Start your day with intelligence. Get The OODA Daily Pulse.

Home > OODA Analysis and Briefs

Analysis

Briefs

  • 10 Companies Chosen to Test Next-Generation Cybersecurity Technologies

    Ten UK-based cybersecurity companies have been chosen by the government to participate in the latest phase of the Digital Security by Design program. Their participation will consist of experimenting with prototype cybersecurity technology created to strengthen the hardware underlying the computers. The technology was designed by Arm, a semiconductor and software design company in collaboration…

  • Doug Ford set to return as Ontario premier after election sweep

    Doug Ford’s Progressive Conservative party has won a majority in legislative elections in Ontario, Canada’s most populous province. The party is expected to win 83 of the provincial legislature’s 124 seats according to projections made on Thursday. Ford became president in 2018 and faced criticism over his handling of the province’s strained healthcare system and…

  • Civilians in peril as tensions in DR Congo escalate: HRW

    The Human Rights Watch has stated that the fighting between government forces and armed groups in the North Kivu province of the Democratic Republic of the Congo could endanger the safety of civilians. The human rights group made a statement late on Wednesday night calling the DRC’s forces and the M23 group to minimize the…

  • Pakistani Taliban militants announce indefinite ceasefire with Islamabad

    An indefinite ceasefire with Pakistan’s government has been announced by the Pakistani Taliban after talks run by the Afghan Taliban government. The Pakistani Taliban (TTP) said the progress from talks in Kabul allowed the truce to be extended until further notice. The TTP has been fighting Pakistan’s governmental armed forces for years. The TTP wants…

  • Salvadoran authorities are committing ‘massive’ human rights violations, with nearly 2% of the country detained, Amnesty alleges

    According to a new report by Amnesty International, Salvadoran authorities have committed many human rights violations. The violations include thousands of arbitrary detentions and violations of due process, torture and ill-treatment. In the report, it was found that nearly 2% of the country has been detained since March and 18 people have died while in…

  • Amid criticism, North Korea takes over as UN disarmament president

    North Korea has taken over as the head of the UN body aimed at making disarmament deals while being under sanctions for developing nuclear weapons against United Nations Security Council Resolutions. North Korea gained the presidency of the Conference on Disarmament because the position rotates alphabetically through its 65 members.  North Korea stated it would…

  • Cloud computing security: Five things you are probably doing wrong

    Cloud applications and software have become a key part of everyday life for employees and businesses, but simple errors can make your cloud an easy target for hackers. The popularity of cloud applications and software has risen significantly in recent years. But while using cloud services can be beneficial for businesses and employees, it also…

  • Why web3 companies get hacked so often, according to crypto VC Grace Isford

    Before joining Lux this February, Isford was an investor at Canvas Ventures focused on enterprise software and fintech. A data infrastructure investment she worked on at Canvas revealed to her the opportunity in the web3 space for companies to “share data immutably at scale,” motivating her pivot to crypto, she said. “That led me down the…

  • US Agencies: Karakurt extortion group demanding up to $13 million in attacks

    The Karakurt data extortion group is holing victim data for ransoms of $25,000 to $13 million in Bitcoin, according to a new alert from the FBI, Cybersecurity and Infrastructure Security Agency (CISA), and the Treasury Department. The U.S. agencies said Karakurt victims have not reported encryption of compromised machines or files, but instead the gang’s members…

  • Evil Corp hackers evolve ransomware tactics to dodge US sanctions

    The Russia-based cybercriminal group known as Evil Corp has shifted to a ransomware-as-a-service model in an effort to skirt U.S. sanctions, according to research from cybersecurity firm Mandiant. The U.S. Treasury’s Office of Foreign Assets Control, or OFAC, sanctioned Evil Corp in December 2019, citing the group’s extensive development of Dridex malware, which the gang used…

  • Goldman Sachs Bitcoin Survey Shows Insurers Beginning To Warm To Crypto Investing

    Banking giant Goldman Sachs recently released the eleventh edition of its annual insurance survey. Cryptocurrency was included for the first time. The survey of 328 chief investment officers and chief financial officers, representing nearly half the $26 trillion global insurance industry, indicated that six percent of respondents were invested in crypto or considering doing so. While…

  • Scammers Target NFT Discord Channel

    A popular Discord bot has been exploited by hackers deploying phishing and scamming attacks. The campaign attempts to persuade users to click on malicious links. Discord is a public chat application that is designed for gamers, but it has gained the attention of crypto owners across the world. Attackers are seeking financial gain via compromising…

