Recently, Pakistan hackers allegedly targeted government and energy organizations in India, although some compromised entities were also located in Afghanistan. The attackers used a newly-developed remote access Trojan dubbed “ReverseRAT” that featured diverse functionality to ...
Analysis
In June 2021, the 25-member United Nations (UN) “Group of Governmental Experts on Advancing Responsible State Behavior in Cyberspace in the Context of International Security” (GGE) produced a report, building on its previous meetings to get ...
Analysis
Recently, the International Institute for Strategic Studies (IISS) published a report that assessed nation state cyber capabilities and national power. The qualitative assessment covered and codified seven categories that contributed to building a nation state’s cyber program: strategy ...
Analysis
In his first meeting with Russian President Vladimir Putin, U.S. President Joe Biden claimed to have presented his counterpart with a list of 16 red-line targets, ostensibly the critical infrastructure sectors that are listed on ...
Analysis
Beijing has been engaged in a battle for public opinion for several years, aggressively promoting a positive vision of China to counter criticisms for its involvement in human rights violations, intellectual property theft, currency manipulation, ...
Analysis
In mid-May 2021, Russia’s Federal Security Service (FSB)’s National Coordination Center for Computer Incidentspublished a joint report with Rostelecom-Solar, the cybersecurity arm of Russian telecom company Rostelecom, about a 2020 cyber espionage campaign that targeted ...
Analysis
A recent report has revealed that an Iranian threat actor group dubbed “Agrius” has been operating in Israel since 2020. The group has been linked to cyber espionage activity and has quickly evolved into conducting ...
Analysis
The ransomware attack against Colonial Pipeline revealed how disruptive this malware can be when it impacts civilian critical infrastructure. The successful shutdown of 5,500 miles of pipeline created concern among gas-strapped populations and a government ...
Analysis
Several governments including the United States recognize the criticality of protecting critical infrastructure as a national security priority. But there is little headway in determining what, if any, operations against critical infrastructure are acceptable. Without ...
Analysis
In early April 2021, the U.S. District Court for the Southern District of Texas granted the Department of Justice the authority to disrupt the exploitation of Microsoft Exchange server vulnerabilities. This authority empowered the Federal ...
Analysis