in order to mine cryptocurrency. In a formjacking attack, a threat actor injects malicious JavaScript code into a

Read More