Insider Q&A: Pentagon AI Chief on Network-Centric Warfare, Generative AI Challenges

Interview with Craig Martell, Chief Digital and AI Officer (CDAO) for the U.S. Department of Defense, about AI use in the military.
The post Insider Q&A: Pentagon AI Chief on Network-Centric Warfare, Generative AI Challenges appeared first on Secu… Continue reading Insider Q&A: Pentagon AI Chief on Network-Centric Warfare, Generative AI Challenges

Military Satellite Access Sold on Russian Hacker Forum for $15,000

By Waqas
The Russian-speaking hacker is also offering access to AT&T Corporation email accounts that have 2FA disabled for $7,000.
This is a post from HackRead.com Read the original post: Military Satellite Access Sold on Russian Hacker Forum for … Continue reading Military Satellite Access Sold on Russian Hacker Forum for $15,000

Deepfake Cyber Attack Hits Russia: Fake Putin Message Broadcasted

By Waqas
Initially, reports suggested that only radio messages were affected. However, subsequent investigations and recordings revealed that the fraudulent messages were also displayed on television screens.
This is a post from HackRead.com Read the o… Continue reading Deepfake Cyber Attack Hits Russia: Fake Putin Message Broadcasted

Expeditionary Cyberspace Operations

Cyberspace operations now officially has a physical dimension, meaning that the United States has official military doctrine about cyberattacks that also involve an actual human gaining physical access to a piece of computing infrastructure.

A revised version of Joint Publication 3-12 Cyberspace Operations—published in December 2022 and while unclassified, is only available to those with DoD common access cards, according to a Joint Staff spokesperson—officially provides a definition for “expeditionary cyberspace operations,” which are “[c]yberspace operations that require the deployment of cyberspace forces within the physical domains.”…

Continue reading Expeditionary Cyberspace Operations

Leaked Documents Detail Russia’s Cyberwarfare Tools, Including for OT Attacks

Documents show that Russian IT company NTC Vulkan was requested to develop offensive tools for government-backed hacking group Sandworm.
The post Leaked Documents Detail Russia’s Cyberwarfare Tools, Including for OT Attacks appeared first on Secu… Continue reading Leaked Documents Detail Russia’s Cyberwarfare Tools, Including for OT Attacks

Russian Cyberwarfare Documents Leaked

Now this is interesting:

Thousands of pages of secret documents reveal how Vulkan’s engineers have worked for Russian military and intelligence agencies to support hacking operations, train operatives before attacks on national infrastructure, spread disinformation and control sections of the internet.

The company’s work is linked to the federal security service or FSB, the domestic spy agency; the operational and intelligence divisions of the armed forces, known as the GOU and GRU; and the SVR, Russia’s foreign intelligence organisation.

Lots more at the link…

Continue reading Russian Cyberwarfare Documents Leaked

Cyberwar Lessons from the War in Ukraine

The Aspen Institute has published a good analysis of the successes, failures, and absences of cyberattacks as part of the current war in Ukraine: “The Cyber Defense Assistance Imperative ­ Lessons from Ukraine.”

Its conclusion:

Cyber defense assistance in Ukraine is working. The Ukrainian government and Ukrainian critical infrastructure organizations have better defended themselves and achieved higher levels of resiliency due to the efforts of CDAC and many others. But this is not the end of the road—the ability to provide cyber defense assistance will be important in the future. As a result, it is timely to assess how to provide organized, effective cyber defense assistance to safeguard the post-war order from potential aggressors…

Continue reading Cyberwar Lessons from the War in Ukraine