According to the world’s top incident response (IR) professionals, politically motivated cyberattacks from nation-state actors have contributed to an ominous increase in destructive attacks: attacks that are tailored to specific targets, cause system outages, and destroy data in ways designed to paralyze an organization’s operations. Tom Kellerman, Carbon Black's Chief Cybersecurity Officer, put it this way: “These attackers aren't just committing simple burglary or even home invasion -- they're arsonists.”
Russian hackers have recently been linked to cyberattacks targeting critical infrastructure in other countries, raising concerns about the nation’s ability to target U.S. utilities.
The indictments named two officers working for the Nanjing-based foreign intelligence arm of China’s Ministry of State Security and six other defendants who allegedly conspired from 2010 to 2015 to steal sensitive turbofan engine technology used in commercial aviation.
In the darkest hours of World War II, a swarm of hidden foreign attackers wreaked devastation on America’s security and economy. Unfortunately, the defenders in the employ of the U.S. government were too often absent when the attackers struck, which only incentivized them to come back for more.
Yahoo has said it will pay $50 million in damages and provide free credit-monitoring services to millions of Americans and Israelis following a data breach beginning in 2013 that led to as many as 3 billion accounts being compromised by hackers.
Facebook is reportedly looking to acquire a major cybersecurity firm following a massive breach that compromised data from 30 million accounts. The company has approached several unnamed cybersecurity providers about potential acquisitions...
Chris Wysopal and his Boston hacker collective pals from the L0pht sounded the alarm on the sad state of software vulnerability in a now-legendary 1998 appearance before Congress. Then-Sen. Joe Lieberman hailed the group as "modern-day Paul Reveres." Wysopal remains active in cybersecurity today as chief technology officer of Veracode, now part of CA Technologies.
The most common form of phishing email in education tends to include an attached invoice; 66 percent of hacker attempts use the attached invoice ploy to get unwary recipients to click on an infected link; another 28 percent use a payment notification scheme; and 6 percent try online order tricks.
Russian hacker forums cater to business transactions while Chinese hacktivism is rooted in allegiance to country, according to a new report from Recorded Future, a threat intelligence firm. China’s first hacker groups popped up in the late 1990s, triggered by anti-Chinese riots in Indonesia, the report said. Originally nationalistic discussion boards, they eventually evolved into the initial wave of Chinese hacking groups: the Green Army, China Eagle Union, and Hongke (or Honker) Union, Recorded Future added.