Geopolitical, Terrorism

Russian Hackers Targeted 21 States during Prez Election Says DHS Cyber Expert

Russian Hackers Targeted 21 States during Prez Election Says DHS Cyber Expert

Russian hackers targeted 21 US states' election systems in last year's presidential race, a Department of Homeland Security official told Congress on Wednesday. Jeanette Manfra, the department's acting deputy undersecretary of cyber security, would not identify which states had been targeted, citing confidentiality agreements. She reiterated that there was no evidence that any actual votes were...

Qatar: News Agency Hacking Linked to States Boycotting Doha

Qatar: News Agency Hacking Linked to States Boycotting Doha

Qatar's attorney general said on 20 June, his country has evidence that the hacking of Qatar's state news agency was linked to countries that have severed ties with Doha. Saudi Arabia, Egypt, Bahrain and the United Arab Emirates cut their ties with Doha earlier this month over comments alleged to have been made by the Emir Sheikh Tamim bin Hamad al-Thani and posted briefly on the Qatar News...

Australia Moves to Guard Classified Docs from Cyber Espionage

Australia Moves to Guard Classified Docs from Cyber Espionage

Australia says it will move classified government information from a private data center in Sydney after a Chinese consortium bought a major stake in the company. The move comes despite assurances from the company, Global Switch, that its files are secure. Global Switch owns two secure data facilities in downtown Sydney, and stores classified Australian government defense and intelligence files....

  • More at VOA
  • |
  • |
After Terror Attacks, Britain Moves to Police the Internet

After Terror Attacks, Britain Moves to Police the Internet

After deadly terrorist attacks and a nationwide election, Britain is once again focusing on a controversial plan: to regulate the internet. Lawmakers from across the political spectrum are promoting some of the widest-ranging plans anywhere in the western world to rein in the likes of Google, Facebook and Twitter, setting up a likely standoff. Recent legislation already gives Britain’s law...

Poland: Opening of the New European X-Force Command Center in Wroclaw

Poland: Opening of the New European X-Force Command Center in Wroclaw

IBM announced the official opening of a newly refurbished and greatly expanded X-Force Command Center in Wroclaw, Poland, the latest addition to IBM’s global X-Force footprint. This advancement will enable them to collaborate at a deeper and more intricate level with the IBM X-Force best-of-breed global infrastructure and world-renowned research team. The center, by default, operates as part of...

Canada: CSE Believes Hacktivists Will Target Its 2019 Elections

Canada: CSE Believes Hacktivists Will Target Its 2019 Elections

At a news conference held on June 16 2017, Canada's Communications Security Establishment (CSE) said it was likely that hackers would try to interfere with its 2019 elections. But the problem, as of now, isn't with Russia -- it's with hacktivists. CSE said they expect some well-planned attacks from hacktivists in the upcoming elections and will offer cyber security advice to both parliamentarians...

Facebook Taps Artificial Intelligence in New Push to Choke Terrorist Propaganda

Facebook Taps Artificial Intelligence in New Push to Choke Terrorist Propaganda

With attacks on Western targets increasing pressure, Facebook says it's making a new push to crack down on terrorist activity by using sophisticated algorithms to mine words, images and videos to root out and remove extremists' propaganda and messages. Artificial intelligence can't do the job alone, so Facebook says it has amassed a team of 150, including counterterrorism experts, who are...

Wikileaks Discloses 'Cherry Blossom' — Wireless Hacking System Used by CIA

Wikileaks Discloses 'Cherry Blossom' — Wireless Hacking System Used by CIA

WikiLeaks has published a new batch of the ongoing Vault 7 leak, this time detailing a framework – which is being used by the CIA for monitoring the Internet activity of the targeted systems by exploiting vulnerabilities in Wi-Fi devices. Dubbed "Cherry Blossom". Cherry Blossom is basically a remotely controllable firmware-based implant for wireless networking devices, including routers and...

FBI and DHS Issue Alert Over North Korean DDoS Threat

FBI and DHS Issue Alert Over North Korean DDoS Threat

In a US-CERT alert issued this week, the FBI and DHS detailed the existence of malware dubbed DeltaCharlie. Its purpose: to manage a massive botnet which is capable of launching crippling DDoS attacks. According to the alert, the Lazarus Group has been using DeltaCharlie to target "media, aerospace, financial, and critical infrastructure sectors in the United States and globally." DeltaCharlie is...

