As we head into the final day before the 2020 election, disinformation on social media continues to make headlines as a means to sway public opinion and to discourage people from voting. For example, swing states have been targeted with evolving disinformation tactics in an attempt to influence what happens in the voting booth, while Black and Latino voters have been flooded with messages aimed to depress turnout by fueling cynicism and distrust in the political process.
The Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the U.S. Cyber Command Cyber National Mission Force (CNMF) identified tactics, techniques, and procedures (TTPs) used by North Korean advanced persistent threat (APT) group Kimsuky to gain intelligence on various topics of interest to the North Korean government.
Acting Secretary of Homeland Security Chad F. Wolf released the Department of Homeland Security’s (DHS) Homeland Threat Assessment (HTA). This first-of-its-kind report synthesizes threat information across DHS including intelligence and operational components.
4iQ released its COVID-19 Threat Report, which explores a host of notable scams that have surfaced during these uncertain times, including sextortion/blackmail emails, fake news, ransomware and phishing campaigns.
From elections to North Korean nuclear threats and missile launches, it appears that cyber actors are using geopolitical events to achieve cyber activism and other goals.
Traveling abroad with technology brings with it certain risks and may subject you to government surveillance in ways that are different from domestic travel. According to the FBI, you shouldn’t expect privacy in most countries outside the United States. Your data is less secure when you travel.
It might be a more exciting story to claim a nation-state pilfered your data, but the more likely scenario is that your enterprise failed at some of the most basic tenets of cybersecurity hygiene, leaving the door open to script kiddies and opportunitistic hackers to run rampant in your system. Join us as we debunk 5 major data breach myths.
Just because your enterprise is not operating in a warzone does not make you immune to fourth-generation warfare.
November 5, 2013
Nation-states with political agendas and their standing militaries are no longer the primary participants in conflicts. Threat actors can come from anywhere.