Cybersecurity

Sponsored
by

Cybersecurity / Recently Commented

How Decades-Old Decisions Left U.S. Networks Vulnerable to Chinese Cyberintrusion

It seems like there is more disturbing news every day about Chinese infiltration of our telecommunications networks. A recent headline said that nine large ISPs have now been infiltrated. Tom Wheeler, a previous Chairman of the FCC, recently wrote an article for the Brookings Institute that speculates that the ability of the Chinese to infiltrate our networks stems back to decisions made decades ago that have never been updated for the modern world of sophisticated hacking. more

Is Your Router Spying on You?

If you've followed the telecom industry at all, you've heard of the effort to rip-and-replace Chinese network gear used mostly in cellular networks and in some fiber networks. The U.S. government ordered that such equipment be replaced, although it has funded the replacement in dribs and drabs. There has been heightened scrutiny of Chinese electronics since the recently discovered Beijing-sponsored cyberattacks that have been reported to have infiltrated the networks of major U.S. more

A Review of the 2024 Threat Landscape and Implications for Domain Security

The cybersecurity landscape in 2024 has been characterised by unprecedented complexity and rapidly evolving threats, presenting significant challenges for organisations across all sectors. As the digital attack surface expands and threat actors employ increasingly sophisticated techniques, domain security has emerged as a critical component of a robust cybersecurity strategy. more

Cybersecurity Standards Competition

The conventional wisdom in the world of legacy standards-making is that monolithic standards produce, if not accelerate, better products and services. Conformance, certification, and associated labelling schemes to implement those standards were believed essential to trust. Although competition law seems now evolving in the other direction, regulatory standards-making bodies themselves have been accorded considerable anticompetitive cartel liability protection. more

Chinese Hackers Exploit U.S. Telecom Systems, Eviction Efforts Lag

American officials have revealed an ongoing struggle to expel Chinese hackers from telecommunications networks, months after the espionage was first discovered. The campaign, attributed to a group called "Salt Typhoon," has infiltrated major telecom carriers, particularly in the Washington region. more

UN Cyber Diplomacy II: Cybersecurity and Autonomous Weapon Systems

Cybersecurity and artificial intelligence were among the key topics at the 79th UN General Assembly (UNGA). UNGA's 1st Committee, responsible for disarmament and international security, concluded its negotiations in mid-November 2024. It discussed the 3rd Annual Progress Report (APR) of the Open-Ended Working Group (OEWG) and adopted a resolution that recommends, inter alia, the establishment of a new permanent cybersecurity mechanism within the UN system. Furthermore, it adopted two resolutions on autonomous weapon systems (AWS). more

Biden Administration to Back UN Cybercrime Treaty Amid Controversy

The Biden administration is poised to support a contentious United Nations cybercrime treaty, a move likely to spark debate over potential abuses, according to top officials.  more

Enterprise Domain Stargazing: Understanding Your Company’s Galaxy of Domains

In CSC's recent insight paper, we address the trend that many business leaders today don't realize the extent to which their modern enterprise -- and its millions of digital assets -- rely on. It's a vast domain ecosystem that needs to be protected from online threats. Often, to better understand this need for domain security, we need to understand how critical and interconnected domains are within a business. more

How Dormant Domains Can Be Weaponized During Events Like the 2024 U.S. Election

As with any high-stakes event, elections have become a prime target for cybercriminals seeking to exploit public trust through impersonation, misinformation, and scams. CSC's comprehensive research about the 2024 U.S. Election reveals the alarming role of dormant domains, which have the potential to be exploited for launching cyber attacks against political campaigns, organizations, and constituents. more

Security Shortfalls Exposed in End-to-End Encrypted Cloud Storage Providers

A recent study critically examines the security of popular end-to-end encrypted (E2EE) cloud storage providers, uncovering significant vulnerabilities in platforms widely marketed for their user-controlled privacy features. more

Senate Urges Domain Registrars to Combat Russian Election Interference

The United States Senate Intelligence Committee Chair, Mark Warner, has called on several domain name registrars, including Namecheap, GoDaddy, and Cloudflare, to address the misuse of their services by Russian actors attempting to influence the 2024 U.S. presidential election. more

Sudanese Nationals Charged in Global Cyberattack Campaign

Two Sudanese nationals have been indicted for allegedly leading Anonymous Sudan, a cybercriminal group responsible for over 35,000 Distributed Denial of Service (DDoS) attacks targeting critical infrastructure worldwide. more

NordVPN Introduces Quantum-Resilient Encryption

NordVPN, a leading VPN service provider, has unveiled its first application featuring quantum-resilient encryption – a significant advancement in cybersecurity. Post-quantum cryptography support is currently available on NordVPN’s Linux client, with plans to extend this enhanced security to all applications by early 2025. more

Has Your ISP Been Hacked? (Growing Concern Over AI-Driven Hacking)

As if we didn't have a long enough list of problems to worry about, Lumen researchers at its Black Lotus Labs recently released a blog that said that it knows of three U.S. ISPs and one in India was hacked this summer. Lumen said the hackers took advantage of flaws in software provided by Versa Networks being used to manage wide-area networks. more

Over 2 Million VPN Passwords Compromised by Malware Attacks

A recent report from Specops Software reveals alarming security vulnerabilities within VPN password systems, highlighting over two million VPN passwords stolen by malware in the past year. more