Reel of words showing fake news theme

Sandworm: Shadows in the Code

The film takes you on a journey through the intricate web of election interference and digital espionage, exploring the tactics, techniques, and procedures employed by this elusive group. It sheds light on the geopolitical implications of cyber warfare and raises pressing questions about security, sovereignty, and the future of conflict in the digital age.

Read More »
Devastated city

Al-Qaeda’s Persistent Global Menace: Analyzing Recent Developments

Over the past month, various developments have highlighted the enduring influence of Al-Qaeda and the complex global challenge it poses. This column examines the intricate dynamics of Al-Qaeda’s operations, their strategic shifts, regional expansions, and the multifaceted efforts required to counter this persistent threat.

Read More »
A clash of two geopolitical systems shown as flags on box cars

The Cyber Cold War: Separating Fact from Fiction in US-China Cyber Relations

The ChinaDaily introduction to the CCIA’s report claimed that the authors of the CCIA report used an empirical analysis; however, limited sources were cited.

Since the narrative was so highly biased and since it reflected many common CCP troupes aimed at vilifying the United States I have taken on the task of countering each of their narratives.

Read More »

Knigsfot: The Covert Cyber Assault on Global Infrastructure

A Backdoor Trojan called by same antivirus firms ‘Beaugrit’ which has been active since 2017, has been identified beaconing out to a command and control server through a MooseFS distributed network. Its purpose is to deploy espionage-type malware from a dropper malicious infrastructure network located in China and the US.

Read More »

Kimsuky Abusing DMARC Protocol

The primary objective of Kimsuky is to gather intelligence on geopolitical developments, adversary foreign policy strategies, and any other information that could impact the interests of the DPRK.

Read More »
A man finds an open door in the middle of a storm and tsunami

AI Tools for Cybersecurity

I was encouraged to find out that the most popular AI applications are actually extensions of existing tried and true tools that have good market adoption and sound vertical and horizontal integration. This indicates to me that the design and development of these tools have come from internal development by domain experts that understand the complexity of cyber threat intelligence, vulnerability assessment, penetration testing, end-point protection and cloud services automation.

Read More »

What to Watch For in 2024 Q3 & Q4

We will see a dangerous escalation in the use of AI by attackers in 2024 Q3. Attackers have developed increasingly sophisticated AI-powered tools and they are deploying them in targeted operations.

Read More »
Translate »