Category U.S. Cyber Command

America Rethinks Its Strategy In The Wild West Of Cyberspace

America rethinks its strategy in the Wild West of cyberspace The Economist May 30th 2020WASHINGTON, DC COVID-19 HAS been a phisherman’s friend. Millions of professionals are at home and online, adjusting to new routines and anxious about their jobs. That makes them perfect marks: apt to click on an email that purports to be from their […]

The NSA Has A Warning: Russia’s Most Infamous Hackers Are Still Active

The NSA has a warning: Russia’s most infamous hackers are still active The alert describes how the GRU is targeting a vulnerability in unpatched Unix systems, an alternative to the operating systems of Microsoft and Apple. NBC News · by Kevin CollierKevin Collier is a cybersecurity reporter based in New York City. · May 28, 2020 The same […]

VPN Demand In Hong Kong Reveals A New Fear: China Weaponizing The Internet

VPN demand in Hong Kong reveals a new fear: China weaponizing the Internet https://fortune.com/2020/05/26/hong-kong-china-vpn-internet/ BY GRADY MCGREGOR May 26, 2020 6:05 AM EDT   Tear gas was still fresh in the air as Lee, a 33-year-old demonstrator, watched a line of protesters trade insults with riot police in downtown Hong Kong on Sunday during a lull […]

New Malware Ramsay, Can Steal Data From Air-Gapped Computers

New Malware Ramsay, Can Steal Data From Air-Gapped Computers   http://www.fortunascorner.com      Sudais Asif posted a May 14. 2020 article to the cyber security and technology website, HackRead.com, with the title above. For the better part of two decades, government and corporate entities, and others — have ‘protected’ their most precious digital information on stand-alone, air-gapped […]

SOCOM Chief: Door-Kickers Are Out, Cyber Operators Are In

Excerpts:   Speaking to thousands of members of the defense industrial base at the 2020 Virtual Special Operations Forces Industry Conference, SOCOM commander Army Gen. Richard Clarke laid out his vision for the future of U.S. special operations around the globe, a future that, while still centered on violent extremism, will rely heavily on information […]

U.S. To Accuse China Of Trying To Hack Vaccine Data, As Virus Redirects Cyberattacks

Cyberattacks Iran and other nations are also looking to steal data and exploit the pandemic with attacks on infrastructure, officials say. Chad Wolf, center, the acting secretary of Homeland Security, with President Trump and members of the coronavirus task force in March. The department is preparing to issue a warning about Chinese cyberattacks.Credit…Erin Schaff/The New […]

Chinese Military Cyber Spies Just Caught Crossing A ‘Very Dangerous’ New Line

Excerpts: The military espionage group’s tactics, described by Check Point as “very dangerous,” involved hijacking diplomatic communication channels to target specific computers in particular ministries. The malware-laced communications might be sent from an overseas embassy to ministries in its home country, or to government entities in its host country. “The group has introduced a new cyber […]

Trump Declares National Emergency As Foreign Hackers Threaten U.S. Power Grid

Trump Declares National Emergency As Foreign Hackers Threaten U.S. Power Grid Forbes · by Davey Winder · May 2, 2020 President Trump declares cyber-attacks against U.S. power grid a national emergency Getty ImagesPresident Trump has signed an executive order that declares foreign cybersecurity threats to the U.S. electricity system a national emergency. President Trump signed an executive order, […]

The Future Of Cyber Warfare – An Interview With Greg Austin | Strife

Excerpts: ES: What is the Measuring Coercive Cyber Power project? GA: This is a project that began at the IISS before I joined and has been run by a couple of very experienced professionals. Its purpose is to understand the basic fundamentals of cyber power. In other words: what are its economic, scientific, technological, and […]

The Hermit Kingdom In The Digital Era: Implications Of The North Korean Problem For The SOF Community

David Maxwell Comment:  “This is a Cyber-SOF focused essay.  It does not cover the entire scope of the north Korean problem for the SOF community but provides some interesting analysis from a Cyber-SOF perspective.  I think this is a useful essay but we should not forget some of the fundamental SOF capabilities/operations/mission that must be […]