26 septembre 2024 | International,

Chinese Hackers Infiltrate U.S. Internet Providers in Cyber Espionage Campaign

Chinese hackers breach US internet providers, targeting sensitive data and critical infrastructure. Government responds as cybersecurity concerns esca

https://thehackernews.com/2024/09/chinese-hackers-infiltrate-us-internet.html

Sur le même sujet

  • Startups Need Free Data To Work With Army: Venture Capitalists

    21 juillet 2020 | International, C4ISR, Sécurité

    Startups Need Free Data To Work With Army: Venture Capitalists

    Because open-source software lacks the same kind of cyber certification that comes with more sensitive information, it is fertile ground for start-ups looking to work on military data, provided each service makes an open-source library available. By KELSEY ATHERTONon July 20, 2020 at 7:01 AM ALBUQUERQUE: Venture capitalists want the Pentagon to be a good market. But for an industry that makes many unsuccessful bets in the promise that just a few pan out spectacularly, marketing software exclusively to the Pentagon poses an almost unacceptable risk. To ease startups into contracting, investors suggest the Army should provide unclassified, open-source data as the Air Force already does. Near the top of his investors' wishlist, says Stu Solomon, CTO of intelligence provider Recorded Future, is removing “a lot of the friction necessary to get innovation into the government without having to be directly aligned or affiliated with the big solution integrators.” Hitching new technology to a company already firmly ingrained in the Pentagon's ecosystem is a popular way to shepherd new software through the acquisitions process. It is also partly explains how, despite hundreds of millions of dollars in military contracts going to Silicon Valley companies, tech adoption seems as slow from the Valley as elsewhere. Solomon's remarks came during a panel at AFCEA's 2020 AFCEA Army Signal conference. Recorded Future was founded in 2008, received early funding from IN-Q-TEL, received a contract from DIU in 2017, and a contract from Cyber Command in 2020. Much of Recorded Future's product is built on ingesting open-source information and offering analysis. As a feature, that meant the company could sustain itself in the commercial market, selling enterprise software, while still planning long-term to contract with the military, DHS, and intelligence services. “If you think this is eventually going to be a market that matters to you, you're not going to be able to wait four years for the procurement process to mature as your product matures,” said Elizabeth Lawler, founder of Founder of AppLand. If a startup's focus is solely on processing classified data, the capital investors need to be aligned directly with that goal to fund it since getting certified to handle classified material is one of the major sources of cost and friction. “My current startup, focused on providing real-time up-to-date software images, works on things that are less sensitive as a starting point,” said Lawler, “for example, some of the code bases in the Air Force's open source code repository.” Because open-source software lacks the same kind of cyber certification that comes with more sensitive information, it is fertile ground for start-ups looking to work on military data, provided the service makes an open-source library available. “When it comes to this Valley of Death, I really view what we do when we start companies as an awful lot like a really difficult special forces mission,” said Andy Palmer, co-founder and CEO of data management company Tamr. “When you go in, you drop onto the ground to start a company, with a small team of people, and limited resources, and what oftentimes feels like an unreasonable objective. It's hand to hand combat for much of it, it's not pretty. The goal is survival.” So, if the Army wants to bring new data tools to the battlefields of the future, it could start by creating open-source environments that allow companies to solve problems, at a smaller scale and without the hurdles of classification, suggested several panelists https://breakingdefense.com/2020/07/startups-need-free-data-to-work-with-army-venture-capitalists

  • US Army's hypersonic supervisor talks tech portfolio

    10 novembre 2021 | International, Terrestre

    US Army's hypersonic supervisor talks tech portfolio

    Since Lt. Gen. L. Neil Thurgood took over the U.S. Army's Rapid Capabilities and Critical Technologies Office, he's overseen the Pentagon's attempt to build the U.S. hypersonic weapons industrial base, begun fielding hypersonic launchers and other equipment to the first unit to receive the capability and has started building out the first battery of a laser-weapon equipped Stryker combat vehicle.

  • DoD releases first new cyber strategy in three years

    20 septembre 2018 | International, C4ISR

    DoD releases first new cyber strategy in three years

    By: Mark Pomerleau In its first formal cyber strategy document in three years, the Department of Defense said it would focus its cyber efforts on China and Russia and use the Pentagon's cyber capabilities to collect intelligence as well as to prepare for future conflicts. According to an unclassified summary and fact sheet released Sept. 18, the documents lay out a vision for addressing cyber threats and addresses the priorities of the department's National Security Strategy and National Defense Strategy, which focused on a new era of strategic great power competition. “The United States cannot afford inaction,” the summary reads. It notes that China and Russia are conducting persistent campaigns in cyberspace that pose long term risk. The documents also say that China is eroding the U.S. military's ability to overmatch opponents and that Russia is using cyber-enabled information operations to influence the U.S. population and challenge democratic processes. The DoD's strategy comes on the heels of other major movements in cyberspace from the department. These include the elevation of U.S. Cyber Command to a full unified combatant command — which affords new and exquisite authorities — the full staffing of Cyber Command's cyber teams, an update to DoD's cyber doctrine and new authorities delegating certain responsibilities from the president to DoD to conduct cyber operations abroad. The summary's lists five objectives for DoD's cyberspace strategy: - Ensuring the joint force can achieve its missions in a contested cyberspace environment; - Strengthening the joint force by conducting cyberspace operations that enhance U.S. military advantages; - Defending U.S. critical infrastructure from malicious cyber activity that alone, or as part of a campaign, could cause a significant cyber incident; - Securing DoD information and systems against malicious cyber activity, including DoD information on non-DoD-owned networks; and - Expanding DoD cyber cooperation with interagency, industry, and international partners. The strategy also describes the need to remain consistently engaged with this persistent adversary and to “defend forward” as a means of disrupting or halting malicious cyber activity at its source, including activity that falls below the level of armed conflict. While academics have criticized the U.S. response to Russian election interference, the strategy notes that the United States tends to view conflicts through the binary lens of war or peace while competitors such as Russia see themselves constantly engaged in a state of war. U.S. Cyber Command's new leader is taking a different tact. “We've got to act forward outside of our boundaries, something that we do very, very well at Cyber Command in terms of getting into our adversary's networks. That's this idea of persistent engagement, the idea that the adversary never rests, so why would we ever rest,” Gen. Paul Nakasone said during an August dinner hosted by the Intelligence and National Security Alliance. Nakasone also has described the notion of defending forward as enabling forces to act outside the boundaries of the U.S. to understand what adversaries are doing in order to better defend against them. https://www.fifthdomain.com/dod/2018/09/19/department-of-defense-unveils-new-cyber-strategy

Toutes les nouvelles