Author Archives: Cyber Reconnaissance

La cyber-résilience passe encore beaucoup par l’humain | Renseignements Stratégiques, Investigations & Intelligence Economique

scoop.it - La dernière édition de l’étude de l’institut Ponemon pour IBM sur le sujet souligne l’importance des facteurs humains et organisationnels. Mais la dimension technique n’est non plus absente.


Tweeted by @Expert_IE_ https://twitter.com/Expert_IE_/status/1118813457149722624

The Intelligence Download

baesystemsai.podbean.com - In the months after the attack on Bangladesh Bank, cyber security and financial institutions and experts responded. What did they learn, how did they change their approach and what lessons can other …


Tweeted by @cmenda https://twitter.com/cmenda/status/1118807548646371328

Alahednews:Haaretz Tells of “Israeli”-Saudi Relations: Intelligence, Cyber, Economy and Iran on Top of Partnership

english.alahednews.com.lb - Out of context and away from all the internal debate inside the apartheid entity, Haaretz daily chose to shed light on the Saudi kingdom. Under a file entitled “Saudi Arabia: A Kingdom in Turmoil”, H…


Tweeted by @AlahednewsEn https://twitter.com/AlahednewsEn/status/1118770114801864704

Who is GOSSIPGIRL? | DigTec

digtec.in - Threat intelligence as a discipline is the continuous pursuit of cyber situational awareness. The idea that there are threat actors out there, unbeknownst to us, operating in the shadows, with impuni…


Tweeted by @digtecin https://twitter.com/digtecin/status/1118742733672337408

Nicholas Wakefield on LinkedIn: “Researchers believe hackers from the breakaway Luhansk People’s Republic (LPR) may be behind a spear phishing-based malware campaign that’s been actively targeting the Ukrainian government. The researchers, from FireEye, disclosed their assessment following their investigation into a malware-laced email that they were able to tie back to a 2018 phishing campaign designed to to deliver custom cyber espionage malware called RATVERMIN, aka Vermin. But based on an analysis of malware compilation times and domain resolutions, the group behind these attacks may have been active since as far back as 2014. https://lnkd.in/gwY__R5”

linkedin.com - Researchers believe hackers from the breakaway Luhansk People’s Republic (LPR) may be behind a spear phishing-based malware campaign that’s been actively targeting the Ukrainian government. The resea…


Tweeted by @Mypark58 https://twitter.com/Mypark58/status/1118716098860294144

Source code of Iranian cyber-espionage tools leaked on Telegram – The Breaking News Headlines

thebreakingnewsheadlines.com - In an incident paying homage to the Shadow Agents leak that revealed the NSA’s hacking instruments, any person has now printed an identical hacking instruments belonging to certainly one of Iran’s el…


Tweeted by @breakingnewshe1 https://twitter.com/breakingnewshe1/status/1118705244672864256

Cyber Security & Cloud Expo

cybersecuritycloudexpo.com - Both blockchain and AI are the new-age, disruptive technologies that have created quite a furore. They have a promising future and several entities intend to capitalise on the attributes of these tec…


Tweeted by @ORAMBoston https://twitter.com/ORAMBoston/status/1118671237700575232

The Evolution of Cyber Attacks – CLX Forum

clxforum.org - We have seen an evolution in the sophistication of cyber attacks that hackers employ to get what they want. In the beginning, hackers attacked infrastructure and hardware. This included distributed d…


Tweeted by @SymantecCanada https://twitter.com/SymantecCanada/status/1118665474462633985

Digital Risk Protection | Digital Shadows

digitalshadows.com - As organizations become more interconnected to their supply chain, customers, and partners as a result of digital transformation, new types of risk have emerged – Digital Risks. Unmanaged, these Digi…


Tweeted by @kevinemelia https://twitter.com/kevinemelia/status/1118591053542641664

Waldorf School adopts ‘cyber civics’

suncommunitynews.com - Lake Champlain Waldorf School students learn how computers work in modern history. SHELBURNE | How does a school that consciously limits technology teach its students to use the internet? At Lake Cha…


Tweeted by @CenDemTech https://twitter.com/CenDemTech/status/1118530555321020420

Spies, Lies, and Algorithms

foreignaffairs.com - For U.S. intelligence agencies, the twenty-first century began with a shock, when 19 al Qaeda operatives hijacked four planes and perpetrated the deadliest attack ever on U.S. soil. In the wake of th…


Tweeted by @lprubin73 https://twitter.com/lprubin73/status/1118523160473813001

Michael Boevink 布 纷 奇 on LinkedIn: “The World Economic Forum’s (WEF) Global Risks Report 2018 names cyberattacks and cyber warfare as a top cause of disruption in the next five years, coming only after natural disasters and extreme weather events. The report states, “In a worst-case scenario, attackers could trigger a breakdown in the systems that keep societies functioning. Industry and critical infrastructure like power grids, gas pipelines and water purification systems could be potential targets for hackers, whether they are small groups or state actors.” #VIBE #authenticate “

linkedin.com - The World Economic Forum’s (WEF) Global Risks Report 2018 names cyberattacks and cyber warfare as a top cause of disruption in the next five years, coming only after natural disasters and extreme wea…


