The former director for cyber security policy in the Obama White House said that, while the U.S. is the “best in the world on offense,” it is the U.S. the most vulnerable country in the world to cyber attacks. The vulnerabilities are both political and technical, due to its democratic
A research team published three separate vulnerabilities in the mobile communication standard LTE (4G). Two of the attacks allow an attacker to view LTE traffic and user details, while the third enables an attacker to manipulate data traveling to users’ devices. The report also indicated that these hacks do not
North Korea has been using cyberattacks to generate revenue for the cash-strapped government since 2016. Already in 2018, researchers have attributed a $110 million USD attack against Mexico’s state bank and a $10 million USD attack on the Bank of Chile to North Korean hackers. Continued efforts by North Korean
The Russian government likely has the ability to engage in disruptive and destructive attacks against U.S. critical infrastructure.
Cyber and Electromagnetic Activities (CEMA) cells are being inserted into brigades to provide cyber support and capabilities in roles that have been compared to those of artillery planners. The cells could allow a commander to target local ISPs and routers to prevent their use by enemy forces. They could also
In efforts to bolster protection of US infrastructure, the Department of the Interior has awarded two companies positions on a $45 million dollar contract to protect the country’s 600 dams from cyberattack. Booz Allen Hamilton and Spry Methods won the positions on the contract that will work to prevent attacks
Software and hardware used by ships are vulnerable to tracking, and even hijacking ships, according to a study by cybersecurity firm Pen Test Partners. Vulnerabilities are caused by satellite communications systems with insufficient protections that allow hackers to gain admin access. From this point, hackers can manipulate navigation and even
NATO states have increased the levels of cooperation and capabilities in terms of cyber attacks on member states. Areas of increased cooperation include information sharing in real time, integrating national cyber capabilities into NATO planning and operations, creating Rapid Reaction teams, and training via the NATO Center of Excellence for
Chinese hackers breached a US Navy contractor in January and February, stealing information on naval technologies, weapons, and plans. While government officials have said all compromised data was unclassified, the breach underscores ongoing difficulties with contractors and agencies concerning the protection of sensitive data. The most significant breach in recent
Want more insight? This content is restricted to OODA Network members only. Members get access to all site content plus access to exclusive reports and events. Please consider becoming a member. For more information please click here. Thanks! Already a member? Sign in to your account.