Tag: warfare
-
APT37 Deploys New Rust and Python Malware Targeting Windows Systems
The North Korean-aligned threat group APT37, also known as ScarCruft, Ruby Sleet, and Velvet Chollima, has evolved its cyber warfare capabilities by deploying sophisticated Rust and Python-based malware in recent campaigns targeting Windows systems. Active since 2012, this advanced persistent threat group continues to focus on South Korean individuals connected to the North Korean regime…
-
APT Groups Weaponize Infostealer Malware in Precision Attacks
Tags: apt, attack, credentials, cyber, cybersecurity, espionage, group, intelligence, malware, threat, tool, warfareThe cybersecurity landscape has witnessed a dangerous evolution as Advanced Persistent Threat (APT) groups increasingly weaponize opportunistic infostealer malware for sophisticated espionage campaigns. What once served as broad-spectrum credential harvesting tools are now being repurposed into precision instruments of geopolitical warfare, targeting diplomatic institutions worldwide with devastating effectiveness. Recent threat intelligence from Hudson Rock’s Cavalier…
-
Amazon Takes Down Russian APT29 Infrastructure Targeting Users
Tags: cyber, cybersecurity, group, hacking, infrastructure, intelligence, network, russia, threat, warfareAmazon’s cybersecurity team has successfully disrupted a sophisticated watering hole campaign orchestrated by APT29, a notorious hacking group linked to Russia’s Foreign Intelligence Service. The August 2025 operation represents the latest chapter in an ongoing cyber warfare battle between tech giants and state-sponsored threat actors seeking to infiltrate global networks and harvest sensitive credentials. APT29’s…
-
Anthropic detects the inevitable: genAI-only attacks, no humans involved
Tags: ai, attack, business, ciso, control, cybercrime, cybersecurity, defense, dns, infrastructure, injection, intelligence, malicious, malware, open-source, openai, RedTeam, threat, tool, warfarenot find.”There is potentially a lot of this activity we’re not seeing. Anthropic being open about their platform being used for malicious activities is significant, and OpenAI has recently shared the same as well. But will others open up about what is already likely happening?” Brunkard asked. “Or maybe they haven’t shared because they don’t…
-
ISMG Editors: Voice Phishing Attacks Breach Google and Cisco
Tags: attack, breach, cisco, cyber, cybersecurity, google, government, phishing, technology, threat, update, warfareAlso: US Cyber Grants Are Dwindling; Hybrid Threats Renew Focus on OT Resilience. In this week’s update, four ISMG editors examined the voice phishing attacks linked to the Google and Cisco breaches, the funding gap in U.S. cybersecurity support for local governments and the implications of hybrid warfare on operational technology resilience. First seen on…
-
UK blames Russia’s infamous ‘Fancy Bear’ group for Microsoft cloud hacks
Authentic Antics malware tool to target Microsoft cloud accounts were the handiwork of the notorious Russian Fancy Bear hacking group, the UK’s National Cyber Security Centre (NCSC) has said.Authentic Antics was discovered after a cyberattack in 2023 which prompted an NCSC technical teardown of the malware that it published in May this year. The agency…
-
China-linked hackers target Taiwan chip firms in a coordinated espionage campaign
Tags: access, ai, attack, china, compliance, control, credentials, cyber, cybersecurity, detection, email, espionage, exploit, finance, framework, government, group, hacker, intelligence, international, login, monitoring, network, phishing, software, supply-chain, technology, threat, warfareInvestment banks in the crosshairs: A second group, UNK_DropPitch, targeted the financial ecosystem surrounding Taiwan’s semiconductor industry. This group conducted phishing campaigns against investment banks, focusing on individuals specializing in Taiwanese semiconductor analysis. The phishing emails purported to come from fictitious financial firms seeking collaboration opportunities.The third group, UNK_SparkyCarp, focused on credential harvesting through sophisticated…
-
France Says Russia Is Top Threat, Warns of ‘Open Warfare’
Escalating Geopolitical Tensions Could Increase Hacks by 2030, Government Warns. France has identified Russia as the primary threat to national security in the coming years. The French government recommends adopting measures to strengthen its cybersecurity defenses in anticipation of increased hacks from Moscow-aligned attackers driven by geopolitical tensions. First seen on govinfosecurity.com Jump to article:…
-
New AsyncRAT Forks Discovered Featuring Screamer Tool and USB Malware Spreader
