Cybersecurity

Sponsored
by

Cybersecurity / Recently Commented

‘Vulkan Files’ Leak Reveals Unique Insight Into Russian Cyber-War Plans

According to reports on Thursday, an anonymous person has Leaked confidential documents of NTC Vulkan, a Moscow-based defense contractor. It is believed that the documents are authentic and have been provided by an anonymous source who was greatly disturbed by Russia's attack on Ukraine.  more

Minimized DNS Resolution: Into the Penumbra

Over the past several years, domain name queries - a critical element of internet communication - have quietly become more secure, thanks, in large part, to a little-known set of technologies that are having a global impact. Verisign CTO Dr. Burt Kaliski covered these in a recent Internet Protocol Journal article, and I'm excited to share more about the role Verisign has performed in advancing this work and making one particular technology freely available worldwide. more

Processing Domain Data to Improve Business Continuity as a Domain Name Registry

In the fall of 2022, around 9,000 numeric domain names such as 0146.se, 0148.se, 0149.se, and so on were registered in the .SE zone. These domains were registered with two registrars, Register.eu and 1API. They had the same kind of SSL certificate, and there were other similarities among them that strongly suggested they were connected. All these domains were registered after September 1, 2022, but not on the same date... more

NCA Launches Campaign to Curb DDoS-for-Hire Website Use, Warns of Legal Risks

The United Kingdom's National Crime Agency (NCA) has been running a series of campaigns focused on reducing the use of DDoS-for-hire websites. These websites offer people the opportunity to purchase powerful tools to launch cyber-attacks, which can be used to knock websites or users offline. more

Microsoft Launches AI-driven’ Security Copilot’ to Help Companies Fight Hacking Attempts

Microsoft continues to integrate new artificial intelligence technology into its products and today announced a cybersecurity "copilot" to help companies track and defend against hacking attempts. This tool is part of Microsoft's attempt to dominate the fast-growing field of "generative" AI. more

Europol Warns on the Criminal Usage of ChatGPT and Its Implications for Law Enforcement

Europol's Innovation Lab released a Tech Watch Flash report on Monday, sounding the alarm on the potential misuse of large language models such as ChatGPT. Entitled 'ChatGPT - the Impact of Large Language Models on Law Enforcement,' the report provides an urgent overview of the implications of ChatGPT for criminals and law enforcement, as well as an outlook of what may still be to come. more

Biden Administration Bans Federal Agencies from Using Commercial Spyware

The Biden administration has announced an executive order that would ban U.S. federal agencies from using commercially developed spyware that poses threats to human rights and national security. more

OARC-40: Notes on the Recent DNS Operations, Analysis, and Research Centre Workshop

OARC held a 2-day meeting in February, with presentations on various DNS topics. Here are some observations I picked up from the presentations in that meeting... In a world where every DNS name is DNSSEC-signed, and every DNS client validates all received DNS responses, we wouldn't necessarily have the problem of DNS spoofing. Even if we concede that universal use of DNSSEC is a long time off ... more

Biden-Harris Administration Unveils National Cybersecurity Strategy

Today, the Biden Administration released the National Cybersecurity Strategy, which outlines the use of all available resources to protect the United States' security, safety, and economic prosperity. more

Dish Network Confirms Network Outage Was a Cybersecurity Breach Impacting Customers and Employees

The satellite television provider, Dish Network is currently dealing with a cybersecurity incident that has affected its internal networks, customer support systems, and websites such as boostinfinite.com and dish.com. It is currently investigating the incident and has confirmed certain data was extracted from its IT systems as a result. more

Trust and Insecurity

When I was first advocating home networking at Microsoft, we encountered a problem. The existing systems and applications had implicitly assumed they were inside a safe environment and didn't consider threats from bad actors. Early Windows systems hadn't yet provided file system with access control and other protections though there were some attempts to have separate logins to keep some settings separate. more

Brand Impersonation Online is a Multidimensional Cybersecurity Threat

Brand impersonation happens much more often than people realize. In CSC's latest Domain Security Report, we found that 75% of domains for the Global 2000 that contained more than six characters from the brand names were not actually owned by the brands themselves. The intent of these fake domain registrations is to leverage the trust placed on the targeted brands to launch phishing attacks, other forms of digital brand abuse, or IP infringement... more

New EU Satellites to Protect Government Communications, Provide Connectivity and Surveillance

A new network of European telecommunication satellites will be active from 2024, following the green light by European Parliament. The Infrastructure for Resilience, Interconnectivity and Security by Satellite project is aimed at providing a secure communications infrastructure for EU government bodies and agencies, emergency services and European delegations around the world. more

GoDaddy Reveals Its Network Suffered a Multi-Year Security Compromise

On Friday, GoDaddy revealed that it had suffered a multi-year security compromise that allowed unknown attackers to steal company source code, customer and employee login credentials, and install malware that redirected customer websites to malicious sites. more

Ukraine Conflict Transformed the Cyber Threat Landscape, Says Google

According to a recent analysis, the cyber threat landscape has changed dramatically one year since the Russian invasion of Ukraine. Google TAG, Mandiant, and Trust & Safety have released a report titled, Fog of War: How the Ukraine Conflict Transformed the Cyber Threat Landscape, based on analysis from Google’s Threat Analysis Group (TAG), Mandiant, and Google Trust & Safety. more