Remove 2010 Remove Manufacturing Remove Military
article thumbnail

MY TAKE: Iran’s cyber retaliation for Soleimani assassination continues to ramp up

The Last Watchdog

Touhill “Adversaries should remember that our military doctrine identifies cyber as one of our combined arms capabilities,” says Greg Touhill, president of AppGate Federal Group , a Florida-based supplier of software perimeter security systems. When it comes to cyber warfare, America is no shrinking violet, of course. That was a glitch.

article thumbnail

Cyber mercenaries and insiders hired by Chinese intelligence to hack aerospace and tech firms

Security Affairs

.” The Jiangsu Province Ministry of State Security (JSSD) is a foreign intelligence unit that is coordinated by China’s Ministry of State Security (MSS), the agency that is tasked for non-military foreign intelligence and domestic counterintelligence operations. The campaign was carried out at least from January 2010 to May 2015.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The role of a secret Dutch mole in the US-Israeli Stuxnet attack on Iran

Security Affairs

Stuxnet is a malicious computer worm developed to target SCADA systems that was first uncovered in 2010, but researchers believe its development begun at least 2005. Germany provided technical specifications and knowledge about the ICS systems manufactured by Siemens that were controlling the centrifuges at the Natanz Iranian plant.

Military 110
article thumbnail

WHAT IS GOING ON IN THE RUSSIAN MARKET?

Info Source

However, due to the Russian military invasion of Ukraine, and resulting economic sanctions, draining of foreign investments (but of course also because of other perennial problems plaguing the Russian economy), the market has been in fundamental confusion ever since, which will undoubtedly continue for some time.

article thumbnail

MY TAKE: How state-backed cyber ops have placed the world in a constant-state ‘Cyber Pearl Harbor’

The Last Watchdog

That May 10th air strike by the Israel Defense Force marked the first use of military force in direct retaliation for cyber spying. This comes as no surprise to anyone in the military or intelligence communities. nuclear arsenal in 2003 • Breaches of computers at the Department of Commerce in 2006 • Hacking of military systems at U.S.

IoT 171