APT

As Election Threats Mount, Voting Machine Hacks are a Distraction

Beating up on direct record electronic (DRE) voting machines has been popular sport in security circles for more than a decade. But is it a distraction from other, more present and dangerous threats to the integrity of elections? A growing body of evidence says “yes.”

Donald Trump and Kim Jong Un

Spotlight Podcast: Why North Korean Summit won’t End Hacking Threat

In this Spotlight Podcast, Jon Condra, the Director of Asia Pacific Research at Flashpoint talks about why U.S. President Donald Trump’s summit with North Korean leader Kim Jong Un won’t put an end to North Korea’s online predation. That is just one conclusion in Flashpoint’s semi yearly Business Risk Intelligence Report. 

People Line up to Vote

Episode 96: State Elections Officials on Front Line against Russian Hackers

In this episode of The Security Ledger Podcast (#96): with primary elections taking place in states across the United States in the coming weeks, we talk to John Dickson about how state elections offices have become the front line in a pitched battle with state-sponsored hackers – with the fate of a 240 year democracy hanging in the balance. Also: we talk about the looming threat posed by so-called “deep fake” videos that use computer manipulation to make famous celebrities appear to say nearly anything.

Opinion: Don’t Be Blinded by APTs

In this industry perspective, Thomas Hofmann of Flashpoint says that sensational coverage of advanced persistent threat (APT) actors does little to help small and mid sized firms defend their IT environments from more common threats like cyber criminals. The key to getting cyber defense right is understanding the risks to your firm and prioritizing investments to protect critical IT assets.

Fist Full 'o Money

Podcast Episode 88: Inside Russia’s DragonFly Group and How Cyber Crooks Launder Money

In this week’s Security Ledger Podcast (#88) we do a deep dive with researcher Vikram Thakur of the firm Symantec on “Dragonfly,” the Russian hacking group whose actions prompted the U.S. Department of Homeland Security and the FBI to issue a joint statement last week warning of intrusions into critical infrastructure in the US. Also: how do cyber criminals cash out all the loot they make from online scams? In our second segment we’ll talk to researcher Mike McGuire of the University of Surrey, who has been studying that question.