This operation — which involved the FBI removing malware from privately owned and operated victim servers without advance notice — could be unprecedented, at least at this scale.
By Brad D. Williams“We should understand what our adversaries are doing,” Gen. Nakasone told Congress. “They are no longer launching attacks from different parts in the world. They understand that they can come into the US, use our infrastructure, and there’s a blind spot for us not being able to see them.”
By Brad D. WilliamsFollowing CISA’s weekend updates on continuing Exchange server hacks, Microsoft is investigating the significant uptick in exploits just days before patches were released.
By Brad D. WilliamsThree experts gave us exclusive in-depth insights into the administration’s potential menu of retaliatory options, along with U.S. cyber strategic, policy, and operations considerations.
By Brad D. WilliamsGurucul CEO Saryu Nayyar told Breaking Defense, “A threat like this really is one of those rare ‘Stop what you are doing and fix this now!’ events.”
By Brad D. WilliamsSecurity professionals are increasingly observing multiple threat actors, from nation-states to cryptominers, exploiting the vulnerabilities. As for China-based HAFNIUM, “This is part of the much larger Chinese effort to constantly be ferreting out new vulnerabilities and then exploiting them — with no end in sight,” said Heritage’s Dean Cheng. “The Chinese will pay close attention to the Biden administration response.”
By Brad D. WilliamsThe cyberespionage campaign is said to be affecting the U.S. defense industrial base, think tanks, and “hundreds of thousands” of organizations globally. Microsoft is implicating China.
By Brad D. Williams