Global Gap Of Nearly 3 Million CyberSecurity Positions

Global Gap Of Nearly 3 Million CyberSecurity Positions

Too few cybersecurity professionals is a gigantic problem for 2019 Robert Ackerman@BobAckerman As the new year begins gaining steam, there is ostensibly a piece of good news on the cyber front. Major cyberattacks have been in a lull in recent months, and still are. The good tidings are fleeting, however. Attacks typically come in waves.…

APT Attribution: Link Found Between GreyEnergy and Zebrocy Attacks

APT Attribution: Link Found Between GreyEnergy and Zebrocy Attacks

By Eduard Kovacs Researchers from Kaspersky Lab’s Industrial Control Systems Cyber Emergency Response Team (ICS CERT) have found significant overlaps in GreyEnergy and Zebrocy activity, both of which were previously linked to Russia. GreyEnergy is a threat actor that is believed to be a successor of the notorious BlackEnergy group and experts estimate that it…

Top High-Performance Computers by TeraFLOPS

Top High-Performance Computers by TeraFLOPS

Die weltweit leistungsfähigsten Rechnersysteme werden als Supercomputer bezeichnet. Die meisten dieser digitalen Giganten finden ihren Einsatz in der Industrie. Hier berechnen sie u.a. komplexe Simulationen. Die Infografik von Statista zeigt die Rechenleistung der leistungsstärksten Supercomputer weltweit im November 2018. Der Rechner “Summit” vom Hersteller IBM erzielt eine Leistung von rund 143.500 TeraFLOPS (21,23 Billiarden FLOPS,…

Attackers Use Steganography to Obfuscate PDF Exploits

Attackers Use Steganography to Obfuscate PDF Exploits

By Ionut Arghire on January 24, 2019 A recently discovered PDF exploit used steganography to hide malicious JavaScript code in images embedded in PDF files, according to exploit analysis firm EdgeSpot. Steganography is a method of hiding information within files, and has been long used by cybercriminals in malicious attacks. The powerful exploit obfuscation technique…

DARPA’s “R3D2” Array – Radio-Frequency Risk Reduction Deployment Demonstration Satellite

DARPA’s “R3D2” Array – Radio-Frequency Risk Reduction Deployment Demonstration Satellite

R3D2 (not: R2D2) … laying the groundwork for a revolutionary global space-based internet, validating a resilient sensor and data transport layer in low Earth orbit   New Zealand-based space company Rocket Lab said it plans to launch a satellite for the Defense Advanced Research Projects Agency (DARPA) next month from the company’s main launch complex…

Wie gut ist Deutschlands Cyber-Behörde?

Wie gut ist Deutschlands Cyber-Behörde?

von JOANA EKRUTT und CHRISTIAN UNGER — DIENSTAG, 22. JANUAR 2019 | BERLINER MORGENPOST   “Der Raum, in dem Deutschland seinen Kampf gegen Hacker und Cyberkriminelle gewinnen will, ist gerade so groß wie ein Klassenzimmer.” “Die deutsche Cyberabwehr ist ein Flickenteppich. Neben dem BSI haben Polizei und Nachrichtendienste eigene Cyber-Abteilungen, in München arbeitet ein Zentrum…

Phishing: Hacking the USA Power Grid

Phishing: Hacking the USA Power Grid

The kill chain, the phishing attack and the broken trust graph Anshu Sharma – Jan 17, 2019 The Wall Street Journal published an explosive story about how state-sponsored Russian hackers used a variety of techniques and a spider web of compromised accounts to ultimately gain access to the control infrastructure that monitors and controls the flow…

“GAPS”: DARPA Explores New Computing Architectures to Deliver Verifiable Data Assurances

“GAPS”: DARPA Explores New Computing Architectures to Deliver Verifiable Data Assurances

Program seeks to create new software and hardware architectures that provide physically provable assurances around data security and privacy outreach@darpa.mil – 1/16/2019 DARPA created the Guaranteed Architecture for Physical Security (GAPS) program to develop scalable solutions that provide safe, verifiable methods of tracking information and communications between computer systems. The goal of GAPS is to…