Cybersecurity researchers have identified two sophisticated AsyncRAT variants that expand the remote access trojan’s capabilities with a psychological warfare component and enhanced propagation mechanisms. The newly discovered forks introduce a >>Screamer
-
Digital warfare is blurring civilian front lines
Singapore’s defence cyber chief warns that the traditional lines between military conflict and civilian life are blurring, with adversaries now targeting civilian systems and using AI to put the threat landscape on steroids First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366627027/Digital-warfare-is-blurring-civilian-front-lines
-
Cyber Warfare Is Getting Closer”, What MSSPs Should Watch For
First seen on scworld.com Jump to article: www.scworld.com/brief/cyber-warfare-is-getting-closer-what-mssps-should-watch-for
-
Cybersecurity Snapshot: U.S. Gov’t Urges Adoption of Memory-Safe Languages and Warns About Iran Cyber Threat
Tags: access, advisory, ai, api, attack, authentication, best-practice, cisa, computer, computing, crypto, cryptography, cyber, cybersecurity, data, defense, encryption, exploit, finance, framework, google, governance, government, group, hacker, healthcare, infrastructure, injection, intelligence, Internet, iran, login, mfa, military, mitigation, mitre, network, nist, passkey, password, programming, ransomware, risk, rust, service, software, strategy, tactics, technology, terrorism, threat, tool, training, vulnerability, warfareCheck out the U.S. government’s latest call for developers to use memory-safe programming languages, as well as its warning for cybersecurity teams regarding cyber risk from hackers tied to Iran. Plus, get the latest on ransomware trends, the quantum computing cyber threat and more! Dive into five things that are top of mind for the…
-
How Geopolitical Tensions Are Shaping Cyber Warfare
In today’s cyber battlefield, resilience starts with readiness, and the cost of falling short increases by the day. First seen on darkreading.com Jump to article: www.darkreading.com/vulnerabilities-threats/geopolitical-tensions-shape-cyber-warfare
-
Iranian State TV hacked, and that’s modern warfare
In modern warfare, it’s not just about who has the biggest bombs, it’s about who controls the story. First seen on grahamcluley.com Jump to article: grahamcluley.com/iranian-state-tv-hacked-and-thats-modern-warfare/
-
Iranian cyber threats overhyped, but CISOs can’t afford to let down their guard
DDoS attacks are the biggest threat: Perhaps Iran’s most prominent cyber tool is distributed denial of service (DDoS), usually in conjunction with so-called hacktivist groups.Hours after the US strikes against Iran’s nuclear sites, the Center for Internet Security (CIS) and other watchdogs confirmed that an Iranian-aligned hacktivist group called “313 Team” claimed responsibility for a…
-
Successful Military Attacks are Driving Nation States to Cyber Options
Tags: attack, china, communications, computing, cyber, cyberattack, cybersecurity, data, defense, exploit, extortion, finance, fraud, government, healthcare, infrastructure, iran, korea, middle-east, military, north-korea, russia, service, tactics, technology, tool, ukraine, vulnerability, warfareWith daring military attacks, kinetic warfare is shifting the balance of power in regions across the globe, upending the perception of power projection. Powerful nations are reeling from the impacts of bold assaults and seeking additional methods to drive foreign policy”Š”, “Šcyber may look as an appealing asymmetric warfare capability that is worth doubling-down on.…
-
How Cyber Warfare Changes the Face of Geopolitical Conflict
As geopolitical tensions rise, the use of cyber operations and hacktivists continues to grow, with the current conflict between Israel and Iran showing the new face of cyber-augmented war. First seen on darkreading.com Jump to article: www.darkreading.com/cyberattacks-data-breaches/cyberwarfare-changes-geopolitical-conflict
-
US at risk of being caught up in Israel-Iran cyber warfare
First seen on scworld.com Jump to article: www.scworld.com/brief/us-at-risk-of-being-caught-up-in-israel-iran-cyber-warfare
-
CSO Awards 2025 showcase world-class security strategies
A+E Global Media Marine Corps Community Services Accenture Marvell Adobe Mastercard Aflac Munich Re Ally Financial National Cybersecurity Alliance AmeriHealth Caritas Naval Information Warfare Center Pacific Amtrak New Jersey Institute of Technology Arizona Department of Child Safety Northern Nevada HOPES Augusta University NRC Health Avanade OHLA USA Avery Dennison Penn Medicine Avnet, Inc. Precisely Baptist…
-
Cybersecurity Snapshot: Experts Issue Best Practices for Migrating to Post-Quantum Cryptography and for Improving Orgs’ Cyber Culture