Malware Campaign Targeted Palestinian Elections, Finds Report

Malware Campaign Targeted Palestinian Elections, Finds Report

A new malware campaign dubbed Kasperagent was deployed during recent Palestinian Authority elections, according to a report from ThreatConnect. The perpetrator and exact targets remain unclear. Tactics included malware-laced fake news websites and spearphishing messages with content on political tensions and alleged Israeli assassination in Gaza as well as attack infrastructure with Gaza...

Era of Russian Hacks: US is Still Installing Russian Software on Govt. Systems

Era of Russian Hacks: US is Still Installing Russian Software on Govt. Systems

On one hand, top intelligence officials at the FBI, CIA and the National Security Agency tell members of Congress that Kaspersky Lab can’t be trusted, that they wouldn’t put its products on their personal computers, let alone the nation’s. On the other hand, federal agencies still use the Moscow-headquartered anti-virus software. This disparity between official concern about the Kaspersky...

Business Risks Drawn From Geopolitical Flashpoints

Business Risks Drawn From Geopolitical Flashpoints

Flashpoint's mid-year Business Risk Intelligence Report analyzes data from geopolitics and the deep and dark web to show how threat actors and their motivations have evolved over the first six months of 2017, and to provide insight into what new threats might appear. It comprises sections covering both the primary nation-states and the main threat sub-sections. Russia: The report notes the...

U.S. Blames North Korea for Hacking Spree, Says More Attacks a Possibility

U.S. Blames North Korea for Hacking Spree, Says More Attacks a Possibility

The U.S. government on Tuesday issued a rare alert squarely blaming the North Korean government for a raft of cyber attacks stretching back to 2009 and warning that more were likely. The joint warning from the U.S. Department of Homeland Security and the Federal Bureau of Investigation said that "cyber actors of the North Korean government," referred to in the report as "Hidden Cobra," had...

Russian Cyber Hacks on U.S. Electoral System Bigger Than Previously Known

Russian Cyber Hacks on U.S. Electoral System Bigger Than Previously Known

Russia’s cyberattack on the U.S. electoral system before Donald Trump’s election was far more widespread than has been publicly revealed. Illinois became Patient Zero in the government’s probe, eventually leading investigators to a hacking pandemic that touched four out of every five U.S. states. Using evidence from the Illinois computer banks, federal agents were able to develop digital...

Israel Hacked ISIS Cell to Expose Laptop-Bomb Plot to Down International Flights

Israel Hacked ISIS Cell to Expose Laptop-Bomb Plot to Down International Flights

Israel’s top hacking operations against the Islamic State (ISIS) led to the discovery that a small cell of bombmakers in Syria was planning to down planes using sophisticated laptop bombs. The cell of ISIS bombmakers had designed the explosives to fool airport X-ray machines into interpreting them as batteries for laptop computers. The closely guarded intelligence became public knowledge when,...

N.Korea Dodging Sanctions Through Web of Illicit Networks

N.Korea Dodging Sanctions Through Web of Illicit Networks

Sanctions have failed to stop North Korea's weapons program because the regime has a "complex overseas financing and procurement system" earning hard currency from anything from cybercrime to wildlife smuggling, a report said on 13 June. Pyongyang, "far from being isolated, is globally active through its overseas networks," which are helping to raise the funds and materials the country needs for...

  • More at Yahoo
  • |
  • |

Read about the latest happening in geopolitical cyberspace and cyber terrorist attacks

This category provides expertly curated news on the geopolitical and terrorism related aspects of the cyberspace. It has now been globally accepted that cyberspace has emerged as the fifth domain of warfare and geopolitics; the other four being land, air, water and space. No country can now afford to overlook the cyber dimension to their national security. The terrorists have become very much active on the cyber space as is evident from the recent activities of the Islamic State. Cyber terrorism has emerged as a major challenge for the security agencies. The terrorists are finding it meaningful to conduct cyber attacks on the national assets and make them dysfunctional and achieve their means of spreading terrorism. The state actors are also finding it convenient to conduct cyber attacks for achieving geopolitical gains because of lack of attribution in cyberspace. A “Great Game-Cyber” is being played now among the major powers of the world wherein the security of private sector and government sector is intricately linked to the national security. For any security professional, to understand the geopolitical and terrorism aspects of cyberspace, news from this category should never be missed.