Tweeted by @mpmboevink https://twitter.com/mpmboevink/status/1118508168101814272

Top PNP official nabbed for extortion

manilastandard.net - Top PNP official nabbed for extortion A senior police officer was nabbed by operatives of the Philippine National Police Counter-Intelligence Task Force for alleged extortion in Baguio City on Monday…


Tweeted by @MlaStandard https://twitter.com/MlaStandard/status/1118499442783588352

War is Coming to the Baltic States

outsiderclub.com - The shadow of a resurgent Russia looms heavy over its former satellite nations. It's not something you hear very much about. Still, the reality of it is something that has very real, very serious imp…


Tweeted by @OutsiderClub https://twitter.com/OutsiderClub/status/1118481752400515072

DSCI Financial Security Conclave 2019

dsci.in - The second edition of the FINSEC Conclave is all set to be hosted on April 25 & 26, 2019 at Mumbai. Picking up from last year, FINSEC 2019 would endeavour to bring a more nuanced and granular discuss…


Tweeted by @DSCI_Connect https://twitter.com/DSCI_Connect/status/1118474201717854208

Devin Nunes Outlines Three Key Issues Post Mueller Report – Also Confirms Mueller Blocked Key Document Production…

theconservativetreehouse.com - And why does Mueller so often lie in the actual charges in his indictments? E.g. A) [Flynn] the claim/charge that Gen. Flynn lied against the FBI in Jan 2017, despite statements by Comey that the FBI…


Tweeted by @FastEddieV8 https://twitter.com/FastEddieV8/status/1118415517977653248

Press: What dirt does Putin have on Trump?

thehill.com - One thing for sure, the Trump presidency is anything but boring. In fact, almost every week, if not every day, for the last two years, there’s been at least one “I can’t believe this is happening” mo…


Tweeted by @JudyBockel https://twitter.com/JudyBockel/status/1118384202850947074

Balakot Air Strikes and the Jaichand Moment

myind.net - “The supreme art of war is to subdue the enemy without fighting” – Sun Tzu 26th February 2019, 3.30 AM will be a red letter day in the history of India, for on this day a paradigm shift occurred in t…


Tweeted by @myindmakers https://twitter.com/myindmakers/status/1118366031133773826

Kyle Lai on LinkedIn

linkedin.com - Kyle Lai Cybersecurity | AppSec | CISO | Advisory Board | Angel Investor || CISSP, CSSLP, CISA, CIPP/US, CIPP/G2m · Edited Cyber Espionage Campaign Against Ukrainian Government Continues securityweek…


Tweeted by @KyleOnCyber https://twitter.com/KyleOnCyber/status/1118360494967009280

Cyber Sights on Critical Infrastructure

forbes.com - nightman1965 / iStock / Getty Images Plus The cyber crosshairs are firmly on critical infrastructure for anyone looking to cause either severe damage or to seize a platform. This was emphasized most …


Tweeted by @rossdonna1500 https://twitter.com/rossdonna1500/status/1118274328074891265

Ecuador says it has been hit with 40 million cyber attacks since Julian Assange was arrested at its embassy in London

businessinsider.com - Ecuador says it has weathered over 40 million cyber attacks since Julian Assange was arrested five days ago. Ecuador's president Lenin Moreno stripped Assange of asylum status on Thursday, allowing U…


Tweeted by @ProfoundGnosis https://twitter.com/ProfoundGnosis/status/1118203095979311104

Online Backup Reviews- Online Data Backup, Remote Offsite File Storage, Cloud Backup, Small Businesses, Enterprises, Online File Backup, Online Backups Providers Directory, SaaS, Cloud Computing, Data Storage Services, CEO Interviews. Choose the right Internet Web based Online Backups solution

backupreview.info - About F-Secure Nobody knows cyber security like F-Secure. For three decades, F-Secure has driven innovations in cyber security, defending tens of thousands of companies and millions of people. With u…


Tweeted by @backup_review https://twitter.com/backup_review/status/1118189122584305664

MITRE Tech Talks McLean

mitre.org - MITRE is proud to be an equal opportunity employer. MITRE recruits, employs, trains, compensates, and promotes regardless of age, color, race, disability, marital status, national and ethnic origin, …


Tweeted by @MITREcorp https://twitter.com/MITREcorp/status/1118163386464968704

EU raises stakes in cyber espionage faceoff

politico.eu - POLITICO Pro is our premium policy intelligence service, providing the most distinct coverage of the EU and beyond. Request a trial here and discover why thousands of politics and policy professional…