  • International Authorities Take Down Flubot Malware Network

    The information stealing trojan Flubot has been taken down by international authorities. Flubot was known to use SMS messages and contact credentials to spread internationally across Android devices since December 2020. Europol revealed on Wednesday that a collaboration  between law enforcement agencies in 11 different countries was successful in disrupting the Flubot network in early…

  • Nearly Three-Quarters of Firms Suffer Downtime from DNS Attacks

    According to a new report released by security vendor efficientIP titled the 2022 Global DNS Threat Report, hybrid and cloud migration during the pandemic led to a surge in DNS-related attacks. In addition, application downtime and data theft are two major consequences of this type of attack. The report assesses interviews with over 1000 global…

  • Turkey wants to be called Türkiye in rebranding move

    Turkey will now be known as Türkiye in the United Nations from now on. Many international bodies will be asked to make the name change as it is part of a rebranding campaign launched by the Turkish president last year. According to Tayyip Erdogan, Türkiye is the best representation of the Turkish people’s values, culture,…

  • Surging gang violence in Haiti’s capital leaves nearly 200 dead in one month

    Nearly 200 people have been killed and thousands have been displaced in one month in Haiti’s capital due to a rise in gang violence. The gang violence began increasing in late April in Port-au-Prince as rival gangs began seizing territory with more intensity. More than 16.800 people were forced to leave their homes and shelter…

  • Taking The Next Step In Digital Transformation: Modernizing Cybersecurity

    Amid a rapidly evolving cyber threat landscape, an increasingly distributed workforce and growing reliance on the cloud, cybersecurity teams are struggling to monitor and protect far-flung architectures. Current security infrastructures result in too many false positives, leading to “analysis paralysis.” A shortage of cybersecurity professionals further compounds the problem. To address these issues, enterprises should…

  • Apple to shift iPad capacity to Vietnam amid China supply chain woes

    For the first time ever Apple is moving some iPad production out of China and shifting it to Vietnam after strict COVID lockdowns in and around Shanghai led to months of supply chain disruptions, Nikkei Asia has learned. The U.S. company has also asked multiple component suppliers to build up their inventories to guard against future…

  • The metaverse: Tech game-changer or security nightmare?

    Imagine this: Within the next 10 years, you’re in the metaverse and celebrating a successful business deal, but the joyful moment dissipates as it’s quickly becoming apparent that the avatar (person) was not who you thought it was. Reality sets in. You’ve just become the victim of a cybercrime. Your financial assets and confidential data have…

  • Utilizing Cryptography in Supply Chain & Procurement

    Cryptography is the technology that powers online encryption, digital authentication, credit card processing, and online banking. Even if you’re not familiar with the technology, you likely rely on cryptography on a daily basis. Now, with the rise of cryptocurrencies and blockchain technology, cryptography may become even more important in the supply chain. In procurement and…

  • Four cryptocurrency cybersecurity risks and how to avoid them

    Cryptocurrency is a digital asset that can circulate without monetary authority like a government or bank. It’s an alternative form of payment created using cryptographic techniques that allow people to buy, sell, or trade digital currency. Since exchange rates are highly volatile, cryptocurrency has the potential to yield significant returns for investors. However, since cryptocurrency…

  • Israel Signs Free-Trade Agreement With UAE in First of Its Kind Deal with Arab State

    Israel and the United Arab Emirates signed a free-trade agreement this week less than two years after they established formal diplomatic relations. The establishment of formal diplomatic relations was brokered by the US. The free-trade agreement is recognized as the first of its kind, and was singed into action on Tuesday. The deal will cover…

  • Surging gang violence in Haiti’s capital leaves nearly 200 dead in one month

    The United Nations Office for the Coordination of Humanitarian Affairs (OCHA) released a report this week, in which its findings regarding surging gang violence in Haiti were detailed. According to OCHA, the rampant gang violence in Port-au-Prince has left nearly 200 dead and thousands more displaced in May alone. The violence reportedly reached a new…

  • You Need to Update iOS, Chrome, Windows, and Zoom ASAP

    Security researchers at WIRED have urged users to update iOS, Chrome, Windows, and Zoom as soon as possible to stay up to date with relevant security issues. According to Wired, Google has had a busy month releasing patches for the Chrome browser and the Android operating system. In addition, Zoom and Apple have released patches…

  • Anonymous Claims Attacks Against Belarus for Involvement in Russian Invasion of Ukraine

