Hacked: The Secrets Behind Cyber Attacks by Jessica Barker, 2024
In this book, cybersecurity expert Jessica Barker uncovers how hackers are weaponizing cutting-edge tactics and technologies to target individuals and organizations, before showing how you can safeguard yourself against any potential attacks and how to react if you do become a target.
Cyber Operations: A Case Study Approach by Jerry M. Couretas, 2024
Cyber Operations offers a comprehensive, structured framework for analyzing cyber systems and their interactions. Drawing on operational examples and real-world case studies, it promises to provide both cyber security professionals and cyber technologies designers with the conceptual models and practical methodologies they need to succeed.
"We are witnessing a historic process -- Russians are leaving for the first time in two centuries," independent Azerbaijani analyst Elhan Shahinoglu told AFP.
#Berlin recalled Alexander Graf Lambsdorff on Monday, three days after accusing #Moscow of #cyberattacks on the governing #SocialDemocraticParty (SDP) and the country’s defence, aerospace, and IT companies. The envoy’s return was ordered just a day before the inauguration of Russian President Vladimir #Putin. #Ukraine
🚨 North Korean hackers target the defense sector with the 'Dream Job' campaign. They're using #cyberattacks to steal sensitive defense technologies and advance their weapons programs.
Cyberattacks and criminal #scams can impact anyone. But communities of color and other marginalized groups are often disproportionately impacted and lack the support to better protect themselves. #privacy#security
🔥 Russian #hacking group #APT28, known as Fancy Bear, is using NTLM relay attacks to breach high-value organizations worldwide, including foreign affairs, energy, defense and finance.
Ukraine Reports Multiple #Cyberattacks on Critical Russian Government Infrastructure and Private Companies, Leading to Nationwide Disruption and Massive Data Loss.
Did you know that IT/tech-related #risks rank really high in the new #WEF Global Risks report?
AI-generated #disinfo is considered to be the 2nd biggest risk (right after extreme weather events). And it's of course connected to the 3rd biggest risk: social/political polarization.
#Cyberattacks are ranked 5th – and can in turn be connected to the disruption of supply chains and critical infrastructure (a topic that also features prominently).
The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics
Packed with insider information based on interviews, declassified files, and forensic analysis of company reports, The Hacker and the State sets aside fantasies of cyber-annihilation to explore the real geopolitical competition of the digital age.
⚠️ ALERT: Threat actor UAC-0099 continues to target Ukraine with #cyberattacks. Learn how they exploit a WinRAR flaw to deliver the 🤖 LONEPAGE #malware.
One notable group, NoName057(16), has garnered attention for targeting government agencies and critical infrastructures in Europe and the United States.
Extremely grateful for having the opportunity to contribute to the latest ENISA Threat Landscape for DoS Attacks. It is an important report from ENISA that gives useful insights into a cybersecurity threat that is often understudied. Read here: https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-dos-attacks