To no one’s surprise, end users continue to be the favorite target of cybercriminals. Verizon’s 2017 Data Breach Digest, the companion to its annual data breaches report, states that of the data-loss incidents studied, 90% involved phishing or the social engineering of end users. A July 2018 Cybersecurity Insiders report (PDF) concluded, once again, that […]

by

FireEye identifies a pattern of China-based threat groups attempting to gather intelligence Similar activities already observed in the run-up to the recent Cambodia elections     MALAYSIA is possibly facing a wave of increased cyber-espionage due to changes in government policies relating to the Belt and Road initiative. “The recent elections (in Malaysia) that caused […]

by

THE HAGUE — The campaign started with the cyber equivalent of a massive airstrike: law-enforcement agencies from eight countries moving in unison to smash two of the main propaganda organs of the Islamic State. In the two-day operation in April, police seized computers and networks servers across Europe and North America and blocked internet portals […]

by

Cybersecurity Are there new rules for cyberwar? By Derek B. Johnson Aug 16, 2018 The Trump administration rescinded Presidential Policy Directive 20, a move that sets the stage for more aggressive use of offensive cyber operations by the Pentagon against nation-states and their associate hacking groups, the Wall Street Journal reported Aug. 15. The classified […]

by

A few random thoughts as the days get lazy, nights welcome us with spectacular sunsets, and the mornings greet us peacefully with a welcoming sun. Cyber insurance: The more an association comes online, with a website, emails and perhaps even tweets, the more it should consider acquiring cyber insurance as part of its coverage. Associations […]

by

Is the Philippines becoming more vulnerable to cyber threats? The country has emerged as the 9th most attacked country worldwide in terms of cyber threat risks in the second quarter of 2018, up from its 44th place in the same period in 2017, a cybersecurity firm said last week. Kasperky Lab said in a statement […]

by

Social media and Google serve three strategic purposes for the U.S. government. First, they allow Washington to conduct espionage; second, they facilitate the spread of disinformation campaigns, and third, they serve as conduits for the transmission of social contagions. In deploying thought control against the users of social media and Google, the U.S. government shapes […]

by

Social media and Google serve three strategic purposes for the U.S. government. First, they allow Washington to conduct espionage; second, they facilitate the spread of disinformation campaigns, and third, they serve as conduits for the transmission of social contagions. In deploying thought control against the users of social media and Google, the U.S. government shapes […]

by

A threat group dubbed “Leafminer” has been targeting government organizations and business verticals in the Middle East since 2017. Not long after FireEye warned Malaysia to anticipate an uptick in Chinese cyberespionage attacks surrounding China’s Belt and Road Initiative, Symantec discovered a Chinese cyberespionage campaign targeting Middle Eastern Government and Business Organizations. A threat group […]

by