"In 2024, one billion people around the world will go to the polls for national elections. From the US presidential election in 2024 to the war in Ukraine, we’re entering the era of deepfake …
The City of Dallas, Over a Month After A Ransomware Attack, is Still not at Full Functionality
Amidst all the headlines and uncertainty, a story you do not want to miss is that of a major American municipality struggling to get back on its feet for an entire month after a ransomware attack in …
Is the Capability-as-a-Service Business Model the Future of the [Defense] Industrial Base?
Featured Image Source: Border Security Report Background Paul Hollingshead, Head of Europe & Africa at Anduril Industries, recently defined the Capability-as-a-Service [CaaS] business model as …
Global Crypto and Digital Currency Initiatives: El Salvador, Panama, and Ukraine
The following analysis is based on the OODA Loop 2021 Year-End Cybersecurity Review, the OODA Almanac 2022 - Exponential Disruption, and OODA CEO Matt Devost's recent post Is Bitcoin a National …
2021 Year-end Review: Federal
Summary 2021 began with an unprecedented attack on the seat of government in the United States on January 6th. In fact, the OODA Loop Daily Pulse released at 10 AM EST on the 6th had this ominous …
John Robb on the Early Internet, Frameworks to Drive Decision Making, Network Tribalism and Emerging Threats (1 of 2)
In June of 2020 and again in October 2021, Matt Devost spoke to former Air Force pilot John Robb. John has worked successfully in a variety of domains, including the special operations community, as …
Unpatched Apple Zero-Day in macOS Finder Allows Code Execution
Researchers have found an unpatched zero-day in macOS Finder that could allow for remote execution. All a user needs to do is click on an email attachment and the code is executed secretly without the …
Continue Reading about Unpatched Apple Zero-Day in macOS Finder Allows Code Execution
CISA Warns of New RAT Aimed at US Defense Contractors
The Department of Homeland Security's Cybersecurity and Infrastructure Security Agency (CISA) previously issued a malware report in which they detailed a new remote-access trojan variant used by APT …
Continue Reading about CISA Warns of New RAT Aimed at US Defense Contractors
Cyber Threat Analysis Report Vol 1, Edition 10
No Technology Can Replace Wetware A lot of malicious activity succeeds because it first exploits a human being, and then technology. This isn’t a call to burn your security tools, but a reminder that …
Continue Reading about Cyber Threat Analysis Report Vol 1, Edition 10
Cyber Threat Analysis Report Vol 1, Edition 8
Privacy for me but not for thee News of the fact that federal law enforcement is exploiting a little-known law (not envisioned for use in cases like this) to mine state driver’s license images and …
Continue Reading about Cyber Threat Analysis Report Vol 1, Edition 8