Cyber Command Ordered To Cease Hacking Russia

US Defence Secretary Pete Hegseth has paused the US cyber offensive operations against Russia. This is said to be a tactic to end the war in Ukraine.

However, the reasoning behind this action has not been publicly stated, and it is unclear how long this will continue. Trump has in his second term eased the American position against Russia, apparently with the aim to get a deal to end the three year old war.

Hegseth's action has caused alarm across  Europe, where Russia is seen as a pressing threat in cyberspace.

This decision comes despite US intelligence warnings of ongoing Russian cyber threats, including espionage, disinformation campaigns and potential attacks on critical infrastructure. Indeed, Russia and the US are in regular confrontation in cyberspace.

The Kremlin sees cyberspace as a source of asymmetric advantage with the US, as it can burrow into US critical infrastructure and try to influence US elections. Now, the Trump administration appears to agree with Moscow's justification for starting the war and has announced plans to meet his counterpart President Vladimir Putin. The US sided with Russia during recent votes at the United Nations related to the war.

Trump has accused Ukraine's President Zelensky of "Gambling with World War Three" during an unprecedented televised argument in the Oval Office.

It leaves questions over the strength of the US fightback in the cyber arena against alleged Russian hacking, election interference and sabotage efforts that have targeted the Western nations which have sided with Ukraine during the war.

Senior members of Trump's team recently met their Russian counterparts in Saudi Arabia, with the Ukrainians excluded, and have defended their change of approach to Moscow more broadly.

BBC     |   Straight Arrow News     |   CNN     |   YouTube   |   Dig Watch  |  Telegraph     |   The Record     | 

Politico

Image: Ideogram

You Might Also Read: 

President Biden’s Final Cyber Security Executive Order:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« President Trump Says Russia Is Not A Cyber Threat
Frontend vs Backend vs Full Stack: What’s The Difference? »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Ripjar

Ripjar

Ripjar is a global company of talented technologists, data scientists and analysts designing products that will change the way criminal activities are detected and prevented.

AML Solutions

AML Solutions

AML Solutions offer a full range of Anti-Money Laundering and Countering the Financing of Terrorism (AML/CFT) services.

Picus Security

Picus Security

Huge gaps often exists between the "perceived"​ and "actual"​ IT security level of an organization. Picus Security continuously assesses security controls and reveals deficient ones before hackers do.

TorGuard

TorGuard

TorGuard is a Virtual Private Network services provider offering secure encrypted access to the internet.

Synectics Solutions

Synectics Solutions

Synectics deliver solutions for reducing risk, combating financial crime, and enabling organisations to meet their compliance and regulatory commitments.

Orchestra Group

Orchestra Group

Orchestra Group offer a unique integrated cybersecurity defense platform with proactive security policy management and enforcement orchestration.

Palmchip

Palmchip

Palmchip is a Cyber Security, SOC and Software consulting company. We design and develop high performance and secure applications.

Securolytics

Securolytics

Securolytics offers the simplest, most complete and affordable IoT security for all organizations. Securolytics quickly identifies unmanaged devices to reduce security and compliance risks.

Mage Data

Mage Data

Mage (formerly Mentis Software) is a leading solutions provider for data security and data privacy software for global enterprises.

SMARTEST

SMARTEST

SMARTEST is a world-class IT solutions provider active in the most challenging and demanding industries such as the oil and gas industries.

National Cybersecurity Agency (ACN) - Italy

National Cybersecurity Agency (ACN) - Italy

The ACN is the National Authority for Cybersecurity in Italy. the Agency promotes public-private initiatives to strengthen the national cybersecurity and resilience posture.

SoftForum

SoftForum

SoftForum is a company specializing in next-generation information security solutions in the Quantum-Resistant-Cryptography (PQC) field.

iNovex

iNovex

iNovex is a community of innovators that work together to solve hard problems. We partner with you to meet problems head-on and push boundaries with technology solutions.

Ampcus Cyber

Ampcus Cyber

Ampcus Cyber specialize in providing comprehensive security solutions and services that are tailored to safeguard our clients' networks, infrastructure, and valuable assets.

Reach Security

Reach Security

Reach is the first generative AI platform purpose-built to empower enterprise security teams. With Reach, organizations measure, manage, and improve their enterprise security posture at scale.

Xygeni

Xygeni

Xygeni is a leader in Application Security Posture Management (ASPM). Our advanced technology detects malicious code in real-time to prevent malware infections.