"We're doing fine, but we're not OK." This was the opening comment from Michael Yehoshua, CMO of HolistiCyber, discussing the impact of the Israel-Hamas war. Yehoshua shared his insights about the conflict, its historic perspective and how his and other Israeli companies are focused on resilience.
A Kazakhstan-based cyberespionage group that has been stealing credentials and data from government agencies of the Commonwealth of Independent States countries is going great lengths to hide its identity. The group is using custom malware and evasion techniques to pose as Azerbaijani hackers.
Welcome to "Cyber Fail." In this ISMG program, our experts uncover fails so we can strengthen our defenses. In this episode, we take on deepfakes, hallucinating chatbots, the fate of humanity and why you should never put your trust in a ransomware gang.
The Australian government is close to introducing standards to shore up the security of the down under country's fast-growing solar market amid reports that Chinese state-sponsored hackers might target internet-connected solar inverters and cause blackouts.
U.S. government agencies and private sector organizations should "remain on heightened alert" for disruptive cyberattacks targeting critical infrastructure amid a series of escalating global conflicts, a top official for the U.S. Cybersecurity and Infrastructure Security Agency said on Wednesday.
In the latest weekly update, editors at Information Security Media Group discuss the impact of the Israel-Hamas war on the threat landscape and the workforce, the role of the U.S. in shaping the future of AI technology, and highlights from ISMG's Financial Services Summit in New York.
The prospects of another cyber war are looming with the latest war between Israel and Hamas. Cyberwarfare is the new norm in conflicts because it offers new dimensions to kinetic fighting at much less risk, cost and effort, according to Antony KM, who works for a leading Australian bank.
U.S. government agencies and the private sector embraced information sharing but lack a coordinated response plan in the event of a massive cyberattack, a House Republican said. Public-private partnerships are essential since 80% of critical infrastructure in the U.S. is owned by the private sector.
Thousands of North Korean IT workers hid their identities to earn hundreds of millions of dollars in IT contract work from overseas companies to help finance the country's weapons development program, U.S. and South Korean agencies said. Officials said to watch for workers who are camera-shy.
Hackers used an updated malware framework dubbed Mata by Kaspersky to target more than a dozen oil, gas and defense sector companies in Eastern Europe, including air-gapped systems. Kaspersky previously associated Mata with North Korea but doesn't attribute this campaign to the Pyongyang regime.
North Korean nation-state threat actors are exploiting a critical remote code execution vulnerability affecting multiple versions of a DevSecOps tool - a high-risk development, especially in light of Pyongyang hackers' recent track record of supply chain hacks.
Nation-state hackers are targeting a vulnerability in WinRAR, a popular Windows utility for archiving files, warns Google’s Threat Analysis Group, which said it has seen "government-backed hacking groups" who hail from multiple countries, including China and Russia, targeting the bug.
India ranks among the bottom five on Harvard's Belfer Cyber Power Index 2022, while China, its primary adversary, is at a strong number two position. Lt. Gen. (Retd.) R S Panwar says a national cyber strategy with an offensive approach is imperative.
Filipino authorities are pushing for higher funding for the country's cybersecurity agency and other government agencies in the wake of recent cyberattacks that resulted in data breaches at multiple government agencies. Researchers say cybercriminals and nation-state actors are behind the attacks.
Nation-state hacks against Western start-ups are surging in a bid by competitor nations to glean intellectual property, warns the Five Eyes intelligence alliance. The stolen data was likely used to fast-track technological and military capabilities within adversary nations, alliance members say.