RUSSIAN HACKERS | By Joseph Cox | Nov 10 2018, 11:24pm US Cyber Command, a part of the military tasked with hacking and cybersecurity operations, says it is releasing malware samples as an information sharing effort. Usually it’s the Russians that dump its enemies’ files. This week, US Cyber Command (CYBERCOM), a part of the military… Continue reading The US Military Just Publicly Dumped Russian Government Malware Online
November 6, 2018 | Report Evolving Menace: Iran’s Use of Cyber-Enabled Economic Warfare Annie Fixler Policy Analyst Frank Cilluffo Auburn University CEEW Board of Advisors EXECUTIVE SUMMARY In 2016, the industrial computer security firm MalCrawler conducted an experiment: It created an elaborate network to observe the actions and gauge the intentions of malicious cyber operators.… Continue reading Report: Evolving Menace – Iran’s Use of Cyber-Enabled Economic Warfare
22 August 2018 It was a perfect sunny summer afternoon in Copenhagen when the world’s largest shipping conglomerate began to lose its mind. The headquarters of A.P. Møller-Maersk sits beside the breezy, cobblestoned esplanade of Copenhagen’s harbor. A ship’s mast carrying the Danish flag is planted by the building’s northeastern corner, and six stories of blue-tinted… Continue reading The Untold Story of NotPetya, the Most Devastating Cyberattack in History
By Jana Winter SPOTLIGHT FELLOW NOVEMBER 05, 2018 Hackers have ramped up their efforts to meddle with the country’s election infrastructure in the weeks leading up to Tuesday’s midterms, sparking a raft of investigations into election interference, internal intelligence documents show. The hackers have targeted voter registration databases, election officials, and networks across the country, from counties… Continue reading Hackers targeting election networks across country prior to midterms
I attended a conference this past week and I realized that the terminology of IO/IW/Propaganda/SC/PD and every other ‘information term’ is being abused. Seriously abused. Some of the terms receiving serious abuse: Information Operations Information Warfare Propaganda Cyberwar/Cyberwarfare Strategic Communications Public Diplomacy Disinformation Misinformation Malinformation It was seriously disconcerting to hear cyber experts stating they… Continue reading The Use And Abuse Of Information Terms – Solution?
InfowarCon is a simply amazing event. Experts from any and all disciplines having to do with information warfare, writ large, gather, speak, and mingle. Meeting the founder of InfowarCon, Winn Schwartau, is worth the trip alone. His mind is a Category 6 hurricane of expertise, knowledge, experience, and ideas – he’s a force of nature.… Continue reading InfoWarCon Is This Week, 1 to 3 Nov in Leesburg VA
China’s Maxim – Leave No Access Point Unexploited: The Hidden Story of China Telecom’s BGP Hijacking Chris C. Demchak, U.S. Naval War CollegeFollow Yuval Shavitt, Tel Aviv UniversityFollow DOI https://doi.org/10.5038/2378-07126.96.36.1990 Erratum A revised article was uploaded including a disclaimer. Recommended Citation Demchak, Chris C. and Shavitt, Yuval (2018) “China’s Maxim – Leave No Access Point Unexploited: The… Continue reading China’s Maxim – Leave No Access Point Unexploited: The Hidden Story of China Telecom’s BGP Hijacking