appassionato, to books
@appassionato@mastodon.social avatar

The Art of Cyber Warfare: Strategic and Tactical Approaches for Attack and Defense in the Digital Age by Peter Kestner, 2024

Explores the strategic and tactical approaches for offense and defense in the digital age. Drawing on historical conflicts from Sun Tzu to Carl von Clausewitz, the author illustrates that, despite changed conditions such as time, location, means, and resources it is possible to learn from past actions and reactions.

@bookstodon


appassionato, to books
@appassionato@mastodon.social avatar

Cyber Operations: A Case Study Approach by Jerry M. Couretas, 2024

Cyber Operations offers a comprehensive, structured framework for analyzing cyber systems and their interactions. Drawing on operational examples and real-world case studies, it promises to provide both cyber security professionals and cyber technologies designers with the conceptual models and practical methodologies they need to succeed.

@bookstodon




Snowshadow, to news
@Snowshadow@mastodon.social avatar

India, Pakistan attempted to interfere in Canada's elections: CSIS

In the case of the 2019 election, CSIS said the Canadian government conducted what it called a "threat reduction measure" ahead of the vote, meant to "reduce the foreign interference threat posed by the Government of Pakistan."

"The situation was monitored and assessed to have effectively reduced the threat of interference," CSIS wrote.


https://www.cbc.ca/news/politics/pakistan-india-elections-canada-1.7164378?cmp=rss

HistoPol,
@HistoPol@mastodon.social avatar

@Snowshadow

Elections

(6/n)

...etc. -》 !)

Another step is severely beefed-up policing of political content. Although I'm critical of its use, could, in this case, be used to pre-screen all content. "Problematic" contents and accounts (tbd) would be evaluated by a likewise beefed-up force, to be either forwarded to the prosecution or to the command/ agents or discarded.
I...

RitaWerner, to random German
@RitaWerner@mastodon.social avatar

Ich bin Antimilitaristin. Ich bin eine Linke.
Aber keine Macht dier Welt würde mich unter solchen Scheißhausparolen vor die Tür bekommen.

Wann genau ist die NATO in der Ukraine eingefallen? Die sind doch nicht mehr ganz knusper.
sch

https://archive.ph/2024.03.29-183115/https://www.tagesspiegel.de/berlin/berliner-friedensdemonstration-am-karsamstag-niemand-braucht-diesen-ostermarsch-11442440.html

HistoPol,
@HistoPol@mastodon.social avatar

@RitaWerner

(2/n)

...gegen den Westen. Wie der ehemalige -Chef über einen weiteren Bestandteil, dieses , die schrieb: 365 Tage im Jahr, 24 Stunden am Tag.

Die erfolgreiche Einflussnahme auf die US-Präsidentschaftswahlen 2016, die Trolle und , v.a. auf #X, , und , alles hängt zusammen.
Die -Generäle wissen es längst, der mit dem...

Nonilex, to Futurology
@Nonilex@masto.ai avatar

The top U.S. ofcl on Mon warned that the in could embolden groups, which are aligned in their opposition to the for its support of .
“The crisis has galvanized by a range of actors around the world. And while it is too early to tell, it is likely that the Gaza conflict will have a generational impact on ,” , told an annual hearing on .

https://www.washingtonpost.com/national-security/2024/03/11/cia-israel-gaza-ukraine-ai/

Nonilex,
@Nonilex@masto.ai avatar

The witnesses, who included the dirs of the , the , the , & the State Dept’s , spoke about a panoply of challenges, from an ambitious to the proliferation of & the continuing of & . Brett Holmgren, the State Dept’s top ofcl, said that the power of could “lower the barrier” for adversaries to engage in .

gcluley, to Cybersecurity
@gcluley@mastodon.green avatar

Ukraine claims it hacked Russian Ministry of Defence, stole secrets and encryption ciphers.

Read more in my article on the Bitdefender blog: https://www.bitdefender.com/blog/hotforsecurity/ukraine-claims-it-hacked-russian-ministry-of-defence-stole-secrets-and-encryption-ciphers/

ArtSmart, to Facebook
@ArtSmart@mas.to avatar

Party? Nope. They're now the Party.

must be absolutely thrilled by how much ROI continues to accrue from his 2016 ads to help elect , to say nothing of the hooker tapes he's probably holding over Trump's head.

has no official powers left and might soon be in shackles, but he's already turned the into the absolute best weapon that now commands.

https://www.bloomberg.com/opinion/articles/2024-02-18/republicans-blocking-ukraine-aid-should-remember-9-11-and-pearl-harbor

HistoPol, (edited )
@HistoPol@mastodon.social avatar

@ArtSmart


(1/n)

via @USATODAY
May 10, 2018

" on the released thousands of ads on Thursday, offering the public its first in-depth look at the troubling messages used to heighten tensions among during and after the 2016 U.S. presidential election.