Tweeted by @laurenscerulus https://twitter.com/laurenscerulus/status/1118144492484345859

As artificial intelligence grows, protecting the expanding AI “attack surface” poses complex challenges for business. Accenture Labs explains how we defend against “adversarial AI:”

accenture.com - While AI attack surfaces are only just emerging, business leaders’ security strategies should account for adversarial AI, with an emphasis on engineering resilient modelling structures and strengthen…


Tweeted by @KristenTurzak https://twitter.com/KristenTurzak/status/1118136967076696065

Second edition of the essay competition “Sanremo New Voices in International Humanitarian Law” – International Institute of Humanitarian Law

iihl.org - On the occasion of the 42nd Round Table on Current Issues of International Humanitarian Law, the International Institute of Humanitarian Law and the International Committee of the Red Cross are pleas…


Tweeted by @estubbinsbates https://twitter.com/estubbinsbates/status/1118135118084886528

Spear Phishing Campaign Targets Ukraine Government and Military; Infrastructure Reveals Potential Link to So-Called Luhansk People’s Republic « Spear Phishing Campaign Targets Ukraine Government and Military; Infrastructure Reveals Potential Link to So-Called Luhansk People’s Republic

fireeye.com - In early 2019, FireEye Threat Intelligence identified a spear phishing email targeting government entities in Ukraine. The spear phishing email included a malicious LNK file with PowerShell script to…


Tweeted by @JohnHultquist https://twitter.com/JohnHultquist/status/1118126727929180162

Muscle Memory and Cyber Fitness Training

securityintelligence.com - Listen to this podcast on iTunes, Soundcloud or wherever you find your favorite audio content. Cyber hygiene matters. According to the Online Trust Alliance, 93 percent of breaches in 2017 could have…


Tweeted by @davidrmoulton https://twitter.com/davidrmoulton/status/1118125101847916544

Rapport ANSSI 2018 : Le cyber-espionnage plus actif que jamais – Le Monde Informatique | Renseignements Stratégiques, Investigations & Intelligence Economique

scoop.it - En dépit d'une baisse du nombre de signalements et d'incidents de cybersécurité sur l'année auprès de l'agence nationale de la sécurité des systèmes d'information sur un an, la cybermenace a été plus…


Tweeted by @Expert_IE_ https://twitter.com/Expert_IE_/status/1118115917907537920

AI: An opportunity or threat?

newtimes.co.rw - The rise of Artificial Intelligence (AI) has brought about remarkable innovations in the world of technology. Artificial Intelligence is defined as the theory and development of computer systems able…


Tweeted by @ThierryDukunde https://twitter.com/ThierryDukunde/status/1118081420457586688

Events

proshare.org - Our 2018 Annual Conference attracted 375 share plans industry professionals and providers, offering hundreds of hours of CPD on all of the essential hot topics, plus abundant networking and business …


Tweeted by @ProShareUK https://twitter.com/ProShareUK/status/1118060235187458048

Preparing for China’s Rapid Rise and Decline

warontherocks.com - China’s rise, one of the defining U.S. national security challenges of our time, has deservedly received attention in each of the last decades-worth of unclassified U.S. government strategies. Unfort…


Tweeted by @christopher_alf https://twitter.com/christopher_alf/status/1118007359710711808

How AI benefits customer service

itbrief.com.au - The use of advanced analytics techniques for customer care is finally moving out from the lab and into production. Machine learning and artificial intelligence can be used to find context in the tons…


Tweeted by @DD_NaNa_ https://twitter.com/DD_NaNa_/status/1117978522021052416

Khaled Fattal on LinkedIn: “European council site down and defaced by Anonymous. Last week at the WSIS2019 ITU UN summit I warned leaders of nations & business of today’s Geo-Poli-Cyber warfare taking place worldwide. Tonight, it is playing in front of our own eyes. “CyberSecurity is No longer the Keyword – Survivability In A Geo-Poli-Cyber™ Threatened World is”.”

linkedin.com - European council site down and defaced by Anonymous. Last week at the WSIS2019 ITU UN summit I warned leaders of nations & business of today's Geo-Poli-Cyber warfare taking place worldwide. Tonight, …


Tweeted by @kf_MLiGrp https://twitter.com/kf_MLiGrp/status/1117953321573277696

‎Recorded Future – Inside Threat Intelligence for Cyber Security: 099 Chinese Charm Attempts to Alter American Political Opinion on Apple Podcasts

podcasts.apple.com - There’s an increasing awareness of foreign influence on American institutions through social media. U.S. intelligence agencies have asserted that Russians made a concerted effort to disrupt and influ…


Tweeted by @BlendedWing https://twitter.com/BlendedWing/status/1117939621067939840

