This is the second of a series on our nation’s most neglected critical infrastructure, our cognitive infrastructure. The first post dove into the nature of the challenge and why it is so important for our future that the threats to our cognitive infrastructure are understood and addressed. This post flows from that one and suggests ways the nation can mitigate many of these risks.
New ESET research reveals that Stealth Falcon, a cyber espionage group targeting political activists and journalists in the Middle East, has changed tactics and is currently using a backdoor relying on Windows Background Intelligent Transfer Service (BITS), instead of the PowerShell-based backdoor used by the group in previous campaigns. The
Apple on Friday slammed a recent Google report claiming that threat actors may have hacked into thousands of iPhones via an “indiscriminate” years-long campaign involving a number of malicious websites. According to Google, merely visiting one of the websites could have resulted in device exploitation along five different attack chains
A new report by Check Point indicates that Chinese state-backed hackers set deliberate traps to steal the NSA-linked cyber weapons that were leaked by the mysterious Shadow Brokers group in 2017. Earlier this year, Symantec already found evidence that Chinese cyber espionage group Buckeye (aka APT3, UPS Team, Gothic Panda,
Security researchers with Avast have discovered a range of critical flaws affecting around 600,000 GPS trackers designed for monitoring the location of children, seniors, and pets. The flaws include the presence of the same default password (123456) in all devices and the insecure transmission of data in plaintext. The vulnerabilities
Huawei on Tuesday accused the US government of carrying out cyberattacks on the firm’s networks and of unlawfully detaining and threatening its staff members. The Chinese tech giant did not provide evidence to support its claims, but stated that it “strongly condemn[s] the malign, concerted effort by the US government
The term quantum uncertainty refers to the unique property of not being able to know the direction and speed of a particle at the same time. However if you were in Washington DC area this summer quantum uncertainty could also describe the confusion of defining the quantum threat to national security and countermeasures to contain it. We imagine there may be quite a bit of quantum uncertainty in your business as well. In this post we bring a bit of clarity to this uncertainty and provide recommendations for both business strategists and government policy makers that can help prepare you for a quantum world.
This special report is the first of a two-part series designed to both inform OODA members on the nature of challenges to our nation’s most critical infrastructure and provide recommendations for action that can mitigate these challenges. Our thesis is that America’s most critical infrastructure is our cognitive infrastructure. This is also the most attacked and least defended. In short, our most important critical infrastructure is also our most neglected infrastructure.
China was behind the years-long campaign targeting iPhone users that was recently uncovered by Google researchers, two separate reports claim. Last week, Google published a report about the campaign, which targeted users via a number of malicious websites. Merely visiting one of those sites could result in a user having
New research by IssueMakersLab has identified a unique state-sponsored threat campaign targeting retired South Korean government and military officials. Between July and August of this year, hackers linked to the North Korean regime sent spear phishing emails to the accounts of former officials. The emails contained malicious links that redirected