Questions tagged [cyber-warfare]

Cyberwarfare has been defined as "actions by a nation-state to penetrate another nation's computers or networks for the purposes of causing damage or disruption", but other definitions also include non-state actors, such as terrorist groups, companies, political or ideological extremist groups, hacktivists, and transnational criminal organizations.

23 questions
107
votes
5 answers

Confirmed evidence of cyber-warfare using GPS history data

In its recent policy, the US Department of Defense has prohibited the use of GPS-featured devices for its overseas personnel. They explain it with a theory that commercial devices like smartphones or fitness trackers can store the geo-position (GPS)…
19
votes
4 answers

Is strategic cyber-warfare feasible today?

Cyber attacks that target a nation's infrastructure are a documented fact and as such a danger that political and military leadership across the world needs to worry about and act proactively. These attacks can be disruptive but given the relatively…
6
votes
1 answer

What is the difference between cybersecurity and information security?

I'm trying to differenciate between those two themes : cybersecurity vs information security. Broadly speaking I'd say cybersec is about network security (TCP/IP, router, firewall,...) and infosec is about data security (data exfiltration, wikileaks…
4
votes
1 answer

Is there any type of cyber attack for which the geographical distance between the attacker and the target matters?

Context I cannot remember the source, but it was most likely within the comments box for a clip about cyberattacks happening after the Russian invasion of Ukraine. It was something along the lines: comment: party X moved its hackers closer to the…
Alexei
  • 2,183
  • 3
  • 9
  • 23
4
votes
4 answers

Detecting Tor Browser using SIEM

I'm looking for a possible way to identify Tor Browser activity using QRadar. We have Firewall integrated & IPS (Without Application Control. Hence not a possible option). I went through the link https://www.dan.me.uk/tornodes but not able to…
Shiva
  • 41
  • 3
3
votes
2 answers

Mutually Assured Destruction and Cyber Warfare

During the Cold War, the U.S. and the former Soviet Union pursued a policy of mutually assured destruction (MAD). I am wondering if it is safe to assume that organizations such as the National Security Administration and its counterparts in Russia…
user2309840
  • 131
  • 2
3
votes
1 answer

Why are overused buzzwords like Cyber and Hacking still prevalent in our industry?

Proper terminology is important for anyone who wants to learn something. The best way to develop professionalism is to rely on a set of well defined technical terms. So it should be in any professionals interest to avoid vague terms which tend to…
AdHominem
  • 3,006
  • 1
  • 16
  • 26
2
votes
0 answers

Information on the Elderwood Project/Platform

I've read Symantec's whitepaper on the Elderwood Project and the blog update on the Elderwood Platform. They both make for a very interesting read, especially in the zero-day exploit meta-analysis that found the Elderwood Platform. Does anyone know…
2
votes
2 answers

Is Power Failure an Environmental or Structural Threat?

According to the CySA SYBEX book, in chapter 1, power failures are listed as both environmental threats and structural threats... but which one is it? According to the book: Environment threats occur when natural or man-made disasters occur that…
2
votes
0 answers

how to create random request time delay in sqlmap?

How can i configure sql-map to try payloads at random time delay? as an example time between first and second request can be 0.10s and second and third might 0.25 and so on. i know there is --delay option but it takes static value.
2
votes
1 answer

Are there technical reasons why state actors may be more able of carrying out malware cyberattacks against critical infrastructure, than individuals?

The US and the UK have publicly accused the Russian military of orchestrating attacks using the NotPetya malware: Foreign Office minister Lord Ahmad of Wimbledon said: "The UK government judges that the Russian government, specifically the Russian…
gerrit
  • 1,829
  • 1
  • 17
  • 26
2
votes
1 answer

Can you, with 100% certainty, guarantee the source location of a cyber attack?

There have been reports that American technology and cyber security experts have claimed that Russia is behind the recent cyber attacks on the United States, notably those aimed at influencing the current U.S. presidential election. Can these…
8protons
  • 218
  • 1
  • 8
1
vote
2 answers

Is there a cyber equivalent to the JTLS?

Is there a cyber warfare equivalent to the JTLS? Is a "cyber range" the correct term for something like that?
adamo
  • 163
  • 9
1
vote
0 answers

Example of a hacking attempt that failed because of a bug?

We hear all the time in popular press (and increasingly, in government publications + scholarly articles) about how "cyberattacks" make us insecure, because we have so many vulnerabilities (mostly from a user perspective, but also on occasion from a…
Andrew Min
  • 111
  • 1
1
vote
0 answers

Anatomy of a Cyber exercise and SOC

What exactly entails an incident response exercise (like a Red/Tiger team excercise)? How does it add value to a security operations center? Is there any good resource I can read up on how to set up a 24x7 security operations center SOC? I am also…
dorothy
  • 715
  • 1
  • 7
  • 18
1
2