US to Let NATO Use Its Offensive Cyber Defense Skills

US to Let NATO Use Its Offensive Cyber Defense Skills

NATO Cooperative Cyber Defense Center   The United States is expected to make its offensive cyber warfare capabilities available to NATO, officials said Wednesday, as the alliance seeks to strengthen its defenses against Russian electronic attacks. Britain and Denmark have already publicly committed cyber resources to NATO, and Washington is expected to announce that it…

Hackers Earn $150,000 in Marine Corps Bug Bounty Program

Hackers Earn $150,000 in Marine Corps Bug Bounty Program

The U.S. Department of Defense’s sixth public bug bounty program, Hack the Marine Corps, has concluded, and white hat hackers who took part in the challenge earned more than $150,000. Hack the Marine Corps was hosted by the HackerOne bug bounty platform and it ran for 20 days. Over 100 experts were invited to test…

Russia’s Hackers Long Tied to Military And Secret Services

Russia’s Hackers Long Tied to Military And Secret Services

During the Soviet era, the country’s top computer scientists and programmers largely worked for the secret services. That practice appears to have resumed under President Vladimir Putin, as Russia faces accusations of waging a global campaign of cyber attacks. Dutch officials on Thursday accused four Russians from the GRU military intelligence agency of attempting to…

Sinking Container Ships By Hacking Load Plan Software

Sinking Container Ships By Hacking Load Plan Software

Load planning Speed and efficiency is everything with containerised shipping. The Container Load Plan (also known as a bay or stowage plan, or Ship Planning System) is a key part of that.     I’ll explain the detail of the messaging format in a separate blog about BAPLIE EDIFACT syntax. There’s a lot one can…

Triton, Trisis, HatMan Malware Linked to Russian Government Research Institute “Xenotime”

Triton, Trisis, HatMan Malware Linked to Russian Government Research Institute “Xenotime”

The development of the malware tracked as Triton, Trisis and HatMan was supported by a research institute owned by the Russian government, FireEye reported on Tuesday. The Triton attack, aimed at industrial control systems (ICS) at a critical infrastructure organization in the Middle East, came to light in December 2017. The malware targeted Schneider Electric’s…

6 Cybersecurity Tools You’ll Need to Know About in 2019

6 Cybersecurity Tools You’ll Need to Know About in 2019

(this reads like sponsored content, and it is — still, useful info)   1) Safeblocks (securing dApps on less-secure Blockchain copies) 2) Incapsula (DNS tooling) 3) HoxHunt (minimizing human error, the 90% cause of hacks) 4) PerimeterX (fighting scalping and scraping bots) 5) WhiteSource (managing open-source vulnerabilities) 6) Cloud Management Suite (patching cloud-based services automatically)…

November 2008 to 2018: 10 Years of Bitcoin

November 2008 to 2018: 10 Years of Bitcoin

A shop in the Israeli city of Tel Aviv shows a visual representation of the digital cryptocurrency Bitcoin, now 10 years-old October 31, 2008 marked the birth of bitcoin. Ten years on, the world’s first cryptocurrency is at the forefront of a complex financial system viewed warily by markets and investors. From its first evocation…

Real-Time Malware Clean-Up (animated)

Real-Time Malware Clean-Up (animated)

What we caught: traditional Anti-Virus (AV) weaknesses This map shows when our remediation products clean up malware on these devices, as they’re happening around the globe, in real time. It’s also important to note that this map does not show remediation results for any potentially unwanted programs. Including these would more than double the number…

Oshkosh Robot Trucks Could Roll Out To The US Army By 2020: War Punctuates Mundanity With Acute Violence

Oshkosh Robot Trucks Could Roll Out To The US Army By 2020: War Punctuates Mundanity With Acute Violence

“shifting the grunt work from the grunts to machines” By adding autonomous features, cargo vehicles like this could carry out the same mission without need for human occupants. (Oshkosh Defense)   Simple subtraction explains the impetus for self-driven supply convoys: For every autonomously driven vehicle, that’s one fewer human driver needed, and likely one or…

The New Normal: How The US Army Is Improving Tactical Cyber Operations Within Traditional Kinetic Units

The New Normal: How The US Army Is Improving Tactical Cyber Operations Within Traditional Kinetic Units

The Army is maturing several concepts, capabilities and units to conduct tactical cyber, electronic warfare, intelligence and information operations to support brigade commanders. (Spc. Kiara V. Flowers/Army) “While the commander doesn’t need to be fluent in geek-speak, he has to at least have a good understanding of his virtual battle space.” “It got everybody’s attention…

3 Benefits of Hiring an ‘Entrepreneur-in-Residence’

3 Benefits of Hiring an ‘Entrepreneur-in-Residence’

(I was asked how an “Entrepreneur-in-Residence” is defined – and struggling to find a good catch-all explanation, I looked it up)   Entrepreneur.com: 3 Benefits of Hiring an ‘Entrepreneur-in-Residence’ For most companies, having a CEO who’s forced to constantly divide his or her attention is a surefire way to kill the business. Companies need to focus…

Unexpected Integration of Drone and Combat Vehicle

Unexpected Integration of Drone and Combat Vehicle

Recent advancements in commercial drones and their use by the military bring vehicle and drone manufacturers closer offering integrating drones with manned or unmanned combat vehicles.     AeroVironment is working with General Dynamics Land Systems to tighten the integration of its unmanned aerial systems (UAS) with General Dynamics’ combat vehicles. According to nextbigfuture.com, the…

Automated Threat Recognition Algorithm With Machine Learning Capability

Automated Threat Recognition Algorithm With Machine Learning Capability

Neutral Explosives Detection Algorithm in Development In order to upgrade and improve airport security systems, the U.S. government and airport security experts are working to develop vendor-neutral software for explosives detection in baggage-screening systems at airports and other ports of entry. The idea is to develop explosives detection algorithms able to run on a variety…

1st Crypto Bank In Germany: For Everyday Banking In Both Traditional FIAT And Crypto Bitcoin Worlds

1st Crypto Bank In Germany: For Everyday Banking In Both Traditional FIAT And Crypto Bitcoin Worlds

Bitwala and solarisBank are teaming up to launch Germany’s first cryptocurrency bank account. Bitwala, which began life as a hub for worldwide money transfers using blockchain technology, picked up EUR4 million in funding last month to open up the new cryptobank, which incorporates a built-in bitcoin wallet alongside regular FIAT-based banking services. The company says…

Report: North Korea-Sponsored Lazarus Hacks Comprise 65 Percent = $571 Million of Total Crypto Stolen Since Early 2017

Report: North Korea-Sponsored Lazarus Hacks Comprise 65 Percent = $571 Million of Total Crypto Stolen Since Early 2017

Hacker group “Lazarus,” reportedly funded by North Korea, has stolen a staggering $571 million in cryptocurrencies since early 2017, a study conducted by cybercrime company Group-IB reveals. Key takeaways from the study were published Tuesday, Oct. 16, alongside the full annual report, entitled “Hi-Tech Crime Trends.” The report, dedicated to hacks in 2017 and 2018,…