Cyber War and Real War Coincide In Ukraine

Eastern Ukraine Comabt Zone

The type of cyber war that the US government and military are most worried about, and preparing for, is already in full swing in the Ukraine

The Ukraine has found itself on the receiving end of both cyber and direct attacks by Russian groups backing a separatist movement inside their country. And despite the Ukraine's large number of hackers who have played havoc with computer systems around the world, it has found itself woefully unprepared to defend its own computer networks.

According to a Wall Street Journal report, the Ukrainian Ministry of Defense, Foreign Affairs and its presidential administration have all been compromised at one time or another with many of the hacked documents appearing on the CyberBerkut website.

CyberBerkut is a Moscow-based hacking group that has taken credit for attacking Ukrainian computer networks. In addition to conducting cyber attacks, the group took responsibility for a physical attack on the Ukrainian election office destroying computer systems meant to track the elections process, said a report on Globalsecurity.org.

While US forces could most likely thwart direct attacks upon their military and government facilities, American officials are less sure about defending the cyber frontier and are taking steps to buttress these walls.

Recently, the head of the US Cyber Command, Adm. Michael S. Rogers, called for his organization's capabilities to be better integrated into all aspects of the country's cyber security effort. This would include building cybersecurity operations into all military planning. The WSJ said other attacks have targeted Ukrainian officials involved in fighting the land war against the separatists.

The US Army Cyber Command is even running field tests on how to insert cyberspace warfighting into smaller Army units on the battlefield. Here they would handle tasks such as centered on snagging tactical intelligence from the enemy's communications systems that can be put to immediate use by a commander, as well as, defending our own forces from similar incursions, Isaac Porsche, the Rand Corp. associate director, forces and logistics program told SCMagazine.com.

SC Magazine:  

« Mystery Fingers on Keyboard in JPMorgan Hack
Cybercrime: How to Recognize an Online Fraudster »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CIRCL

CIRCL

CIRCL is the national Computer Incident Response Center of Luxembourg

Cyber Together

Cyber Together

Cyber Together is dedicated to advancing the cyber security industry by giving businesses access to Israel’s leaders, innovators and great minds in the field of cyber security.

Kount

Kount

Kount's “decision engine” platform is ideal for managing fraud in online/telephone channels that process payments and onboard new customers.

Crest International

Crest International

Crest is focused on professionalizing the technical cyber security market whilst driving quality and standards of organizations that operate within it.

Cybertekpro

Cybertekpro

Cybertekpro is a specialist insurance broker providing Cyber Liability insurance and cyber risk assessment services.

PKWARE

PKWARE

PKWARE is a global leader in business data security, providing encryption and compression solutions to enterprise customers and government entities around the world.

Quick Heal Technologies

Quick Heal Technologies

Quick Heal Technologies is a leading IT security solutions provider focused on endpoint and network security solutions.

Digital Law

Digital Law

Digital Law is the only UK law firm to specialise solely in online, data and cyber law.

PBOSecure

PBOSecure

PBOSecure is a dynamic and progressive IT consultancy company specializing in IT and Industrial Control System (ICS) security.

Softcat

Softcat

Softcat offer a broad portfolio of IT services and solutions covering Hybrid Infrastructure, Cyber Security, Digital Workspace and IT Intelligence.

Myota

Myota

Myota intelligently equips each file to be resilient and achieve Zero Trust-grade protection. Withstand ransomware and data breach attacks. Reduce data restoration time and effort.

ImmuneBytes

ImmuneBytes

ImmuneBytes is a cutting-edge security startup that aims to provide a secure blockchain environment for a dependable and open Web3 ecosystem.

Phriendly Phishing

Phriendly Phishing

Phriendly Phishing offers phishing awareness training programs designed to ward off potential security threats and minimise the impact of cyber attacks.

Cyviation

Cyviation

Cyviation's mission is to mitigate ever-growing and menacing Cyber Security threats, focusing on aircraft, airlines and airports.

AI Safety Institute (AISI)

AI Safety Institute (AISI)

The AI Safety Institute’s mission is to minimise surprise to the UK and humanity from rapid and unexpected advances in AI.

IT Voice

IT Voice

IT Voice specializes in Managed IT and VoIP solutions. Our focus is simplifying the technology so our customers can stay focused on what they do best.