Cyber War and Real War Coincide In Ukraine

Eastern Ukraine Comabt Zone

The type of cyber war that the US government and military are most worried about, and preparing for, is already in full swing in the Ukraine

The Ukraine has found itself on the receiving end of both cyber and direct attacks by Russian groups backing a separatist movement inside their country. And despite the Ukraine's large number of hackers who have played havoc with computer systems around the world, it has found itself woefully unprepared to defend its own computer networks.

According to a Wall Street Journal report, the Ukrainian Ministry of Defense, Foreign Affairs and its presidential administration have all been compromised at one time or another with many of the hacked documents appearing on the CyberBerkut website.

CyberBerkut is a Moscow-based hacking group that has taken credit for attacking Ukrainian computer networks. In addition to conducting cyber attacks, the group took responsibility for a physical attack on the Ukrainian election office destroying computer systems meant to track the elections process, said a report on Globalsecurity.org.

While US forces could most likely thwart direct attacks upon their military and government facilities, American officials are less sure about defending the cyber frontier and are taking steps to buttress these walls.

Recently, the head of the US Cyber Command, Adm. Michael S. Rogers, called for his organization's capabilities to be better integrated into all aspects of the country's cyber security effort. This would include building cybersecurity operations into all military planning. The WSJ said other attacks have targeted Ukrainian officials involved in fighting the land war against the separatists.

The US Army Cyber Command is even running field tests on how to insert cyberspace warfighting into smaller Army units on the battlefield. Here they would handle tasks such as centered on snagging tactical intelligence from the enemy's communications systems that can be put to immediate use by a commander, as well as, defending our own forces from similar incursions, Isaac Porsche, the Rand Corp. associate director, forces and logistics program told SCMagazine.com.

SC Magazine:  

« Mystery Fingers on Keyboard in JPMorgan Hack
Cybercrime: How to Recognize an Online Fraudster »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Paessler

Paessler

Paessler is a leading worldwide provider of network monitoring software.

European Business Reliance Centre (EBRC)

European Business Reliance Centre (EBRC)

EBRC is a leader in integrated Data Center, Cloud and Managed Services and a Centre of Excellence in Europe in the Management of Sensitive Information.

RedShield Security

RedShield Security

RedShield is the world's first web application shielding-with-a-service company.

Trapmine

Trapmine

TRAPMINE is an innovative cybersecurity products company mainly focusing on protecting organizations from Advanced Persistent Threat & Zero-Day attacks.

Deceptive Bytes

Deceptive Bytes

Deceptive Bytes provides an Active Endpoint Deception platform that dynamically responds to attacks as they evolve and changes their outcome.

GoCyber

GoCyber

GoCyber is a new, highly innovative cyber security training app that uses action based learning to significantly improve the online behaviour of all employees in less than a month.

Vortiv

Vortiv

Vortiv Ltd (formerly known as Transaction Solutions International Ltd) is a technology based company focused on the cybersecurity and the cloud services sector.

ARIA Cybersecurity Solutions

ARIA Cybersecurity Solutions

The ARIA ADR Automatic Detection & Response solution was designed to find, verify, and stop all types of attacks - automatically and in real time.

Senteon

Senteon

Senteon is a turnkey cybersecurity platform designed to make securing confidential data affordable, understandable, and streamlined for small-to-mid sized businesses and MSPs.

TotalAV

TotalAV

TotalAV Antivirus is a free-to-use app packed with all the essential features to find and remove malware, keeping you safe.

Encova Insurance

Encova Insurance

Encova’s cyber liability coverage protects you and your customers in case of a security breach in your company's data.

Data Pie Cybersecurity

Data Pie Cybersecurity

The Data Pie Cybersecurity Consulting offers a 360° around protection for your IT security. Security awareness solutions and consulting.

Blue Bastion

Blue Bastion

Don’t give cybercriminals the chance to find weaknesses in your company’s cyber security system. Defend your institution from all attacks from all directions with Blue Bastion.

StealthMole

StealthMole

StealthMole is a deep and dark web threat intelligence company that delivers a cloud-based, unified platform for digital investigation, risk assessment, and threat monitoring.

Cloud & More

Cloud & More

Tired of impersonal IT support? Experience the Cloud & More difference. We offer tailored IT services with a personal touch, ensuring your business technology runs smoothly.

Axoflow

Axoflow

Axoflow helps organizations to consolidate their existing solutions for logs, metrics, and traces, and evolve them into a cloud native observability infrastructure.