Tag Archive for: stay

Helping Every Business Stay Secure Online


PRESS RELEASE

Published May 8, 2023

Finding vulnerabilities before hackers do with the assistance of former real-world white hat hackers

In today’s digital age, every business has an online presence to communicate with clients and showcase their brand. With everything being readily available online, vulnerabilities can be found in the most trusted websites and networks. With this, it is crucial for businesses to seek the help of professionals such as Digital Warfare to ensure that their online presence is free from any cybersecurity issues that can disrupt their businesses and be costly to repair.

For the team at Digital Warfare, they put their clients’ online safety as their number one priority before anything else. Businesses cannot see hackers trying to gain access to their systems and data. What may seem calm on the surface of everyday business operations, may be a digital warfare underneath. But there is no need to worry because their elite cyber unit of industry leading professionals, each with over 25 years of real-world experience as white hat hackers and cyber-strategists will discover the risks no one else can find. This is precisely what sets Digital Warfare apart in the industry. Their resident team members include former real-world white hat hackers that worked for their government.

Digital Warfare applies a strategic approach when taking on a task to find the vulnerabilities of an existing website or network ahead of potential bad hackers. They help companies plan, attack, defend, recover, and learn to stay one step ahead of the hackers, stay secure, and keep on running their businesses. In order to build an effective security program, it must start with creating a cyber strategy that will protect key business data and assets. In this area, Digital Warfare can provide assistance in identifying security priorities, designing and creating the strategy itself, and assessing current plans to determine its effectiveness.

The next step is to put oneself in the position of its enemy and prepare for an attack. In case assets are targeted by the bad hackers, having the skill set and assistance of the Digital Warfare team is essential in finding the vulnerabilities first….

Source…

Pentagon cyber policy post may stay unfilled during review


WASHINGTON — A newly created senior cyber oversight position at the Department of Defense will likely remain unfilled until the end of the year at the earliest, as the Pentagon works with an outside group on the officeholder’s responsibilities and objectives.

A federally funded research and development center, or FFRDC, was selected to examine the assistant secretary of defense for cyber policy role, carved out by the fiscal 2023 National Defense Authorization Act, according to John Plumb, the assistant secretary of defense for space policy and the principal cyber adviser to the defense secretary.

While the ball is already rolling, results aren’t expected for months, Plumb told members of the House Armed Services Committee on March 30. The Rand Corporation is involved in the assessment, the cybersecurity publication The Record reported.

Rep. Mike Gallagher, a Wisconsin Republican at the head of the Cyber, Information Technology and Innovation panel, said at the hearing he’s disappointed by the timing.

“I’m confident that the Senate is ready to rapidly confirm a nominee,” he said. “I’ve had many conversations to that effect.”

A deputy assistant secretary for cyber policy already exists. The position is held by Mieke Eoyang.

Interest in and spending on cyber has boomed in recent years. The Pentagon’s fiscal 2024 budget blueprint includes $13.5 billion for so-called cyberspace activities, such as zero-trust implementation. The sum is nearly 21% more than the FY23 ask.

The assistant secretary gig may include aspects of electronic and information warfare, according to Plumb, who described the forthcoming review as “deliberate.”

“What we are doing is following the template that was used to create my current position, ASD for space, which is putting an FFRDC on contract to examine what is the proper structure, are there different pieces required, what things should be in this,” said Plumb, who was confirmed in March 2022. “That is on contract now. We expect that the study should be done around September. But we are moving forward on it.”

Colin Demarest is a reporter at C4ISRNET, where he covers military networks, cyber and IT. Colin previously covered the…

Source…

As Cyber Strikes Mount, What Happens in Ukraine Doesn’t Stay in Ukraine


The scale of Russia’s cyber-attacks in Ukraine swelled in the first quarter of 2023, a top Ukrainian official told a gathering of top cyber security experts at the Cyber Initiatives Group Spring Summit on Wednesday; part of a new phase of the war to accompany an apparently stalled Russian ground campaign. 

“Conventional warfare and cyber warfare are integrated things,” said Col. Ivan Kalabashkin, Acting Deputy Head of the Cybersecurity Department in the Security Service of Ukraine (SSU), who detailed the nature of simultaneous Russian missile and cyber strikes against Ukrainian military positions and critical infrastructure, including recent strikes at a nuclear facility near Kyiv.  

In 2022, Ukraine reported 4,500 such strikes and related incidents. That number is already at nearly 1,200 in just the first three months of 2023, Kalabashkin said. Ukraine is also dealing with around 1,000 Russian psychological and disinformation operations every month, he added.

Many of these propaganda campaigns now orient around the battle for Bakhmut, a small eastern city that has been a focal point of recent fighting. Russian forces have encircled the city but have been unable to force a Ukrainian withdraw. 

Ukrainian Deputy Defense Minister Hanna Maliar addressed those operations on Wednesday, saying Russia is currently focused on three principal tasks in mass media: 1.) the undermining of civil-military trust, 2.) the discouraging of the Ukrainian army, and 3.) attempting to provoke battlefield mistakes. 

“Our military command, not the Russian psychological operations, will determine how long Bakhmut will be defended,” Maliar added.

And yet as the battle for Bakhmut rages, broader security questions are also being raised, not just about the evolving nature of hybrid warfare, but also about the level of public and private sector preparedness in the U.S. That preparedness includes evolving regulatory and law enforcement frameworks that govern and protect the comparably more digitally-connected societies in the West. 


It’s not just for the President anymore. Are you getting your daily national security briefing? Subscriber+Members have exclusive access to the Open Source…

Source…

How to stay protected against screen hacking


Anybody who connects to the internet is at risk of cyberattacks, hacking and scams that want to rip you off. Everybody knows it’s an inherent risk, but it’s not always easy to spot a hacking attempt. Millions of routers are at risk of hacking thanks to this bug.

Most people are familiar with phishing scams, where criminals urge you to click on a malicious link to steal your details. There are also government agency impersonators who make it their goal to steal your money. 

But there is another form of hacking that few know. It’s called screen hacking. Read on to see how this hack works and what you can do about it. 

Here’s the backstory

Hackers have found a new way to infiltrate your device. It’s called screen hacking and uses tech know-how to take advantage of touchscreen technology. The display’s touch capabilities initiate everything you do on your device, from opening and navigating apps to typing text messages.

Screen hacking lets criminals see everything you do on your device and, sometimes, initiate certain actions. 

Through electromagnetic interference (EMI), hackers can manipulate the electrical signals on your device. It seems like it’s from a sci-fi movie, but the displays on modern mobile phones use electrical signals to detect finger movements, making this a reality.

What you can do about it

It’s easy to think that you’ll never be the victim of a hacking attempt, but all it takes is an unsecured device and an internet connection. If a criminal steals your personal information, it’s easy for them to commit identity fraud and launch other attacks. All that hackers need is to get close to your display.

“People might place their smartphone face-down on the table in places like a cafe, library, meeting room, or conference lobbies. An attacker may embed the attacking equipment under the table and launch attacks remotely,” researchers from the Technical University of Darmstadt wrote in a study.

Is there anything that you can do about it? Well, there are a few options. 

  • Ensure that you…

Source…