Cybersecurity · cyberwar · Information operations · Information Warfare

Czech Team Wins Cyber Defence Exercise Locked Shields 2017


Czech Team Wins Cyber Defence Exercise Locked Shields 2017 The team from Czech Republic wins the largest and most complex international live-fire cyber defence exercise Locked Shields 2017. Estonian team and NCIRC team from NATO take second and third place respectively. The defensive team from Czech Republic also takes home the special prize for the… Continue reading Czech Team Wins Cyber Defence Exercise Locked Shields 2017

Cybersecurity · cyberwar · Information Warfare · Russia

From Espionage to Cyber Propaganda: Pawn Storm’s Activities over the Past Two Years


April 25, 2017 Pawn Storm—also known as Sednit, Fancy Bear, APT28, Sofacy, and STRONTIUM—is an active cyber espionage organization that has been very aggressive and ambitious in recent years.  Pawn Storm’s activities show that foreign and domestic espionage and influence on geopolitics are the group’s main motives, with targets that include armed forces, the defense… Continue reading From Espionage to Cyber Propaganda: Pawn Storm’s Activities over the Past Two Years

Cybersecurity · cyberwar · Information Warfare · Russia

Russia Ready to Discuss With US Whole Rage of Cybersecurity Issues


Interesting typo: “Russia Ready to Discuss With US Whole Rage of Cybersecurity Issues”. It should probably be “Range”.  But, then again, maybe not.  </end editorial> Russia’s Deputy Foreign Minister Sergey Ryabkov said that Moscow is ready to discuss the whole rage of cybersecurity issues with Washington and hopes for the positive US response to an… Continue reading Russia Ready to Discuss With US Whole Rage of Cybersecurity Issues

Cybersecurity · Russia · cyberwar · Hackers

Inside The Hunt For Russia’s Hackers


Russia’s cyberwarfare operations are built on the back of their cybercriminal networks. Can the US and its allies take them down? Posted on April 20, 2017, at 10:00 p.m. Sheera Frenkel BuzzFeed Staff SAN FRANCISCO — Just past 8 a.m. on March 14, police trod quietly through the snow to the double-fronted doors of Karim… Continue reading Inside The Hunt For Russia’s Hackers

China · Cybersecurity · cyberwar · Information Warfare

China: International Strategy of Cooperation on Cyberspace


2017-03-01 17:18:01 | Editor: Tian Shaohui Source: Ministry of Foreign Affairs of the People’s Republic of China Original (in Chinese): http://www.fmprc.gov.cn/web/zyxw/t1442389.shtml  International Strategy of Cooperation on Cyberspace Contents Preface Chapter I. Opportunities and Challenges Chapter II. Basic Principles 1.The Principle of Peace 2.The Principle of Sovereignty 3.The Principle of Shared Governance 4.The Principle of Shared Benefits… Continue reading China: International Strategy of Cooperation on Cyberspace

cyberwar · Iran · Saudi Arabia

Saudi-Iran: Proxy Wars Escalate To Direct Cyber Attacks


Iranian Shamoon malware is back after a four-year sabbatical to haunt Saudi Arabia. by Salek Ahmed The never ending cyber war between Iran and Saudi Arabia has reached a new height – Same goes for the use of Shamoon malware from Iran against the Kingdom. The renewed attacks have come after a four-year sabbatical with what seems… Continue reading Saudi-Iran: Proxy Wars Escalate To Direct Cyber Attacks

Cybersecurity · cyberwar · Information Warfare

Hackers explain motivation, go-to techniques in new ‘Black Report’


Posted on February 24, 2017 by Tony Ware Over three-quarters of hackers are constantly researching security news and technology, testing new systems because they like an evolving challenge and are convinced they can compromise a target in less than 12 hours — a breach that is typically not detected for over 250 days, if at… Continue reading Hackers explain motivation, go-to techniques in new ‘Black Report’