U.S. government agencies and private sector organizations should "remain on heightened alert" for disruptive cyberattacks targeting critical infrastructure amid a series of escalating global conflicts, a top official for the U.S. Cybersecurity and Infrastructure Security Agency said on Wednesday.
In the latest weekly update, editors at Information Security Media Group discuss the impact of the Israel-Hamas war on the threat landscape and the workforce, the role of the U.S. in shaping the future of AI technology, and highlights from ISMG's Financial Services Summit in New York.
The prospects of another cyber war are looming with the latest war between Israel and Hamas. Cyberwarfare is the new norm in conflicts because it offers new dimensions to kinetic fighting at much less risk, cost and effort, according to Antony KM, who works for a leading Australian bank.
U.S. government agencies and the private sector embraced information sharing but lack a coordinated response plan in the event of a massive cyberattack, a House Republican said. Public-private partnerships are essential since 80% of critical infrastructure in the U.S. is owned by the private sector.
Thousands of North Korean IT workers hid their identities to earn hundreds of millions of dollars in IT contract work from overseas companies to help finance the country's weapons development program, U.S. and South Korean agencies said. Officials said to watch for workers who are camera-shy.
Hackers used an updated malware framework dubbed Mata by Kaspersky to target more than a dozen oil, gas and defense sector companies in Eastern Europe, including air-gapped systems. Kaspersky previously associated Mata with North Korea but doesn't attribute this campaign to the Pyongyang regime.
North Korean nation-state threat actors are exploiting a critical remote code execution vulnerability affecting multiple versions of a DevSecOps tool - a high-risk development, especially in light of Pyongyang hackers' recent track record of supply chain hacks.
Nation-state hackers are targeting a vulnerability in WinRAR, a popular Windows utility for archiving files, warns Google’s Threat Analysis Group, which said it has seen "government-backed hacking groups" who hail from multiple countries, including China and Russia, targeting the bug.
India ranks among the bottom five on Harvard's Belfer Cyber Power Index 2022, while China, its primary adversary, is at a strong number two position. Lt. Gen. (Retd.) R S Panwar says a national cyber strategy with an offensive approach is imperative.
Filipino authorities are pushing for higher funding for the country's cybersecurity agency and other government agencies in the wake of recent cyberattacks that resulted in data breaches at multiple government agencies. Researchers say cybercriminals and nation-state actors are behind the attacks.
Nation-state hacks against Western start-ups are surging in a bid by competitor nations to glean intellectual property, warns the Five Eyes intelligence alliance. The stolen data was likely used to fast-track technological and military capabilities within adversary nations, alliance members say.
Amplifying kinetic attacks, Russian hackers in recent months have hit at least 11 telecommunications firms in Ukraine with a barrage of "destructive" malware designed to exfiltrate data, steal social media account credentials, destroy IT systems and disrupt operations, the Ukrainian government says.
A financially motivated hacking group turned cyberespionage operation targeted attendees of high-profile European conferences, including the Women Political Leaders Summit in Brussels. Threat actor Void Rabisu - also known as Tropical Scorpius and UNC2596 - has been honing its backdoor.
It could be weeks or months before outsiders have a clear picture of the cyber dimension of the conflict between Hamas and Israel, a cyber expert said. "As some of these stories come out, as we will start to learn about what was actually targeted," said Rob T. Lee of the SANS Institute.
Security researchers attributed a wave of targeted cyberattacks against telecommunications companies and government ministries in several Asian countries to a Chinese advanced persistence threat group named ToddyCat. The group has been expanding its cyberespionage operations in Asia since late 2022.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.asia, you agree to our use of cookies.