The release of the 👉ads, which Facebook says were purchased by the...

https://eu.usatoday.com/story/tech/2018/05/10/thousands-russian-bought-facebook-social-media-ads-released-congress/849959001/

appassionato, to books
@appassionato@mastodon.social avatar

Ultimate Cyberwarfare for Evasive Cyber Tactics: Unravel the Techniques of Cyberwarfare, Hacktivism and Asymmetric Conflicts for Tactical Excellence With Real-World Use Cases and Strategic Insights by Chang Tang

The book begins by unraveling the tapestry of today's cyber landscape, exploring current threats, implementation strategies, and notable trends.

@bookstodon


aeveltstra, to Cybersecurity
@aeveltstra@mastodon.social avatar

#FBI says they shut down #hacker group #VoltTyphoon who is accused of attacking #US infrastructure, like power grid and pipe lines.

BBC reports: https://www.bbc.co.uk/news/world-asia-68163172

BBC connects this to a warning issued last year by Microsoft, claiming Volt Typhoon had hacked into multiple US government email accounts.

#cybersecurity #cyberwarfare

Snowshadow, to news
@Snowshadow@mastodon.social avatar
HistoPol,
@HistoPol@mastodon.social avatar

@EU_Commission @EU_Commission @Snowshadow

(3/3)

...part of the that the is engaging in, apart from the and the 24/7 .

Act accordingly!

//

https://www.bbc.com/news/world-middle-east-67614911

YourAnonRiots, to Cybersecurity Japanese
@YourAnonRiots@mstdn.social avatar

AI: Defender or Dark Side? The future of is here, with AI on both sides.

Learn how attackers are using AI to craft invisible threats, and how defenders are harnessing its power to stay ahead.

https://thehackernews.com/2024/01/riding-ai-waves-rise-of-artificial.html

Mndell, to Cybersecurity Dutch
@Mndell@mastodon.social avatar
paka, to Ukraine
@paka@mastodon.scot avatar

Ukrainian hackers claim strike on Russian ship killed 74 soldiers

Ukrainian hacker group Cyber Resistance claimed on Dec. 29 that it intercepted an email from the Russian Black Sea Fleet’s press service

U.K. Defense Ministry later confirmed it had been destroyed

Russia claims 1 person killed & 2 injured

https://kyivindependent.com/ukrainian-hackers-intercept-email-saying-ukraines-strike-on-novocherkassk-ship-killed-74-russian-soldiers/

,

ErikJonker, to Ukraine
@ErikJonker@mastodon.social avatar

If this is true it will probably one of the most effective cyberattacks ever? Although you would think some offline backups are available.
"Cyber units of Ukraine’s Defence Intelligence attacked the tax system of Russia and managed to destroy the entire database and its backup copies. The intelligence adds that Russia will not be able to resuscitate its tax system fully."
https://www.pravda.com.ua/eng/news/2023/12/12/7432737/

appassionato, to books
@appassionato@mastodon.social avatar

Understanding Cyber Warfare; Politics, Policy and Strategy Second Edition

This textbook offers an accessible introduction to the historical, technical and strategic context of global cyber conflict.

@bookstodon



0x58, to infosec

🇩🇰 🇷🇺

Hackers potentially linked to the Russian GRU Main Intelligence Directorate carried out a series of highly coordinated cyberattacks targeting Danish critical infrastructure in the nation's largest cyber incident on record, according to a new report.

https://www.bankinfosecurity.com/denmark-hit-largest-cyberattack-on-record-a-23584

kkarhan, to ipv6
@kkarhan@mstdn.social avatar

There are several issues I have with @torproject 's :

For once, it's good and convenient but it's filtering options are half broken.

For example https://bridges.torproject.org/bridges/?transport=webtunnel&ipv6=yes will get me a that has , but setting ipv6=no or ipv4=yes doesn't work.

