As the two-year anniversary of Moscow's all-out war of conquest against Ukraine approaches, recent Russian cyber operations have focused not just on spear-phishing targets but also seeking to poison everyday Ukrainians' morale, focusing on heating outages and medical shortages.
An apparent leak of internal documents from a Chinese hacking contractor paints a picture of a disaffected, poorly paid workforce that nonetheless penetrated multiple regional governments and possibly NATO. Multiple experts told Information Security Media Group the documents appear to be legitimate.
South Korea's election watchdog warned on Monday that the parliamentary elections in April could be marred by artificial intelligence-generated deepfake campaigns aimed at influencing voters. The country's recently amended Elections Act bans the use of deepfakes for election campaigning.
In the latest weekly update, four ISMG editors discussed the relatively low profile of cyberwarfare in recent international conflicts, the potential revival of a dormant HIPAA compliance audit program and the security implications of sovereign AI development.
CISO Sam Curry and CMO Red Curry discuss the chaos and disruption of cyberwar and how attacks on critical infrastructure can tactically help attackers in combat, demoralize the general population and affect critical capabilities at just the right point in time.
Russia continues to focus on running cyber operations and espionage that target Ukraine's military, government and civil society in support of its ground campaign, researchers at Google said, warning that the information operations will likely soon be brought to bear on Western elections.
The U.S. federal government says it disrupted a criminal botnet that Russian military intelligence had converted into a platform for global cyberespionage. The malware targets Linux-based IoT devices - in this case, routers made by New York manufacturer Ubiquiti.
Supply chain security firm Eclypsium found corporate VPN maker Ivanti's Pulse Secure devices - which underwent much emergency patching amid a likely Chinese espionage zero-day hacking campaign - operate on an 11-year old version of Linux and use many obsolete software packages.
The South Korean President's Office told local media Tuesday that suspected North Korean hackers had targeted the private email account of an official in November ahead of the president's state visits to the U.K. and France. Local reports suggest the hackers accessed the details of scheduled events.
While overall ransomware profits might remain high, many of the remaining or rebooted top-tier groups are "really struggling" with scarce talent, trauma from the Russia-Ukraine war and repeated disruptions by law enforcement, say researchers from threat intelligence firm RedSense.
Likely due to operational security concerns, Hamas didn’t appear to deploy any unusual cyber operations or surge ahead of militants storming from the Gaza Strip into nearby Israeli towns last October, researchers report. But since then, some other regional actors haven't held back.
With over 1 billion people across more than 50 countries - including the U.S., the U.K. and India - due to hold elections this year, one open question remains: How can nations combat adversaries who attempt to influence elections or otherwise interfere via physical, cyber or operational means?
Fortinet warned Thursday that hackers have exploited a vulnerability in the operating system powering its virtual private network and urged customers to apply a patch or disable the appliance. State threat actors, including hackers from China, are targeting gateway devices in increasing numbers.
Researchers at South Korean cybersecurity company S2W attributed a new malware campaign that targeted South Korean organizations to North Korean cybercrime group Kimsuky. The hackers disguised their malware installer as a security program installation file to deceive victims and steal their data.
The U.S. Cybersecurity and Infrastructure Security Agency urged critical infrastructure owners to patch systems after publishing a warning that Chinese hackers are evading detection and maintaining persistent unauthorized access in U.S. information technology environments.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.asia, you agree to our use of cookies.