Tags: access, attack, best-practice, business, cio, ciso, communications, computer, computing, conference, corporate, crypto, cryptography, cyber, cybersecurity, data, defense, email, encryption, finance, government, group, ibm, identity, incident, incident response, infrastructure, jobs, lessons-learned, metric, microsoft, mitre, monitoring, nist, risk, service, strategy, technology, threat, tool, training, update, vulnerability, vulnerability-management, warfareCheck out a new roadmap for adopting quantum-resistant cryptography. Plus, find out how your company can create a better cybersecurity environment. In addition, MITRE warns about protecting critical infrastructure from cyber war. And get the latest on exposure response strategies and on CISO compensation and job satisfaction. Dive into five things that are top of…
-
The Ramifications of Ukraine’s Drone Attack
You can read the details of Operation Spiderweb elsewhere. What interests me are the implications for future warfare: If the Ukrainians could sneak drones so close to major air bases in a police state such as Russia, what is to prevent the Chinese from doing the same with U.S. air bases? Or the Pakistanis with…
-
Cyber and digital get over £1bn to enhance UK’s national security
The government has set out plans to spend over a billion pounds on digital and cyber warfare capabilities to enhance the UK’s ability to defend itself and fight offensive wars First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366625195/Cyber-and-digital-get-over-1bn-to-enhance-UKs-national-security
-
AI-Powered Drones: Ukraine’s Historic Strikes on Russian Aircraft
Ukraine’s AI-powered FPV drones redefine warfare, featuring advancements in military technology and cost-effective strategies. Learn more! First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/06/ai-powered-drones-ukraines-historic-strikes-on-russian-aircraft/
-
UK MoD Launches New Cyber Warfare Command
The UK MoD has unveiled a new Cyber and Electromagnetic Command, which will focus on offensive cyber operations and “electromagnetic warfare” capabilities First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/uk-mod-cyber-warfare-command/
-
UK Launches ‘Kill Web’ Linking Cyber Operations and Military
New Cyber and Electromagnetic Command Pitched as Lessons Learned from Ukraine. The United Kingdom pledged Thursday one billion pounds for a military Digital Targeting Web the government said will enable quick fire targeting of enemy assets, including through offensive cyber operations. Ways of warfare are rapidly changing, said Defense Secretary John Healy. First seen on…
-
Top 12 US cities for cybersecurity job and salary growth
Tags: access, ai, apple, attack, blockchain, business, country, crowdstrike, cyber, cybersecurity, data, defense, finance, fintech, government, group, infrastructure, insurance, iot, jobs, metric, microsoft, nvidia, office, okta, privacy, software, startup, strategy, supply-chain, technology, training, warfareWhile major hubs like San Francisco naturally come to mind, and perform well based on the metrics we evaluated, there are many lesser-known cities that may be just as promising, if not more. These emerging destinations can offer easier access to job opportunities, more sustainable career paths, higher pay, and a lower cost of living.Here’s…
-
Over 1.5 Million Indian Websites Targeted in Coordinated Attacks
In a significant escalation of cyber warfare, over 1.5 million Indian websites have been targeted in a series of coordinated cyberattacks attributed to seven Advanced Persistent Threat (APT) groups, primarily based in Pakistan. These attacks, following the Pahalgam terror strike and India’s subsequent Operation Sindoor, aimed at critical infrastructure and government websites across the country.…
-
Cyberwarfare Funding Accelerates and Everyone is at Risk
Tags: attack, china, cyber, cyberattack, cybersecurity, data, defense, exploit, finance, government, healthcare, infrastructure, risk, russia, service, tool, vulnerability, warfareNations are investing heavily in offensive cyber capabilities. The proposed 2026 US defense budget earmarks an additional $1 billion in funding for offensive cyber operations, specifically to the US Indo-Pacific Command (USINDOPACOM). In 2025, the Department of Defense spent over $14 billion on cyber, with $6.4 billion allocated to offensive operations. An extra billion dollars…
-
Preparing for Cyber Warfare CISO’s Defense Resource Guide
In the digital age, preparing for cyber warfare is essential as organizations face unprecedented threats beyond traditional hacking and data breaches. Cyber warfare-where attacks are orchestrated by nation-states or highly organized groups-can cripple critical infrastructure, disrupt business operations, and erode trust in institutions. As these threats become more sophisticated and persistent, the Chief Information Security…

