by Ross Dyer
Most recently, our dedicated team of threat researches at TrendLabs uncovered a sophisticated and ongoing cyber espionage campaign known as Operation Pawn Storm targeting military, embassies, defence contractors and media organizations in the US and its allied countries. Let’s dig a bit deeper. Continue reading
by Ross Dyer
You’ll have heard of the Bash bug, or the Shellshock vulnerability, which has been dominating information security headlines for most of the past weeks. But the more information piles up the harder it can be to sift through the noise and work out exactly what you should be doing to mitigate the threat.
Warnings about an imminent “Cyber 9-11”, or a “Virtual Pearl Harbour”, have been with us for years. The most recent was from top US regulator Bejamin Lawsky, head of the New York State Department of Financial Services, who last week voiced public concerns about an “Armageddon-type cyber event”.
Now, most often such dire predictions are used to urge Critical National Infrastructure (CNI) firms to better shore up their defences and improve resilience against possible intrusion. After all, a Unisys report a few months back claimed that 70% of CNI organisations suffered breaches in the past year and 78% of senior security officials said a successful attack on their ICS and SCADA systems was likely in the next 24 months.