Colonial Pipeline Cyberattack Follows Years of Warnings

Colonial Pipeline Cyberattack Follows Years of Warnings
Colonial Pipeline Cyberattack Follows Years of Warnings

“We are disappointed, though unsurprised, to learn of the cyberattack,” Sen. King and Rep. Gallagher said. “We can and must be better… in navigating the threats of the Age of Cyber Aggression.”

US Agencies, Defense Companies Hacked Via VPNs

US Agencies, Defense Companies Hacked Via VPNs
US Agencies, Defense Companies Hacked Via VPNs

Threat actors are targeting one newly discovered and three previously known vulnerabilities in Pulse Connect Secure enterprise VPNs, according to a CISA emergency directive and alert, as well as blog posts by FireEye and Ivanti. “There is no indication the identified backdoors were introduced through a supply chain compromise of the company’s network or software deployment process,” FireEye noted.

US Slaps Russia With Sanctions Plus For SolarWinds Hack

US Slaps Russia With Sanctions Plus For SolarWinds Hack
US Slaps Russia With Sanctions Plus For SolarWinds Hack

The White House Executive Order comes on the same day that CISA and CNMF issue SolarWinds-related malware analysis and NSA-CISA-FBI issue a joint advisory warning of ongoing SVR exploitation of known vulnerabilities in common products.

Iran Threatens Israel After Cyber Strike On Nuke Facility

Iran Threatens Israel After Cyber Strike On Nuke Facility
Iran Threatens Israel After Cyber Strike On Nuke Facility

Middle Eastern sources say Sunday’s cyberattack caused a blackout at the Natanz facility and damaged centrifuges. It occurred on the same day Defense Secretary Lloyd Austin landed in Israel for talks, a day after Iran announced new centrifuges at Natanz, and within a week of the US restarting talks to revive the JCPOA.

Why Was The SolarWinds Campaign So Difficult to Detect?

Why Was The SolarWinds Campaign So Difficult to Detect?
Why Was The SolarWinds Campaign So Difficult to Detect?

Only after months of investigation by nearly 100 highly skilled digital forensics experts did FireEye discover the malicious “implant” in the most unlikely place. We break it all down in plain language.

The Network: Where Hybrid War Meets AirSea Battle

WASHINGTON: In the budget wars between the services, “hybrid threats” and “AirSea Battle” have become rallying buzzwords of two opposing camps. On one side, Army leaders talk of hybrid threats, whose blend of guerrilla tactics and high-tech weapons pose the greatest plausible threat on land, now that Soviet-style tank armies are extinct and the nation…

Military Debates Who Should Pull The Trigger For A Cyber Attack

VIRGINIA BEACH, VA: The American military is intrigued by the offensive uses for cyber-warfare, but it is struggling to figure out how to do it. What impact can cyber weapons have on the battlefield? What organizations should take the lead? And who makes the decision to pull the trigger? “We’ve been thinking 90% defense, 10%…

White House Details Cyber Conflict

Over the past two months the President and the U.S. military have been in discussions or negotiations that have resulted in multiple Executive Orders that frame offensive military operations in cyber space. Media outlets are now reporting that President Barack Obama more than a month ago signed executive orders that detail how the military may…