"One of the world's most invasive software weapon distributors, called the NSO Group, has been exploiting three zero-day security vulnerabilities in order to spy on dissidents and journalists. The NSO …
Cisco Exploit Leaked in NSA Hack Modifies to Target Latest Version of Firewalls
"However, the exploit has now been expanded to 9.2.(4) after researchers from Hungary-based security consultancy SilentSignal were able to modify the code of ExtraBacon to make it work on a much newer …
NSA Targeted Chinese Firewall Maker Huawei, Leaked Documents Suggest
"When the mysterious Shadow Brokers dumped a cache of hacking tools used by an NSA-linked group last week, researchers quickly identified a number of the spy agencies’ targets, including American …
Continue Reading about NSA Targeted Chinese Firewall Maker Huawei, Leaked Documents Suggest
Iran looking to enhance cyber capabilities
"While China and Russia have built up a robust profile in cyberspace, many are warning against Iran’s growing capabilities and behavior. Iran is one of the five evolving strategic challenges facing …
Continue Reading about Iran looking to enhance cyber capabilities
FBI Probing Cyber Breach of NY Times Journalists
"The FBI is investigating cyber intrusions targeting reporters of The New York Times and is looking into whether Russian intelligence agencies are responsible for the acts, a U.S. official said …
Continue Reading about FBI Probing Cyber Breach of NY Times Journalists
Turns Out You Can’t Trust Russian Hackers Anymore
"ten, in war, mistakes are made. Sometimes, in Russia’s information war against the West, mistakes are made and then published for all the world to see. That seems to be what happened when two …
Continue Reading about Turns Out You Can’t Trust Russian Hackers Anymore
Why the Internet of Things Needs Different Encryption
"The proliferation of internet-enabled devices warrants a new model for cybersecurity, according to a federal agency." Source: Why the Internet of Things Needs Different Encryption - Nextgov.com …
Continue Reading about Why the Internet of Things Needs Different Encryption
How Bitcoin helped fuel an explosion in ransomware attacks
"Secure payment system Bitcoin has many legitimate uses, but like other technologies, it's also been beneficial to cybercriminals seeking new ways to extort money." Source: How Bitcoin helped fuel an …
Continue Reading about How Bitcoin helped fuel an explosion in ransomware attacks
Computer Science Professor Gives Failing Grade to Newly Leaked NSA Hacking Tool
"Stephen Checkoway, an Assistant Professor at the Department of Computer Science at the University of Illinois at Chicago, has analyzed some of the exploit code included in the recent Equation Group …
China’s Master Plan for IT Dominance
"The Strategy reinforces official sloganeering that China must control foreign-owned ‘core technologies’ in integrated circuits, large-scale software, and core hardware components. China’s …