article thumbnail

GUEST ESSAY: Rising global tensions put us a few lines of code away from a significant cyber event

The Last Watchdog

History shows how a small event built on daisy-chained circumstances can kick off a catastrophe, or even a shooting war. Cyberattack campaigns make strategic military sense since they are designed to impact communications, impact energy, cripple a population, military readiness, or make any number of dire situations worse.

Military 275
article thumbnail

US govt is hunting a Chinese malware that can interfere with its military operations

Security Affairs

The US newspaper refers to the malware as a “ticking time bomb” that could be activated to disrupt the military. military operations in the event of a conflict, including if Beijing moves against Taiwan in coming years.” ” states The New York Times. and Guam without being detected. “Chinese officials, U.S.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Microsoft links Cadet Blizzard APT to Russia’s military intelligence GRU

Security Affairs

The IT giant pointed out that Cadet Blizzard is distinct from other known APT groups operating under the control of the Russian military intelligence GRU, such as Forest Blizzard ( STRONTIUM ) and Seashell Blizzard (IRIDIUM). Unlike other Russia-linked APT group, CadetBlizzard operations are extremely disruptive.

article thumbnail

GUEST ESSAY – Notable events in hacking history that helped transform cybersecurity assessment

The Last Watchdog

Here are five notable historical events that influenced cybersecurity assessment and transformed it into what it is today: The Battle of Midway (1942). military officials hired data analysts to crack the Japanese secret code known as JN-25. After the devastating blow of Pearl Harbor, U.S. As a result, the U.S. The ILOVEYOU Worm (2000).

article thumbnail

RSAC Fireside Chat: Dispersive adapts WWII radio-signal masking tool to obfuscating network traffic

The Last Watchdog

military scattered radio-signals and added noise to radio transmissions — to prevent the jamming of torpedo controls. The streams traverse a “situationally- aware” network that can “react in real time to a degraded network situation or even a cyber event.” For a full drill down, please give the accompanying podcast a listen.

Military 130
article thumbnail

Apply Military Strategy to Cybersecurity at Black Hat Trainings Virginia

Dark Reading

This special October event in Alexandria, Virginia offers unique, practical courses in everything from data breach response to military strategy for cybersecurity.

article thumbnail

GUEST ESSAY: Here’s why ‘purple team’ mock attacks trumps traditional ‘red team’ assaults

The Last Watchdog

Militaries improve operations through wargames. In the 1820s, the Prussian military labeled the two teams for this as “red” and “blue,” with red traditionally associated with the attackers, while blue represented the defender. Purple teaming is a way to use red teaming to understand and improve your defensive posture.

Military 265