Cyber War and Real War Coincide In Ukraine

Eastern Ukraine Comabt Zone

The type of cyber war that the US government and military are most worried about, and preparing for, is already in full swing in the Ukraine

The Ukraine has found itself on the receiving end of both cyber and direct attacks by Russian groups backing a separatist movement inside their country. And despite the Ukraine's large number of hackers who have played havoc with computer systems around the world, it has found itself woefully unprepared to defend its own computer networks.

According to a Wall Street Journal report, the Ukrainian Ministry of Defense, Foreign Affairs and its presidential administration have all been compromised at one time or another with many of the hacked documents appearing on the CyberBerkut website.

CyberBerkut is a Moscow-based hacking group that has taken credit for attacking Ukrainian computer networks. In addition to conducting cyber attacks, the group took responsibility for a physical attack on the Ukrainian election office destroying computer systems meant to track the elections process, said a report on Globalsecurity.org.

While US forces could most likely thwart direct attacks upon their military and government facilities, American officials are less sure about defending the cyber frontier and are taking steps to buttress these walls.

Recently, the head of the US Cyber Command, Adm. Michael S. Rogers, called for his organization's capabilities to be better integrated into all aspects of the country's cyber security effort. This would include building cybersecurity operations into all military planning. The WSJ said other attacks have targeted Ukrainian officials involved in fighting the land war against the separatists.

The US Army Cyber Command is even running field tests on how to insert cyberspace warfighting into smaller Army units on the battlefield. Here they would handle tasks such as centered on snagging tactical intelligence from the enemy's communications systems that can be put to immediate use by a commander, as well as, defending our own forces from similar incursions, Isaac Porsche, the Rand Corp. associate director, forces and logistics program told SCMagazine.com.

SC Magazine:  

« Mystery Fingers on Keyboard in JPMorgan Hack
Cybercrime: How to Recognize an Online Fraudster »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

Computer Laboratory - University of Cambridge

Computer Laboratory - University of Cambridge

Computer security has been among the Laboratory’s research interests for many years, along with related topics such as cryptology

8MAN

8MAN

8MAN is a leading Access Rights Management (ARM) solution in Microsoft and virtual server environments.

CloudCheckr

CloudCheckr

CloudCheckr is a next-gen cloud management platform that unifies Security & Compliance, Inventory & Utilization and Cost Management.

4iQ

4iQ

4iQ fuses surface, social, deep and dark web sources to research and assess risks to people, infrastructure, intellectual property and reputation.

SKOUT Secure Intelligence

SKOUT Secure Intelligence

SkOUT Secure Intelligence (formerly Oxford Solutions) provides cyber security monitoring services to organizations around the globe.

BankVault

BankVault

BankVault is a new type of cyber technology (called remote isolation) which sidesteps your local machine and any possible malware.

CICRA

CICRA

CICRA is Sri Lanka's pioneering cyber security training and consultancy provider.

ThreatAware

ThreatAware

Total visibility of your business cybersecurity. Monitoring, management and compliance for your cybersecurity tools, people and processes from one easy to use dashboard.

Renesas Electronics

Renesas Electronics

Renesas Electronics delivers trusted embedded design innovation with solutions that enable billions of connected, intelligent devices to enhance the way people work and live - securely and safely.

Charterhouse Müller UK

Charterhouse Müller UK

Charterhouse Müller UK are a leading service provider for end of life IT services including data erasure and secure IT asset disposal.

Cyberspace Solarium Commission (CSC)

Cyberspace Solarium Commission (CSC)

The Cyberspace Solarium Commission was established to develop a consensus on a strategic approach to defending the United States in cyberspace against cyber attacks of significant consequences.

Concentric AI

Concentric AI

Concentric Data Risk Monitoring and Protection. Deep Learning to discover, monitor and remediate risks to sensitive data on-premises and in the cloud.

Hummingbird International

Hummingbird International

Hummingbird International, LLC offers services for the collection, audit, computer recycling and safe disposal of laptops, monitor/LCD, hard drives, and IT disposal.

Custocy

Custocy

Custocy is a unique collaborative AI technology that identifies sophisticated and unknown (zero-day) attacks.

Seiber

Seiber

Seiber are a UK based Cyber Security company who provide consultancy and training services. Our objective is to stop bad things happening to good people.

Sensfrx

Sensfrx

At Sensfrx, we are dedicated to revolutionizing the landscape of online fraud prevention.