Details of an NSA Hacking Operation

Read Time:25 Second

Pangu Lab in China just published a report of a hacking operation by the Equation Group (aka the NSA). It noticed the hack in 2013, and was able to map it with Equation Group tools published by the Shadow Brokers (aka some Russian group).

…the scope of victims exceeded 287 targets in 45 countries, including Russia, Japan, Spain, Germany, Italy, etc. The attack lasted for over 10 years. Moreover, one victim in Japan is used as a jump server for further attack.

News article.

Read More

Purported massive leak of Russian soldiers’ data could sink morale, digital security

Read Time:49 Second

In what security experts say is an unprecedented wartime leak, Ukrainian newspaper Ukrayinska Pravda published what it claims are the personal details of 120,000 Russian service personnel fighting in Ukraine. The nearly 6,000 pages of information, if accurate, contain names, registration numbers, and place of service for well over half of the estimated number of Russian soldiers who have invaded Ukraine.

The data was obtained by a Ukrainian think tank called The Center for Defense Strategies, which was created to monitor defense reforms and develop key government policies affecting Ukraine’s security and defense sector, with a particular focus on building independent analytical capabilities “at the level of the United States and Britain.” The Center is headed by former Ukraine Defense Minister Andriy Zahorodniuk. Its board includes international security expert Alina Frolova, state asset management expert Oleksiy Martsenyuk, former Ukrainian Foreign Minister Volodymyr Ohryzko, and economic and energy security expert Oleksandr Kharchenko.

To read this article in full, please click here

Read More

​​​​​​​Staying safe online when you live off-grid

Read Time:3 Minute, 9 Second

This blog was written by an independent guest blogger.

Over 250,000 people in the US live off the grid, meaning they do not rely on public utilities such as electricity and water. Their aim is generally to live more independently and self-sufficiently, rely on solar or other eco-friendly technologies, and build a stronger connection with nature. However, most people who choose this lifestyle are very much reliant on the Internet. Over 4.7 million people work remotely at least part-time in the US, and most need to keep in touch with clients and colleagues via the Internet. Online connections are also key for security systems and communication. If you are living off-grid, what cybersecurity risks could you be exposed to and how can you avoid them?

Off-grid and on the move

Those who live off-grid in RVs usually rely on one of two sources of power to connect to the Internet. One is their cell phone, which can be used as a wireless hub. Another is via Satellite, which is generally more costly, but which guarantees Internet access regardless of where the user is (except for underground surfaces, of course). Regardless of the system users choose, they should follow a variety of measures—including using strong passwords, relying on fingerprint logins, using only authorized or well-reputed apps, disabling location services when these are unnecessary, using remote wiping software, backing up their phone often and keeping their software updated.

Cyber vulnerabilities in security systems

Because RV users change the place they call ‘home’ often, many install mobile home security cameras. These can have handy features like panic buttons, night vision, motion detectors and alerts, and similar. Quality systems usually have cloud storage, which allows for live view and playback. However, security systems have specific cyber vulnerabilities—including human error, outdated systems, and poor maintenance. If you live in an RV, invest in device lifecycle management and be proactive with respect to maintenance. Install updates when the manufacturer makes them available, secure the entire network (including devices) your security system supports, and have strict access policies in place.

Risks faced by homes with solar energy

If you are relying on solar energy for your online needs, you can be attacked by cybercriminals in a similar fashion to if you relied on fuel-based energy. In the past, this risk was much smaller for solar energy, since very few systems were deployed and most solar inverters (which convert direct current electricity to alternating current electricity) did not communicate for monitoring purposes. However, as more solar power is installed and inverters become more sophisticated, the data of inverters can be hacked and manipulated. Therefore, it is vital to keep the software that controls your inverter updated and safe. 

Different layers of protection

Security software alerts you if there is any abnormal behavior though in reality, keeping your system safe against hackers involves various ‘layers’ of protection. In addition to installing anti-virus software in components like inverters, you should also install anti-virus protection on the firewalls and servers that integrate your solar energy into the wider system of grid operation. You can also control who has access to your system, either physical or online.

Conclusion

A quarter of a million people in the US live off the grid, with some using renewable energies to power their homes and others relying on their cell phone or satellite. Those living on solar energy can face attacks to their inverters and other systems. Those in RVs, meanwhile, can be vulnerable to equipment such as security systems. Updating software, maintaining systems proactively, and using various layers of prediction can all help off-grid residents enjoy the benefits of the Internet while keeping their devices and data safe against attacks.

Read More

New CSO appointments in India

Read Time:32 Second

With security taking centre stage across the enterprise, the role of the CSO or CISO is becoming increasingly complex and challenging, but exciting, nonetheless. As these executives find new roles in which they can bring their experience and vision to bear, we’ll keep you up to date on new appointments and movements in the world of cybersecurity.

If you have any appointment or job news to share, please let us know.

February 2022

Airtel appoints Varun Singla as CISO

Varun Singla has joined Airtel as chief information and security officer. Previously, he was CSO at Micron Technology.

To read this article in full, please click here

Read More

3 steps to supply chain resilience

Read Time:39 Second

The COVID pandemic has taught us a lot of things, one of which is that supply chain resilience matters a lot. Having a resilient supply chain in the business sense can be the difference between thriving under dynamic market conditions or experiencing critical business disruptions, including those caused by cyberattacks. These disruptions can not only have an impact on your revenue. but they also can impact your organizational brand and market reputation.

The modern business ecosystem is an increasingly complex web of relationships and exchanges of goods and services. Everyone is essentially someone else’s vendor. This point isn’t lost on malicious actors, as we’ve seen an increase in supply chain attacks, particularly in the digital domain.

To read this article in full, please click here

Read More