In this issue we discuss why the top US intelligence office feels the persistent danger of Russian cyberattacks is akin to the “blinking red light” warnings ahead of the Sept. 11, 2001 attacks; an attempted attack on a Ukrainian chlorine factory; and the EU’s NIS Directive to tighten security for critical infrastructure organizations, with fines for non-compliance up to $20M.
In this CyberWire podcast from July 24, CyberX VP of Industrial Cybersecurity Phil Neray discusses Russian cyber-reconnaissance. Listen to his comments in the podcast recording starting at 3:29. “It’s dangerous and reckless to assume that Russian cyber-reconnaissance can be discounted because no one has actually turned off the power yet. It’s clear that our adversaries […]
In this issue we discuss: VPNFilter malware that captures MODBUS traffic and destroys routers; how the Iranian government has contracted 50 separate hacking groups to strike Western targets; why North Korean hackers are treated like Olympic athletes by the DPRK; and the DHS’s new cyber strategy.
In this issue, we have a number of new stories about Dragonfly (aka Energetic Bear), the Russian threat group that’s targeted energy firms since at least 2013. You’ll also read about why Iran is now perceived as having an “A-Team” of cyberattackers, and several articles about why routers are now juicy targets for attackers.