Global IT Supply Chain Disruptions Should Bolster Innovation and Cybersecurity with North American Allies
Global IT supply chain disruptions (ransomware, semiconductor shortages) necessitate business leaders and policymakers to take a fresh look at the Information Communications Technology (ICT) and Cybersecurity Strategy for North America. What are the ICT innovation and investment climates in Mexico and Canada? Is ICT investment part of the solution for the creation of regional economic development initiatives in Central America? ICT and Cybersecurity “trade” agreements need to take center stage in all multilateral policy interactions in the hemisphere in the next few years. Ryan Berg from the Center for Strategic and International Studies (CSIS) has released a timely report on these issues.
Barbados cut its remaining ties with the British monarchy at midnight today after a 400-year long relationship. On Monday evening, Prince Charles spoke at a ceremony and acknowledged the atrocity of slavery as the nation officially removed Queen Elizabeth II as the head of state. Barbados inaugurated its first-ever President
According to a recent UN report, tens of millions are suffering from food shortages and hunger in Latin America and the Caribbean as the Covid-19 pandemic intensifies a regional malnutrition crisis to its worst levels in decades. In just one year, the number of people living with hunger in the
Attackers are impersonating the Iranian government in the latest SMS malware campaign against Iranian residents. The attackers are using socially engineered messages to compromise devices, seeking bank credentials. The campaign targets Android users by installing bank information-stealing malware that can exfiltrate credit card data and siphon money from financial accounts.
On Monday, Kaspersky released a report detailing its latest findings pertaining to a threat actor tracked as WIRTE. Kaspersky stated that the group has been attacking Middle Eastern governments since at least 2019, leveraging malicious Excel 4.0 macros and other tactics. Kaspersky found that the group planted Microsoft Excel droppers
Meta has been working to take down adversarial networks across the world that were operating on Facebook and engaging in behavior such as spreading false information, harassment, and attempting to have legitimate information taken down. Meta stated that the groups violated rules set forth in its Coordinated Inauthentic Behavior policies
Security researchers at Doctor Web have discovered dozens of malicious games hiding in AppGallery responsible for infecting victims with a new variant of the Cynos malware. Cynos has been affecting Android users for seven years and is concealed in everything from adult content apps to harmless-looking virtual pet games. Doctor
Iran-Israel Cyber Conflict Shows Leadership Needed to Curb Critical and Civilian Infrastructure Targeting
Over the course of several months, Israel is suspected of perpetrating several attacks that have disrupted key services in Iran. Not one to play victim, Iran has been retaliating in its own way, targeting Israeli targets as well. While the two countries have engaged one another covertly in most domains (air, land, sea, and cyberspace), for the past year both have appeared to move away from traditional symbols of state power such as military sites, individuals of interest, or government facilities, to civilian infrastructure. The intent of these attacks is quite clear: to inflict pain on the civilian communities in their respective countries in a show that neither government can protect them.
NIST Cybersecurity Framework Gains Private Sector Traction and Other Noteworthy Cyber Efforts from the Institute
In our recent OODA Loop Stratigame – Scenario Planning for Global Computer Chip Supply Chain Disruption – in all four scenarios we determined that public-private partnership in the cybersecurity marketplace, including the establishment of industry-wide frameworks and standards, will be crucial. Organizations like the National Institute of Standards and Technology (NIST) will figure prominently in such efforts – and that means scanning the horizon for worthwhile government cybersecurity efforts which make sense for your company’s design innovation process, business models, and ideas around value creation and capture. To start, there is plenty of activity over at NIST related to cybersecurity worth a review.
Ohio-based DNA Diagnostics Center (DDC) recently reported that in August 2021, the company detected potential unauthorized access to its network, during which there was unauthorized access and acquisition of an archived database that contained personal information collected between 2004 and 2012. There are issues with security associated with life sciences data. We hit some very big ones here.