Expected Incredible Growth of 22.16% CAGR for Visual Analytics Market by Forecast to 2020: Leading Companies Covered – Alteryx, BeyondCore, Datameer, Datawatch, Logi Analytics, MicroStrategy, Oracle, OpenText (Actuate), Pentaho, Platfora, Sisense, Teradata, TIBCO Software. – Industry Reports

industryreports24.com - Visual Analytics is a form of data analysis that helps in problem solving by displaying the data in a graphical and interactive way. Visual analytics solutions are used to understand the significance…


Tweeted by @SuccessPros https://twitter.com/SuccessPros/status/1117930231564603392

Mohamed Ouabi on LinkedIn

linkedin.com - Mohamed Ouabi Regional Sales Manager at SplunkNow · Edited Game of Thrones: A Tale of Fire(walls) and ICE (Infiltrating Cyber Espionage) splunk.com


Tweeted by @mohamed_ouabi https://twitter.com/mohamed_ouabi/status/1117875484010745857

Technology for security

smetimes.in - Top Stories » Wholesale inflation rises to 3.2% in March » New debt resolution rules after election: Report » Petrol, diesel prices up slightly » Fiscal deficit within Budget target: Shaktikanta » 'C…

9 Reasons to Go for a Data Science Course

techopedia.com - In today’s day and age, more and more companies are seeing the value in data-driven technologies, such as artificial intelligence and automation. As such, the need for highly skilled and qualified da…


Tweeted by @Obraich https://twitter.com/Obraich/status/1117806595478622208

Don’t Fight the Robots. Tax Them.

nytimes.com - Daron Acemoglu, an economist at the Massachusetts Institute of Technology, explains that automation often produces benefits of dubious value to the business itself. More important, he suggests that t…


Tweeted by @maxversace https://twitter.com/maxversace/status/1117794742203502592

Podcasts | The Chertoff Group

chertoffgroup.com - Cybercriminals are escalating the cyber arms race with pace and determination. Cybersecurity expert Bill Connor, president and CEO of SonicWall, helps us explore the tactical advances by both the sec…


Tweeted by @ChertoffGroup https://twitter.com/ChertoffGroup/status/1117792426092113920

Trust in Trump remains low worldwide

pewglobal.org - By Richard Wike, Bruce Stokes, Jacob Poushter, Laura Silver, Janell Fetterolf and Kat Devlin Confidence in the American president to do the right thing regarding world affairs is largely unchanged th…


Tweeted by @denisekessel https://twitter.com/denisekessel/status/1117789784880177154

Cybrary and CSFI Announce Strategic Alliance to Expand Training and Career Guidance Offerings to Cyber Warfare Professionals – Cybrary

cybrary.it - College Park, MD – April 15, 2019 – The Cybersecurity Forum Initiative (CSFI), a non-profit providing cyber warfare awareness, guidance, and security solutions through collaboration, education, volun…


Tweeted by @cybraryIT https://twitter.com/cybraryIT/status/1117789754404352003

Account With Admin Privileges Abused to Install BitPaymer Ransomware via PsExec – TrendLabs Security Intelligence Blog

blog.trendmicro.com - Ransomware may have experienced a decline in 2018, but it seems to be getting back on track — only this time, attacks are looking to be more targeted. Coming on the heels of news about a ransomware a…


Tweeted by @Belgium_Cyber https://twitter.com/Belgium_Cyber/status/1117759613359673345

Smart light IOT Market Latest Trends, Technology Advancement and Demand 2019 to 2025 – The Market Research News

themarketresearchnews.com - The report provides a unique tool for evaluating the Market, highlighting opportunities, and supporting strategic and tactical decision-making. This report recognizes that in this rapidly-evolving an…


Tweeted by @SuriyaSubraman https://twitter.com/SuriyaSubraman/status/1117757474134618113

The role of captives in cyber risk

aig.co.uk - Given some of the confusion in the insurance market and the complexity of the risks, the benefits of retaining those risks via a captive and thereby gaining a better understanding of the losses and e…


Tweeted by @AIGemea https://twitter.com/AIGemea/status/1117755698820128770

NTT Europe

eu.ntt.com - This year’s report focuses on several security challenges we have observed in organizations over the past year. Our analysis shows an escalation in coin mining, web-based attacks and credential theft…


Tweeted by @NTT_Europe https://twitter.com/NTT_Europe/status/1117723996143931393

Cybercriminals turn opportunistic with cryptocurrency mining; continue to exploit vulnerabilities; steal data and resources to disrupt businesses and individuals in Asia Pacific – Asia News Center

news.microsoft.com - ASIA PACIFIC & SINGAPORE, 21 March 2019 – Even as businesses capitalize on the latest security intelligence and protections to stay ahead in the evolving cybersecurity landscape, Asia Pacific continu…


Tweeted by @MicrosoftASIA https://twitter.com/MicrosoftASIA/status/1117722732383354882