Just days after the unprecedented attack by Hamas on Israel, Zscaler CISO Sam Curry discusses the intertwined nature of cyber warfare and physical conflicts and how the conflict can quickly escalate to the global stage, harm globalized economies and devolve into digital chaos.
North Korea's state-sponsored hackers continue to refine their "cyber intrusions to conduct both espionage and financial crime to project power and to finance both their cyber and kinetic capabilities," says a new report from Google's Mandiant group.
A previously undetected cyberespionage group spied against Taiwanese government agencies and the island-country's manufacturing sector, say cybersecurity researchers. The Symantec Threat Hunter Team says it likely operates "from a region with a strategic interest in Taiwan."
Israeli intelligence is considered one of the best, yet it failed to anticipate a major attack launched by Hamas over the weekend. Harvard professor Chuck Freilich said this oversight has had a profound impact on the Israeli people, "shattering what was very deep faith in the intelligence agencies."
How did Israeli intelligence fail to spot and stop the deadly assault on Saturday by Hamas militants? Experts suggest planners used offline tactics and extreme compartmentalization to prevent leaks and evade well-known Israeli cyberespionage and digital surveillance capabilities.
Israeli cybersecurity leaders reacted Saturday with shock, defiance and resolve to an unprecedented land, sea and air assault by Palestinian militants from Gaza. Much of the Israeli cybersecurity community's anger stems from the deliberate targeting of children and the elderly by Hamas militants.
The government of a Caribbean nation was the target of a cyberespionage campaign that has indicators of Chinese origin. Cybersecurity firm Eset says attackers used a previously undocumented backdoor as well as traditional hacking tools to target an unidentified "governmental entity" in Guyana.
Government-sponsored cyberespionage campaigns and information operations are on the rise - and not just due to efforts by Russia and China, Microsoft warns in its latest Digital Defense Report review of top nation-state and cybercrime attack trends.
South Korean national intelligence has sounded alarms about North Korean hackers targeting the country's shipbuilding industry to steal naval military secrets. The agency said the hacks are part of North Korean leader Kim Jong Un's strategy to build larger, more advanced warships.
Hacktivists who hit healthcare or otherwise target civilians are violating international humanitarian law, warns the International Committee of the Red Cross. As many self-proclaimed hacktivists appear to be Russian government cutouts, will legal threats make them rethink their life choices?
Researchers discovered an undocumented backdoor being used by the North Korean Lazarus Group to target a Spanish aerospace company. The attacker masqueraded as a Meta recruiter and tricked the victim into downloading and executing malicious files on a company device.
A Chinese hacking group linked to state authorities has upgraded its capabilities to target companies with headquarters in the United States and East Asia, warns an alert from Japanese and American cyber agencies. The group, BlackTech, has a customized firmware backdoor tailored for Cisco routers.
Ukrainian cyber defenders are girding for an onslaught of cyberattacks against the energy sector as cold weather returns. That warning comes as Kyiv has observed Russian state hackers also stepping up attacks against law enforcement in a likely bid to spy on the gathering of evidence of war crimes.
The British government's first-ever global summit on artificial intelligence will focus on mitigating cybersecurity and safety risks tied to the emerging technology. The AI Safety Summit planned for Nov. 1-2 will focus on mitigating risks tied to frontier AI.
Security researchers discovered a novel backdoor targeting a governmental agency in the Middle East for espionage purposes. Deadglyph is unique because it's made up of different parts written in different programming languages: native x64 binary and a .NET assembly.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.eu, you agree to our use of cookies.