WIZARD SPIDER unleashes Conti ransomware to extort millions

Threat actors continue to find new ways of disrupting life for their own financial gain. And sometimes their new ways are modifications of previously effective malware or ransomware, usually with an added punch. In the last year, the damaging Ryuk…

Can Analytics Help the Military Better Plan for Cyberattacks?

According to a recent report by Booz Allen Hamilton, The sheer complexity of military systems, the numerous interconnections between systems and missions, and the siloed nature of military organizations makes it difficult for the senior military leaders to quickly and…

Military Struggles to Identify Full Impact of Potential Cyber Attacks

Today’s weapon systems used by our warfighters against our largest adversaries are increasingly network-enabled. Unfortunately, the network-centric nature of these systems opens them up for cyberattack – making it possible for our adversaries to deny our military’s weapon systems when…

What Steps Can the Military Take to Secure Weapon Systems?

Today’s military platforms and weapon systems are increasingly network and software-enabled, which is helping to make them more effective and efficient tools for the warfighter, but is opening them up to a new avenue of attacks that less connected and…

Could Adversaries Hack Weapon Systems? It’s Certainly Possible…

Much of the same evolution that we’re seeing in our own vehicles – including the emergence of autonomous vehicles and smarter, more connected vehicles – is occurring, in parallel, in military vehicles and weapons platforms. There is barely a single…