cyberespionage

presented by
Air Warfare

Israelis May Ban High Tech Cars From Bases: ‘Perfect Espionage Vector’

"Imagine you work at a chemical research part of a base. Its location is secret. But you have a smart car. Through other espionage activities, I found out you work there. I hack your phone or your car’s online account," Keatron Evans said. "I track your location as you go to work every day. Now I know the specific GPS location of your work facility. It goes downhill quickly from there."

Global

SolarWinds Hack: ‘The Truth Is Much More Complicated’

SolarWinds threat actor reportedly accessed DHS emails and DoE schedules. Cyberespionage campaigns are "the types of things we should expect [Russia] to do," one cybersecurity expert observed. "I'm not arguing we shouldn't have a response. We should respond. ...My only argument is that we should not overact."

Global

CISA ‘Strongly Urges’ Patching As Widespread Exchange Server Hacking Continues

Security professionals are increasingly observing multiple threat actors, from nation-states to cryptominers, exploiting the vulnerabilities. As for China-based HAFNIUM, "This is part of the much larger Chinese effort to constantly be ferreting out new vulnerabilities and then exploiting them -- with no end in sight," said Heritage's Dean Cheng. "The Chinese will pay close attention to the Biden administration response."