Search Results for: cyber warfare Blog Post Conti Ransomware Gang Announces Support of Russia – Ukrainian Member Leaks Chats February 28, 2022 To no one’s surprise, the infamous Conti ransomware gang, known for having close ties with Russian intelligence, announced that it... Blog Post Steve Durbin, Managing Director at the ISF Interview with Ondrej Krehel About Current Cyber Threats October 1, 2020 ISF Podcast: A Digital Forensics Specialist on Data Breaches It is an unavoidable fact that businesses and organizations’ sensitive information... Blog Post Should I Pay the Ransom? How to Negotiate with Attackers? May 18, 2021 Should I pay the ransom? In the age of cyber warfare, the question is too frequent to ask; however, it... Blog Post North Korea is Reusing Malware! What Does This Mean? February 29, 2020 Among the hacking groups from North Korea, there is a group called Lazarus has plundered and pillaged the global internet,... Blog Post What Is Remote Access Trojan and How To Protect Against It? January 25, 2021 Our systems’ existing capabilities to enable remote access have proven to be a game-changer during the ongoing pandemic. Remote access... Blog Post Hackers found serious vulnerabilities in a US McDonnell Douglas F-15 Fighter Jet August 21, 2019 A team of hackers given unprecedented access to a flight system used in F-15 fighter jets reportedly confirmed the existence... Blog Post Hacking threatens U.S.’s standing as world’s leading military power, U.S. Navy study says June 16, 2019 Navy, Industry Partners Are ‘Under Cyber Siege’ by Chinese Hackers, Review Asserts. WASHINGTON -The Navy and its industry partners are... Blog Post Britain is Creating a 2,000 Member Cybersecurity Unit to Combat Russian Threat September 21, 2018 In a significant increase of its ability to counter and wage an escalating cybersecurity war, Britain has created a new... Blog Post 2019 Eye Opening Cyber Security Statistics June 26, 2019 Remember! The Most Effective Cyber Defense is Proactive Cybersecurity – Cyber Crime Facts, Predictions and Statistics. If your organization has... Blog Post Hackers stole Mars missions 500Mb of data and breached NASA’s satellite dish network June 27, 2019 The U.S. National Aeronautics and Space Administration (NASA) this week confirmed that its Jet Propulsion Laboratory (JPL) has been hacked.... Blog Post Chinese State Hackers Steal Highly-Sensitive US Navy Data: Report June 8, 2018 Chinese state-sponsored hackers have stolen a massive trove of sensitive information from a US Navy contractor, according to the Washington... Blog Post We Have “a Full Spectrum Of Response Options” to Cyberattacks: DHS Secretary April 23, 2018 The United States is not backing down in the escalating threat of cyberwarfare. Speaking at the RSA cybersecurity conference in... Blog Post Cyber Wars: UK Considers Retaliatory Cyberattack if Targeted by Russia April 13, 2018 The British government is reportedly considering launching a cyber attack against Russia, in retaliation, if Russia launched strikes against the... Blog Post Critical Infrastructure: A Prime Target in CyberWarfare March 4, 2022 The U.S. Department of Homeland Security (DHS) categorizes critical infrastructure as physical or virtual systems or assets so vital to... Blog Post Republican Party Emails Hacked December 7, 2018 Hackers breached thousands of emails belonging to Republican party members. This is major hack was reported by The National Republican...
Blog Post Conti Ransomware Gang Announces Support of Russia – Ukrainian Member Leaks Chats February 28, 2022 To no one’s surprise, the infamous Conti ransomware gang, known for having close ties with Russian intelligence, announced that it...
Blog Post Steve Durbin, Managing Director at the ISF Interview with Ondrej Krehel About Current Cyber Threats October 1, 2020 ISF Podcast: A Digital Forensics Specialist on Data Breaches It is an unavoidable fact that businesses and organizations’ sensitive information...
Blog Post Should I Pay the Ransom? How to Negotiate with Attackers? May 18, 2021 Should I pay the ransom? In the age of cyber warfare, the question is too frequent to ask; however, it...
Blog Post North Korea is Reusing Malware! What Does This Mean? February 29, 2020 Among the hacking groups from North Korea, there is a group called Lazarus has plundered and pillaged the global internet,...
Blog Post What Is Remote Access Trojan and How To Protect Against It? January 25, 2021 Our systems’ existing capabilities to enable remote access have proven to be a game-changer during the ongoing pandemic. Remote access...
Blog Post Hackers found serious vulnerabilities in a US McDonnell Douglas F-15 Fighter Jet August 21, 2019 A team of hackers given unprecedented access to a flight system used in F-15 fighter jets reportedly confirmed the existence...
Blog Post Hacking threatens U.S.’s standing as world’s leading military power, U.S. Navy study says June 16, 2019 Navy, Industry Partners Are ‘Under Cyber Siege’ by Chinese Hackers, Review Asserts. WASHINGTON -The Navy and its industry partners are...
Blog Post Britain is Creating a 2,000 Member Cybersecurity Unit to Combat Russian Threat September 21, 2018 In a significant increase of its ability to counter and wage an escalating cybersecurity war, Britain has created a new...
Blog Post 2019 Eye Opening Cyber Security Statistics June 26, 2019 Remember! The Most Effective Cyber Defense is Proactive Cybersecurity – Cyber Crime Facts, Predictions and Statistics. If your organization has...
Blog Post Hackers stole Mars missions 500Mb of data and breached NASA’s satellite dish network June 27, 2019 The U.S. National Aeronautics and Space Administration (NASA) this week confirmed that its Jet Propulsion Laboratory (JPL) has been hacked....
Blog Post Chinese State Hackers Steal Highly-Sensitive US Navy Data: Report June 8, 2018 Chinese state-sponsored hackers have stolen a massive trove of sensitive information from a US Navy contractor, according to the Washington...
Blog Post We Have “a Full Spectrum Of Response Options” to Cyberattacks: DHS Secretary April 23, 2018 The United States is not backing down in the escalating threat of cyberwarfare. Speaking at the RSA cybersecurity conference in...
Blog Post Cyber Wars: UK Considers Retaliatory Cyberattack if Targeted by Russia April 13, 2018 The British government is reportedly considering launching a cyber attack against Russia, in retaliation, if Russia launched strikes against the...
Blog Post Critical Infrastructure: A Prime Target in CyberWarfare March 4, 2022 The U.S. Department of Homeland Security (DHS) categorizes critical infrastructure as physical or virtual systems or assets so vital to...
Blog Post Republican Party Emails Hacked December 7, 2018 Hackers breached thousands of emails belonging to Republican party members. This is major hack was reported by The National Republican...