    Spid3r, an organization affiliated with Anonymous, claims to have launched attacks against the government of Belarus in retaliation for the country’s perceived support of Russia’s invasion of Ukraine and subsequent ongoing military conflict. The group announced its moves on Twitter, stating that it was targeting government websites associated with the Belarus state. In addition, the…

  • EnemyBot Malware Targets Web Servers, CMS Tools and Android OS

    Cybersecurity researchers have released new warnings about the EnemyBot malware, which reportedly borrows code from botnets such as Mirai, Qbot, and Zbot. The rapidly evolving tool functions as IoT malware and targets content management systems (CMS) web servers and Android devices. Security researchers believe that the bot might be the work of a threat actor…

  • Microsoft Releases Workaround for ‘One-Click’ 0Day Under Active Attack

    Microsoft has released a workaround for a critical zero-day flaw that is reportedly being actively exploited by threat actors. Dubbed ‘Follina,’ the vulnerability was originally identified in April and has been leveraged by attackers to target organizations in Russia and Tibet. The flaw is tracked as CVE-2022-3019 and is a remote control execution (RCE) vulnerability…

  • US to send longer-range rockets in latest aid package to Ukraine

    US President Biden announced that the US will be sending more advanced rocket systems to Ukraine following repeated requests. The long-range rockets allow Ukraine to strike enemy forces from larger distances. The US had previously refused to send these additional weapons to Ukraine due to fears that the weapons would be used against targets in…

  • Serbia’s gas deal with Putin has created a fresh headache for Europe

    Serbia’s President Aleksandar Vucic announced on Sunday that Serbia has agreed to a three year gas supply deal with Gazprom, Russia’s state energy provider. In doing so, Vucic could upset the Western anti-Putin alliance and the European Union (EU). The EU has recently announced the final deal for a sixth package of sanctions against Russia…

  • Study Warns That Shadow Code on External JavaScript Libraries Pose a Serious Supply Chain Risk

    Israeli cybersecurity firm Source Defense analyzed the supply chain risk posed by shadow code on third- and fourth-party scripts on major businesses’ websites. Third-party scripts and open source JavaScript libraries assist development teams in adding advanced functionality to web applications without writing or maintaining code. They allow developers to improve user interaction, implement social media sharing, tracking…

  • A $90 million DeFi exploit on Terra went unnoticed for seven months

    Mirror Protocol appears to be under attack and may have already lost as much as $2 million. The frequency of DeFi hacks has made them almost commonplace in the cryptoverse. However, what is certainly unusual is DeFi protocol exploits worth $90 million going unnoticed for seven months – and yet, that is the story of Mirror…

  • Russia’s War in Ukraine: The War in Cyberspace

    Dmytro Dubov, Head of the Information Security and Cyber Security Department of the National Institute for Strategic Studies in Kyiv, examines Russia’s methods of cyberattack against Ukraine’s critical infrastructure facilities, and their impact. He discusses the close coordination between Russia’s cyber and propaganda activities and highlights future challenges for Russia in the IT realm that, if…

  • Cyber Defense Confidence Ebbs as Ransomware Attacks Multiply

    Despite Washington’s recent attempts to expand cybersecurity rules and disrupt hacking gangs, ransomware continues to proliferate and executives report unease about their companies’ ability to ward off the threat. The number of ransomware attacks against U.S. businesses has continued to increase this year, cybersecurity experts say, while some lawmakers warn the government has limited visibility of…

  • Bitcoin vs Ethereum

    Bitcoin and Ethereum are the Coca-Cola and Pepsi of the cryptocurrency space. As the number one and two biggest names in the market, they’re often compared against one another. From premise to prices, the two concepts are very different. However, there are many similarities to be found. Here’s a look at how the two systems compare. Bitcoin…

  • US Academic Credentials Displayed in Public and Dark Web Forums

    The Federal Bureau of Investigation (FBI) has warned the public of a new threat via a Private Industry Notification. The warning targets universities, colleges, and higher education institutions that credentials have been advertised for same on dark web criminal marketplaces. According to the FBI, the credentials were discovered in January of this year for sale…

  • ChromeLoader Browser Hijacker Provides Gateway to Bigger Threats

    Security researchers have warned that the ChromeLoader browser hijacker could provide a gateway into bigger threats, such as the capability to spread ransomware, spyware, and steal data from browser sessions. Researchers state that the malware’s use of PowerShell could further this malicious activity, transforming it from a run-of-the-mill browser hijacker to a far more advanced…

