Locked Shields 2024: Ancient inspiration deployed for today’s complex digital battlegrounds

Is it strange that cybersecurity companies would be called to share their expertise in a military simulation of today’s digital battlespace? The answer seems to be a resounding no. However, despite being civilian organisations that don’t drill cyber-military scenarios, full-stack cybersecurity companies consider every day to be the real thing, with malware researchers, threat monitoring … More Locked Shields 2024: Ancient inspiration deployed for today’s complex digital battlegrounds

Preventative defense tactics in the real world

Don’t get hacked in the first place – it’s much less expensive than dealing with the aftermath of a successful attack. We watch real life attacks in horror, where companies simply try to defend against attackers stomping on their networks in real time, blunting the damage and scouring for backups in a bid to avoid … More Preventative defense tactics in the real world

French state services hit by cyberattacks of ‘unprecedented intensity’

Cyberattacks of “unprecedented intensity” have targeted several French government institutions just months before the Paris Olympics but have been contained, the prime minister’s office said Monday, writes France24*. Prime Minister Gabriel Attal’s office said several state bodies were targeted but did not provide details. “Many ministerial services were targeted” from Sunday “using familiar technical means … More French state services hit by cyberattacks of ‘unprecedented intensity’

Should we be prepared for AI-based critical infrastructure attacks?

AI may change the threat landscape essentially in three ways: expanding existing threats, ushering in new threats, and shifting the nature of threats as we know it. Of specific concern is the potential for cyberattacks on critical infrastructure to become more widespread. Critical infrastructure, usually considered to include power generation and electrical grid, hospitals and … More Should we be prepared for AI-based critical infrastructure attacks?

New BLUFFS attack lets attackers hijack Bluetooth connections

Researchers at Eurecom have developed six new attacks collectively named ‘BLUFFS’ that can break the secrecy of Bluetooth sessions, allowing for device impersonation and man-in-the-middle (MitM) attacks, writes Bleeping Computer*. Daniele Antonioli, who discovered the attacks, explains that BLUFFS exploits two previously unknown flaws in the Bluetooth standard related to how session keys are derived … More New BLUFFS attack lets attackers hijack Bluetooth connections