Cyber War

Nation-States and Data Breaches

Nation-States and Data Breaches

Cyber intruders now use in-country assets to mask their location, making attribution challenging. If the state actor has a grudge that they want to air, then they will use their own addresses to get their message across to the company and government.

Read More

10 Privacy Threats to Beware

Equation, the NSA and Cyber Espionage

I’m always shocked when 20 year old exploits become news, but last week’s furor around the Equation cyber espionage group detailed in the Kaspersky report warranted a response. The infiltration technology mentioned in this report – introducing rogue firmware into the IT infrastructure supply chain – has been around for a very long time.