  • Turkish Airline Exposes Flight and Crew Info in 6.5TB Leak

    Low-cost Turkish airline Pegasus Airlines has accidentally leaded the personal information of its flight crew, source code, and flight data due to a misconfigured AWS bucket. SafetyDetectives, a research team, discovered the unsecured database on February 28 and was able to trace the leaked information to the Electronic Flight Bag software developed by the airline…

  • Singapore ups investment in quantum computing to stay ahead of security threats

    Singapore announced last week that it plans to set aside $17.09 million to support national platforms under the Quantum Engineering Programme for up to 3.5 years. The program is part of the country’s Research, Innovation, and Enterprise plan set forth in 2020 that aims to ensure encryption technologies remain diligent in security efforts and able…

  • China sends 30 warplanes into Taiwan air defense zone

    Taiwan deployed fighters jets to warn off 30 Chinese warplanes from its air defense zone on Monday. This was the biggest incursion by China in Taiwan’s air defense zone since January. The incident occurred only days after US President Joe Biden warned China against invading Taiwan. On Monday, a US official had also visited the…

  • Violence erupts around Jerusalem during controversial flag march

    A controversial flag-waving procession was held in east Jerusalem on Sunday by thousands of Israelis who marched from Damascus Gate dancing and chanting. Damascus gate is the main entry to the Muslim Quarter of Jerusalem’s Old City and the chanting included phrases such as “the nation of Israel lives” and “death to Arabs.”  Israeli police…

  • AMD-Powered Frontier Supercomputer Breaks the Exascale Barrier, Now Fastest in the World

    The AMD-powered Frontier supercomputer is now the first officially recognized exascale supercomputer in the world, topping 1.102 ExaFlop/s during a sustained Linpack run. That ranks first on the newly-released Top500 list of the world’s fastest supercomputers as the number of AMD-powered systems on the list has expanded significantly this year. Frontier not only overtakes the…

  • Will Russia Launch a New Cyber Attack on America?

    Policy circles in Washington are now debating how Vladimir Putin might respond to a major contraction of the Russian economy and clear signs that Moscow is losing the war in Ukraine. Some posit that a cornered president, furious and facing a near defeat, might indeed respond brutally—moving the proxy confrontation of a new Cold War…

  • How To Safely Self-Custody Your Bitcoin

    Bitcoin gives one sovereignty, but the responsibility of safe storage is the cost of continuing to enjoy such sovereignty. The promise of permissionless money that is tamper-proof and sensor-proof is only realistic if the Bitcoin is held in self custody. There are risks to storing one’s Bitcoin on a centralized exchange, including counterparty risk, the risk…

  • Procurement, early warning systems, and the next disruption

    For procurement leaders at industrial companies, the past 18 months have been difficult. Resurgent economic activity has collided with supply disruptions that have seemingly come one after another. Procurement executives know they need to respond but are unsure how. Most of them have not had a chance to anticipate the next set of problems—let alone…

  • The Future is DeFi: Going Beyond the Traditional Norm

    The idea of decentralized finance was born around 2017, a few years after the launch of the Ethereum Blockchain. Since then, the DeFi space has increasingly attracted attention from many different key opinion leaders, influencers and investors. The general idea is to decentralize financial activities and bring financial control to individuals. DeFi has been reshaping the…

  • Making the Metaverse Safe For Everyone

    Unlike any other time in history, the past decade has shown us the power of technology to transform our working and personal lives. Technology-enabled shopping, banking and working from any location made the restrictions from COVID-19 more manageable. We are also getting a hint of the power that big data, AI and machine learning will…

  • Microsoft continues to iterate on an Xbox cloud streaming device codenamed ‘Keystone’

    For a few years, rumors have persisted that Microsoft was exploring building some form of streaming stick to offer Xbox Cloud Gaming via a more affordable dongle, similarly to Chromecast and Google Stadia. The first hint was Project Hobart. More recently, a code name “Keystone” appeared in an Xbox OS list, lending fire to rumors…

  • How We Might Overcome DeFi’s Pitfalls

    Satoshi Nakamoto imagined a trustless, transparent financial system without the need for intermediaries like banks mediating everyday transactions. Nakamoto’s philosophy reached its zenith with the emergence of smart contracts and decentralized finance (DeFi). The DeFi sector grew significantly, and its total volume locked (TVL) surpassed $250 billion in 2021. Despite turbulent market conditions, DeFi’s TVL hovered…

  • NSA: Sanctions on Russia Having a Positive Effect on Ransomware Attacks, Attempts Down Due to Difficulty Collecting Ransom Payments