Nor can I add ports=80,443 or port=443&port=80 or similar.

So it would be really cool if one could just query stuff like that [OFC I'm not talking about the CAPTCA, that exist for reasons]...

kkarhan,
@kkarhan@mstdn.social avatar

@torproject And yes, I do need some with the ability to filter as contacts in that want to basically have no other option than as systematically bricks 's and and only allows like and connections the latter one propably for Russia's [] to pass through.

So even if they had like or that wouldn't fix their issues nor would it solve that need.

appassionato, to books
@appassionato@mastodon.social avatar

Cyberwarfare
1/2
Nowadays in cyberspace, there is a burst of information to which everyone has access. However, apart from the advantages the internet offers, it also hides numerous dangers for both people and nations. Cyberspace has a dark side, including terrorism, bullying, and other types of violence. Cyberwarfare is a kind of virtual war that causes the same destruction that a physical war would also do.

@bookstodon

init_6_, to random

Interesting follow-up to yesterday's Red Cross discussion...
https://therecord.media/hacktivists-respond-to-red-cross-rules-with-ridicule

init_6_, to random

Red Cross proposes RoE for 'war-focused' hackers

  1. Do not direct cyber-attacks against civilian objects

  2. Do not use malware or other tools or techniques that spread automatically and damage military objectives and civilian objects indiscriminately

  3. When planning a cyber-attack against a military objective, do everything feasible to avoid or minimise the effects your operation may have on civilians

  4. Do not conduct any cyber-operation against medical and humanitarian facilities

  5. Do not conduct any cyber-attack against objects indispensable to the survival of the population or that can release dangerous forces

  6. Do not make threats of violence to spread terror among the civilian population

  7. Do not incite violations of international humanitarian law

  8. Comply with these rules even if the enemy does not

Thoughts?

https://www.pcgamer.com/red-cross-issues-rules-of-engagement-to-war-focused-hacker-groups-who-say-why-should-i-listen-to-the-red-cross/

OWASP_Ottawa, to Ottawa

returns tonight @ 6pm at the University of Ottawa STEM building:

150 Louis-Pasteur Private room 117

Tonight we learn about state sanctioned with an investigation of the Vulkan files.

https://meetu.ps/e/MqQDd/tc6qb/i

We will also be live streaming at:

https://m.youtube.com/watch?v=PDU9_aooRRU

LukaszOlejnik, to random
@LukaszOlejnik@mastodon.social avatar

My book Philosophy of Cybersecurity is out today! Feels great!

It considers broad spectrum or issues. Systems, user security, healthcare, critical infra, policy matters, international law, cyberwarfare.

Appropriate primer for our times. Enjoy! https://blog.lukaszolejnik.com/my-cybersecurity-book-philosophy-of-cybersecurity/

threatresearch, to Russia

"A series of high-profile from , and criminal networks in recent years have served as a wake up call to the Defense Department that has changed."

GOOD.

https://www.politico.com/news/2023/09/12/pentagon-cyber-command-private-companies-00115206

deltatux, to infosec
@deltatux@infosec.town avatar

Japan's cybersecurity agency was reportedly breached by Chinese state hackers for 9 months before it was discovered.

Japan’s National Center of Incident Readiness and Strategy for Cybersecurity (NISC) announced in August that personal data linked to email exchanges may have been compromised after it was hacked in October last year.

It was also reported by the Washington Post that the US NSA found Chinese military hackers have also breached the Japanese Defense networks.

https://therecord.media/japan-cybersecurity-agency-breached-report

itnewsbot, to security
@itnewsbot@schleuss.online avatar

Cybersecurity experts say the west has failed to learn lessons from Ukraine - Enlarge / Viktor Zhora from Ukraine’s information protection service, s... - https://arstechnica.com/?p=1963971

  • All
  • Subscribed
  • Moderated
  • Favorites
  • provamag3
  • rosin
  • thenastyranch
  • Durango
  • DreamBathrooms
  • ngwrru68w68
  • magazineikmin
  • cubers
  • Youngstown
  • mdbf
  • slotface
  • osvaldo12
  • GTA5RPClips
  • kavyap
  • megavids
  • InstantRegret
  • everett
  • tacticalgear
  • vwfavf
  • tester
  • normalnudes
  • modclub
  • ethstaker
  • khanakhh
  • cisconetworking
  • anitta
  • Leos
  • JUstTest
  • All magazines