A report titled “Resilient Military Systems and the Advanced Cyber Threat” written by Defense Science Board (DSB), a Federal Advisory Committee established to provide independent advice to the Secretary of Defense, presented alarming scenarios on US nation’s military considered unprepared for a full-scale cyber-conflict. The 138-page report alerts Pentagon on the necessity to improve cyber […]
Every government conscious of strategic importance of cyber security and of the investments of other countries in cyber warfare capability is improving its effort. Last week I wrote about Russian government and the Putin’s request to reinforce the garrison of the fifth domain, the cyber space, through a series of investment to secure national critical infrastructures […]
Just one week ago a UN treaty was approved to update 24-year-old United Nations telecommunications rules. The agreement states that countries have the right to access international telecommunications services and control them to prevent cybercrimes such as spamming. The downside is that the UN treaty could open the doors to attitudes of censorship of governments […]
Cyber espionage is worldwide recognized one of the most concerning cyber threats mainly operated by governments to steal sensible information to foreign states and private companies. FireEye has revealed a cyber espionage campaign, named “Sanny“, attributable to Korea that hosts command-and-control (C&C) servers used in the attacks, the C&C channel is embedded on a legitimate page […]
This time I desire to speak about an interesting initiative of Group-IB company, a resident of the Moscow-based Skolkovo Foundation, that has received a grant in the amount of 30m rubles (approximately $966,000) for the development of a global counter-cybercrime system. The funds is co-financed by the Skolkovo Foundation which has provided 21m rubles ($676,000), […]
We have had many opportunities recently to discuss about zero-day vulnerabilities, their knowledge is guarantee of success for the attackers and represents in many cases the certainty to not to be discovered. The zero-day vulnerabilities are desirable for cybercrime that desires to find new ways to monetize cyber attacks, but also for state sponsored hackers […]
Last year I wrote about a new powerful surveillance system that Russian government committed to private business to implement a complex monitoring system, officially to prevent terrorist attacks against Russia. The day is come, today the system has been deployed officially to prevent on-line pedophilia but it obvious that a similar system is also able […]
Big outcry on Wikileaks that last week has published more that 2.4 million emails allegedly obtained from continuous hack against Syrian government and organizations connected to the regime. The correspondence of “Syrian political figures, ministries and associated companies” between August 2006 and March 2012 has been defined embarrassing for the government of Damascus and its […]
Article published on The Malta Indipendent by Ron Kelson, Pierluigi Paganini, Benjamin Gittins, David Pace US military strategist John Boyd states: “War comprises acts of physical, biological, psychological, social, cultural and other destruction at all levels, for example, intrapsychic, interpersonal, intergroup, interorganisational, and international.” Cyber warfare is combat in cyberspace and includes computers, the Internet and the […]
The Flame case has raised the question on the real cyber warfare capabilities of every country, we have spoken of the strong commitment of Indian and German government, praising the US capabilities for the involvement in operations such as the “Olympic Games” project. But what are the real cyber capabilities of the United States? No […]