    National Security Agency (NSA) director of cybersecurity Rob Joyce told attendees of a recent UK security conference that ransomware attacks are down in roughly the last two months, and that trend can be traced directly to sanctions placed on Russia. Criminals that operate out of the country are struggling to find ways to cash out…

  • What Leaders Need To Know About Blockchain

    If you’re anywhere near the tech or financial space, you’ve likely been hearing terms like DeFi, blockchain, and smart contracts more and more frequently. Ever since cryptocurrencies and other decentralized technologies came on the scene, they’ve been the subject of much speculation and debate among engineers and business leaders. Some tech thinkers suggest that blockchain is…

  • India’s SpiceJet Strands Planes After Being Hit By Ransomware Attack

    SpiceJet, an India-based airline, was forced to delay numerous flights on Wednesday after being hit by a ransomware attack that occurred on Tuesday. The company released a post to Twitter confirming that its operations had been impacted by the cybersecurity incident. On Thursday, morning flight departures were still suffering from the effects of the cyberattack,…

  • Cybergang Claims REvil is Back, Executes DDoS Attacks

    According to researchers at Akamai, actors claiming to be the REvil ransomware group is targeting one of its customers with a Layer 7 attack. The group has also demanded an extortion payment in Bitcoin from Akami’s client. The defunct REvil ransomware gang went dark in July 2021 after several law enforcement operations agains cybercrime syndicates.…

  • Latest DRC violence has displaced more than 72,000 people

    The eastern Democratic Republic of the Congo has seen fighting between the army and M23 rebels this past week. The conflict in this week alone has forced over 72,000 people to flee their homes, according to the United Nations.  The rebels, M23, claim to represent ethnic Tutsis in the region of the eastern DRC and…

  • China and Russia veto new UN sanctions on North Korea for first time since 2006

    In a move that was referred to as dangerous and disappointing, Russia and China vetoed a United Nations Security council resolution to increase sanctions on North Korea that was drafted by the United States. The vote is concerning because it could fuel Pyongyang’s nuclear program to develop nuclear missile systems.  North Korea has completed more…

  • Critical Flaws in Popular ICS Platform Can Trigger RCE

    Cisco Talos has reportedly uncovered eight vulnerabilities in the Open Automation Software, a popular industrial control system (ICS) platform. Two of the flaws are categorized as critical, meaning that they pose a risk for infrastructure networks and should be addressed immediately. Exploiting the flaws could lead to remote code execution or denial of service and…

  • Ed tech wrongfully tracked school children during pandemic says Human Rights Watch

    According to Human Rights Watch (HRW), students who were required to use government-endorsed education technology, also referred to as ed tech, during the Covid-19 pandemic may have been subject to a variety of harmful cyber practices, such as keystroke monitoring and data collection. In addition, the HRW alleges that the data collected from the students’…

  • A lesson from the Ukraine war: Secure our semiconductor supply chains

    There are many lessons emerging from Russia’s invasion of Ukraine, and others yet to be discerned. One insight that the war has reinforced concerns the tremendous strategic value of semiconductors. These tiny silicon chips offer a huge warfighting advantage for the Ukrainians — but also should remind the United States of the urgent need to…

  • Everything You Need to Know About Crypto Insurance

    Cryptocurrency is the most exciting and unpredictable financial frontier in today’s world. The opportunities for crypto-based businesses are enormous, but so are the attendant risks. Protecting you from these downfalls is what crypto insurance is all about. Although it will safeguard your business from cybercriminals, it will also give your customers valuable peace of mind.…

  • ‘More Systemic Risk’—The Stablecoin Fallout Could Be Just Starting As The Price Of Bitcoin, Ethereum, Terra’s Luna, Solana, Cardano, XRP Sink

    The crypto market is covered in red again. This week the price of bitcoin price fell 2.4% and Ethereum’s price is down 5.0%. Cardano ADA fell 9.8%, XRP XRP lost 6.14%, and Solana slumped 12.4%. Meanwhile, the price of BNB BNB rose 7.4%. The waters are still murky after the mid-month roiling of the crypto…

  • Could quantum computing bring down Bitcoin and end the age of crypto?

    Quantum computers will eventually break much of today’s encryption, and that includes the signing algorithm of Bitcoin and other cryptocurrencies. Approximately one-quarter of the Bitcoin ($168bn) in circulation in 2022 is vulnerable to quantum attack, according to a study by Deloitte. Cybersecurity specialist Itan Barmes led the vulnerability study of the Bitcoin blockchain. He found the…