17 Sep 2019

US Huawei problem goes far beyond trade, security official says

In a presentation at the multilateral action on sensitive technologies (MAST) conference, US State Department official Ashley Ford last week outlined why the US government’s security worries about Huawei go way beyond the ongoing trade war between the US and China. In May of this year, US President Donald Trump

Read More
12 Sep 2019

Simjacker vulnerability actively exploited to track, spy on mobile phone owners

Threat actors are actively exploiting a security weakness in SIM cards in order to covertly collect the location information of thousands of users, new research by AdaptiveMobile Security shows. The firm warns that the Simjacker attack, which involves sending malicious SMS messages to vulnerable devices, may put over 1 billion

Read More
10 Sep 2019

Public Exposure Does Little to Slow China-Based Thrip APT

Symantec warns that in the past year, Chinese cyber-espionage group Thrip has launched successful campaigns against no less than 12 military, telecom and satellite organizations across Southeast Asia. Evidently, a 2018 report by Symantec detailing Thrip’s activities has done little to deter the group. Thrip has adopted new malware in

Read More
10 Sep 2019

Mitigating Risks To America’s Cognitive Infrastructure

This is the second of a series on our nation’s most neglected critical infrastructure, our cognitive infrastructure. The first post dove into the nature of the challenge and why it is so important for our future that the threats to our cognitive infrastructure are understood and addressed. This post flows from that one and suggests ways the nation can mitigate many of these risks.

Read More
10 Sep 2019

Stealth Falcon Targets Middle East with Windows BITS Feature

New ESET research reveals that Stealth Falcon, a cyber espionage group targeting political activists and journalists in the Middle East, has changed tactics and is currently using a backdoor relying on Windows Background Intelligent Transfer Service (BITS), instead of the PowerShell-based backdoor used by the group in previous campaigns. The

Read More
09 Sep 2019

Apple: Security Report on iPhone Hack Created ‘False Impression’

Apple on Friday slammed a recent Google report claiming that threat actors may have hacked into thousands of iPhones via an “indiscriminate” years-long campaign involving a number of malicious websites. According to Google, merely visiting one of the websites could have resulted in device exploitation along five different attack chains

Read More
06 Sep 2019

China Set Traps To Capture Dangerous NSA Cyberattack Weapons: New Report

A new report by Check Point indicates that Chinese state-backed hackers set deliberate traps to steal the NSA-linked cyber weapons that were leaked by the mysterious Shadow Brokers group in 2017. Earlier this year, Symantec already found evidence that Chinese cyber espionage group Buckeye (aka APT3, UPS Team, Gothic Panda,

Read More
06 Sep 2019

600,000 GPS trackers for people and pets are using 123456 as a password

Security researchers with Avast have discovered a range of critical flaws affecting around 600,000 GPS trackers designed for monitoring the location of children, seniors, and pets. The flaws include the presence of the same default password (123456) in all devices and the insecure transmission of data in plaintext. The vulnerabilities

Read More
05 Sep 2019

Huawei accuses US of cyber-attacks and threats to staff

Huawei on Tuesday accused the US government of carrying out cyberattacks on the firm’s networks and of unlawfully detaining and threatening its staff members. The Chinese tech giant did not provide evidence to support its claims, but stated that it “strongly condemn[s] the malign, concerted effort by the US government

Read More
04 Sep 2019

What To Do About Quantum Uncertainty

The term quantum uncertainty refers to the unique property of not being able to know the direction and speed of a particle at the same time. However if you were in Washington DC area this summer quantum uncertainty could also describe the confusion of defining the quantum threat to national security and countermeasures to contain it. We imagine there may be quite a bit of quantum uncertainty in your business as well. In this post we bring a bit of clarity to this uncertainty and provide recommendations for both business strategists and government policy makers that can help prepare you for a quantum world. 

Read More