MILITARY POWER: NORTH KOREA Cyberwarfare Profile
Executive Summary The North Korean dictatorship, headed by Kim Jong-un, is behind some of the most nefarious cyberwarfare operations active on the global stage. Since the ending of the Korean War ...
MILITARY POWER: NORTH KOREA Cyberwarfare Profile
Executive Summary The North Korean dictatorship, headed by Kim Jong-un, is behind some of the most nefarious cyberwarfare operations active on the global stage. Since the ending of the Korean War ...
(By Frank Wood on December 2, 2021) Executive Summary Iranian cyber capabilities are meager in comparison to many well-developed nations. However, it is rapidly expanding its cyber ...
China’s Mass-Surveillance Goes Global: SMS Invasion
Overview:State-sponsored Chinese hacking group Lotus Blossom (AKA APT41) has infiltrated 4 telecom companies operating in undisclosed locations. The purpose of this infiltration was to expand their ...
The Weakest Link: DoD Data Exposed by Third-party
Overview: Reservations management company AutoClerk found itself in hot water last week when it was discovered that one of its databases was exposed online. The database, which is 179 GB in size ...
Chinese APT “Thrip” Identified
Executive Overview: In early September Symantec information security researchers discovered that a “new” Chinese cyber espionage group detected last June, “Thrip”, is ...
China “Xi’s” Red: Cyber Warfare Used on Hong Kong Protestors
Executive Overview: The Communist Party of China (CCP) is reportedly resorting to cyber warfare methods in an attempt to suppress the democratic movement in Hong Kong. In June and September, ...
New York Financial Companies must comply with cybersecurity regulation
March 1, 2019 marks the final implementation of the New York Department of Financial Services’ (NYDFS) cybersecurity regulation covering DFS-regulated entities and licensed individuals. ...
West African Financial Institutions Hit by Wave of Attacks Since Mid-2017
A recent report by Symantec security researchers reveal cyber-attacks on West African banks and financial firms affecting several organizations in Cameroon, Congo (DR), Ghana, Equatorial Guinea, and ...
Global Weekly Executive Summary, 02 November 2018
China Telecom and BGP Hijacking In an article in Military Cyber Affairs, researchers claim to have uncovered evidence that China Telecom has been deliberately using Border Gateway Protocol (BGP) ...
Global Weekly Executive Summary, 3 August 2018
VPNFilter In July 2018, the VPNFilter malware reportedly tied to a Russian military intelligence agency infected a chlorine station connected to Ukrainian water treatment and sewage plants. This ...