|
|
ARCHIVES
| |
|
|
|
Outlining and Correcting the
Misconceptions Surrounding “Intelligence” |
| |
|
|
Security Experts and Journalists are complaining about the lack of standards in the computer security industry. “In Firms Far From Taming The Tower of APT Babel” Robert Lemos of Dark Reading bemoans that “Threat Intelligence Firms” continue to have their own terminology to describe both players and threats. There are a multitude of 'security' and 'Intelligence' certifications. Unfortunately most of the computer and technical experts have not been appropriately trained in the fundamentals of Intelligence.
As a result cybersecurity reports have a wide range of quality in their structure and information. It can be argued that very few of the reports actually contain “Intelligence”. Read more (PDF)... |
| |
| |
|
|
|
| |
|
|
|
A Special CSCSS Defence Intelligence Group Report Outlining The Deliberate Targeting of U.S Financial Institutions |
| |
 |
|
On June 3rd and 4th 2013 open DNS providers were attacked during part of the attack on U.S. Financial institutions. Prolexic, a company that specializes in mitigating DNS attacks, has announced that the attacks peaked at a bandwidth of 167 Gbps during a DNS Reflection Attack. This attack marks a new phase in co-ordination and major increase in demonstrated capability. These attacks are becoming a major threat to the financial structure of the United States, and more generally western financial institutions.
This Focus Report: reviews the most recent attacks, the impact of these attacks, and provides analysis, and assessment of the attackers. Read more (PDF)... |
| |
| |
|
|
|
| |
|
|
|
CSCSS / CASE STUDY -
Anatomy of a Breach |
| |
 |
|
Attack information for this CSCSS Case Study was volunteered by multiple sources. Identification data has been removed to protect the sources as well as the companies involved. This incursion is NOT public knowledge. The analysis is based on computer security analysis that has been released into that industry's trade journals and publications. It is also based on Open Source Media and unclassified government sources.
EXECUTIVE SUMMARY
In November 2011, a number of personnel from (Targeted Company) (location removed) publicly vented their frustrations with a series of unusual incidents in the company. There was a series of issues with a particular project. Some incidents centered around the company computer network, others around a crash of the company telephone network, followed by a crash of the network file server. Detailed non-technicalMark descriptions were provided by multiple sources. The descriptions and subsequent data suggests that ( Targeted Company ) received a targeted cyber-attack, most probably from the People's Republic of China ( PRC ). Read more (PDF)... |
| |
| |
|
|
|
| |
|
|
|
Behind the Victory: Midway and JN 25
By: Stephen P. Zammit |
| |
 |
|
In the Pacific Theatre during the Second World War, Japanese forces were relentless in their attacks and victories over the Allied forces in South East Asia and in the Western Pacific. The string of victories from December 7th 1941 to May 20th 1942 included – the attack on Pearl Harbor, the capture of Thailand, Malaya, Wake Island, Guam Island, the Philippines, Hong Kong, Singapore, Burma, Dutch Indonesia and the invasion New Guinea. Japanese naval and air assets roamed the Pacific attacking Allied bases in Australia, Ceylon, east Africa, and even the west coast of North America at will. But, the sea battles of Coral Sea and more specifically at Midway, in May / June 1942 put a halt to the wave of Japanese victories.
Read more... |
| |
| |
|
|
|
|
|