15 Jun 2017

Russia eyes controlling soldiers’ online accounts to boost secrecy

“The Russian Defense Ministry has drawn up a draft law allowing it to ban soldiers from posting certain personal data on social networks, something that reporters and researchers have used in the past to monitor Russia’s activities in Syria and Ukraine.” Source: Russia eyes controlling soldiers’ online accounts to boost

Read More
15 Jun 2017

Cyber ‘beat cop’ needed to add context for SWAT teams

“In cyberspace, understanding the terrain is a critical component for success. When it comes to mission or weapon systems, in the experience of one combatant command official, there needs to be a beat cop performing a daily patrol to provide context to the SWAT team when an incident happens.” Source:

Read More
15 Jun 2017

Israeli spy agency to launch anonymous technology investment fund

“The Mossad, Israel’s primary intelligence agency, is preparing to launch a technology investment fund that will support Israeli-based hi-tech startups, with an eye to utilizing cutting-edge technologies in its spy operations. Israeli spy services are known internationally for their advanced use of technology in intelligence collection and special operations. But

Read More
15 Jun 2017

DHS, FBI Alert About North Korean Hacking Campaign

“It’s rare for the government to attribute cyber mischief to a nation-state. The FBI and Homeland Security Department released technical details Wednesday about a North Korean government-linked hacking group fingered in numerous cyber operations, including the historic breach at Sony Pictures Entertainment in 2015.” Source: DHS, FBI Alert About North Korean

Read More
15 Jun 2017

CIA’s Cloud is ‘Pretty Close’ to Invincible, CIO Says

“Speaking Wednesday at the AWS Public Sector Summit in Washington, D.C., Edwards gave a glimpse at unclassified advancements in how the 17 agencies of the intelligence community use the C2S cloud. Broadly, he said cloud computing at the CIA has led to improved security, upped mission impact and avoided costs

Read More
14 Jun 2017

Cybersecurity firms warn of easily modified malware that could cause power outages

“Two cybersecurity firms have uncovered malicious software that they believe caused a December 2016 Ukraine power outage, they said on Monday, warning that the malware could be easily modified to harm critical infrastructure operations around the globe.” Source: Cybersecurity firms warn of easily modified malware that could cause power outages

Read More
13 Jun 2017

Communist Party rebukes China’s internet watchdog for ‘lax’ control over cyberspace

“The stern criticism from the party’s top discipline watchdog came after officers conducted a month-long inspection of the Cyberspace Administration from early March to early April.” Source: Communist Party rebukes China’s internet watchdog for ‘lax’ control over cyberspace | South China Morning Post

Read More
12 Jun 2017

Crash Override Malware Took Down Ukraine’s Power Grid Last December

“AT MIDNIGHT, A week before last Christmas, hackers struck an electric transmission station north of the city of Kiev, blacking out a portion of the Ukrainian capital equivalent to a fifth of its total power capacity. The outage lasted about an hour—hardly a catastrophe. But now, cybersecurity researchers have found

Read More
09 Jun 2017

Estonia buoys cyber security with world′s first data embassy

“To protect itself from cyberattacks, Estonia is about to open a ‘data embassy’ outside its borders. The country’s critical infrastructure will be stored in Luxembourg, reports Isabelle de Pommereau from Tallinn.” Source: Estonia buoys cyber security with world′s first data embassy | Europe | DW | 08.06.2017

Read More
09 Jun 2017

Bill requires Pentagon to report cyber operations outside of war zones

“A bill introduced Thursday by top lawmakers on the House Armed Services Committee requires the Pentagon to notify congress about cyber operations it is waging outside war zones and the new cyber weapons it is employing.” Source: Bill requires Pentagon to report cyber operations outside of war zones

Read More