Chinese ‘Volt Typhoon’ hack underlines shift in Beijing’s targets, skills

Chinese ‘Volt Typhoon’ hack underlines shift in Beijing’s targets, skills
Chinese ‘Volt Typhoon’ hack underlines shift in Beijing’s targets, skills

“The PRC’s goal is developing capabilities to disrupt critical infrastructure in the event of a future conflict,” NSA Cybersecurity Director Rob Joyce told Breaking Defense in a statement.

US tech firms should wargame response if China invades Taiwan, warns NSA cybersecurity chief

US tech firms should wargame response if China invades Taiwan, warns NSA cybersecurity chief
US tech firms should wargame response if China invades Taiwan, warns NSA cybersecurity chief

“You don’t want to be starting that planning the week before an invasion, when you’re starting to see the White House saying it’s coming,” said NSA’s Rob Joyce. “You want to be doing that now.”

presented by
Modernization of crypto isn’t the core mission for DoD and the IC, it’s what enables the mission

Modernization of crypto isn’t the core mission for DoD and the IC, it’s what enables the mission
Modernization of crypto isn’t the core mission for DoD and the IC, it’s what enables the mission

Modernizing cryptographic systems is a lot more complicated than a software patch or iOS update, and oftentimes unfunded, but is vital to securing the nation’s most important secrets.

Russian hackers raided defense contractors for two years, stole sensitive info: US

Russian hackers raided defense contractors for two years, stole sensitive info: US
Russian hackers raided defense contractors for two years, stole sensitive info: US

“Given the sensitivity of information widely available on unclassified [cleared contractor] networks, the FBI, NSA, and CISA anticipate that Russian state-sponsored cyber actors will continue to target CDCs for U.S. defense information in the near future.”

‘The game has changed’: VMware exec says defense industry faces destructive cyberattacks, belligerent foes

‘The game has changed’: VMware exec says defense industry faces destructive cyberattacks, belligerent foes
‘The game has changed’: VMware exec says defense industry faces destructive cyberattacks, belligerent foes

VMware’s Tom Kellermann linked increasingly aggressive attacks to geopolitical tensions with Russia and Belarus.

presented by
Your tolerance for risk in critical comms will drive your security solution

Your tolerance for risk in critical comms will drive your security solution
Your tolerance for risk in critical comms will drive your security solution

Data protection solutions are key to the JADC2 goal of an interconnected tactical network that enables the sharing of sensor data among all military branches in every domain.

NSA Renews Focus On Securing Military Weapons Systems Against ‘Capable’ Rivals

NSA Renews Focus On Securing Military Weapons Systems Against ‘Capable’ Rivals
NSA Renews Focus On Securing Military Weapons Systems Against ‘Capable’ Rivals

“In terms of weapons systems, we have computers on wings, at sea, and on land. We don’t think of [weapons systems] that way, but none of them work without computers,” NSA’s Joyce said. 

Nakasone Now Sees Ransomware, Influence Ops As ‘National Security’ Threats

Nakasone Now Sees Ransomware, Influence Ops As ‘National Security’ Threats
Nakasone Now Sees Ransomware, Influence Ops As ‘National Security’ Threats

“We aim to convey that, ‘Hello, we are from the government, and we’re here to help’ is not a scary idea,” the general joked, alluding to a famous quote by former President Reagan.

Al-Qaida Fears In Afghanistan, But China Takes Spotlight For IC Leaders

Al-Qaida Fears In Afghanistan, But China Takes Spotlight For IC Leaders
Al-Qaida Fears In Afghanistan, But China Takes Spotlight For IC Leaders

One senior official said he wants his agency to have the urgency about China the way the US had urgency about counterterrorism after 9/11.

HASC Budget Markup Creates Cyber Info Sharing Capabilities, DISA Cyber Procurement Office

HASC Budget Markup Creates Cyber Info Sharing Capabilities, DISA Cyber Procurement Office
HASC Budget Markup Creates Cyber Info Sharing Capabilities, DISA Cyber Procurement Office

Notably, the committee chair’s markup calls for private sector engagement in developing new cyber threat sharing capabilities.

Afghanistan’s Precarious Networks: Will The Taliban, Once Again, Go Dark?

Afghanistan’s Precarious Networks: Will The Taliban, Once Again, Go Dark?
Afghanistan’s Precarious Networks: Will The Taliban, Once Again, Go Dark?

The Taliban now faces a decision: Ban the internet as the group did during its first rule, while hindering its propaganda windfall and other online activities, or leave the country’s networks intact, allowing an avenue for continued US electronic surveillance.

US, Allies, Partners Formally Attribute Exchange Hacks To China

US, Allies, Partners Formally Attribute Exchange Hacks To China
US, Allies, Partners Formally Attribute Exchange Hacks To China

“The PRC’s pattern of irresponsible behavior in cyberspace is inconsistent with its stated objective of being seen as a responsible leader in the world,” a senior administration official said on Sunday night.

China Likely Outed Soon For Exchange Hacks

China Likely Outed Soon For Exchange Hacks
China Likely Outed Soon For Exchange Hacks

The Exchange campaign attribution will also provide hints about the role of the first national cyber director in such incidents. NSA veteran Chris Inglis was confirmed for the position just weeks ago.

US, UK Warn Of New Worldwide Russian Cyberespionage

US, UK Warn Of New Worldwide Russian Cyberespionage
US, UK Warn Of New Worldwide Russian Cyberespionage

“This is a good reminder that the GRU remains a looming threat, which is especially important given the upcoming Olympics, an event they may well attempt to disrupt,” observed John Hultquist, VP of Analysis at Mandiant Threat Intelligence.