The cybersecurity discussion consists of several key dates: 2007 (Estonia), 2008 (Georgia), 2009 (South Korea), 2010 (Natanz), 2011 (Elysee and Bercy), 2012 (Saudi Arabia), 2013 (Snowden case). Will 2014 end without giving us a reference? Helas, not! In the final stretch, it has been revealed the massive attack suffered by Sony, as the film The Interview was being released. The damage to Sony is considerable. Not only were several terabytes of intellectual property stolen, but the hard drives were sabotaged, all the while, 47,000 employees have been robbed of personal data and are threatened individually. President Barack Obama has described the attack as “cybervandalisme and not cyberwar.” In truth, we are halfway to a cyberwar. This cyberattack illustrates the defense-security continuum where cyber defense and the fight against cybercrime co-exist. So far the finger is being pointed at North Korea. This attack has targeted businesses with the hidden agenda to attack the United States and its freedoms defended by the First Amendment of the Constitution. We are seeing the combined effects of the software and semantic attacks. It is not terrorism, but the stage of intimidation and threat has been passed. It is too early to know all of the consequences of the event. However, there is a strong chance that this attack on Sony will be considered a turning point in the history of cybersecurity.
General of the army (2S) Watin-Augouard
![Edito – The Sony case [By General of the army (2S) Watin-Augouard]](https://incyber.org///wp-content/uploads/2021/08/default-image.jpg)
1 min
Edito – The Sony case [By General of the army (2S) Watin-Augouard]
Security and Stability in Cyberspace -
Général d’armée (2S) Marc WATIN-AUGOUARD
-
December 23, 2014
- Security and Stability in Cyberspace
- Cyber industrial safety
- Cybercrime
- Cyber risks
- Operational security
- Antifraud action
- Digital identity & KYC
- Digital Sovereignty
- Digital transition
Security and Stability in Cyberspace
30 January 2023
Ukraine: mobile apps, a new weapon
Ukrainian forces have managed to stop, and reverse, Russia’s progress, thanks to Western support. Ukrainian ingenuity has also been a decisive factor in several areas, particularly in militarizing ...
16 January 2023
From Ukraine to Pakistan, a journey to the heart of Internet geopolitics
The Internet is a constrained space, with its own bottlenecks, center and periphery, its land and sea powers. This is one of the conclusions of the colloquium on the geopolitics of Internet routes ...
13 January 2023
US nuclear research labs targeted by Russian cybercriminals
The Cold River group reportedly launched phishing attacks against three research centres in summer 2022, including one specialising in nuclear weaponry
09 January 2023
North Korea: a specialist in cryptocurrency theft
A South Korean intelligence report accuses Pyongyang of stealing $1.2 billion in cryptocurrency since 2017
30 December 2022
The criminal police is entering the Metaverse
In October 2022, the European Criminal Police Agency (Europol) and the International Criminal Police Organization (Interpol) each released their own reports on the Metaverse. Why? They want to enter ...
28 December 2022
Cybersecurity: why Japan is eyeing Europe
Worried about its cybersecurity and being respectful of private data, Japan is urgently seeking the right formula to defend itself. It is looking to Europe, on the verge of creating a “common ...
Cyber industrial safety
20 January 2023
Everchanging cyberthreats in the energy sector
APT-type attacks, widely covered hacktivist acts, cybercriminal ransomware… Businesses in the energy sector must grasp the extent of the challenges they face.
22 December 2022
Offshore oil and gas: US warns of cyber risk
A report by the Government Accountability Office denounces the obsolescence of software used on many offshore platforms.
08 December 2022
How Europe wants to protect its IT infrastructure in the future
The importance of IT infrastructure is steadily increasing for companies, organizations and entire nations. From the EU’s perspective, a cyber attack on one country can even affect the entire ...
03 November 2022
What are the different cyber threats against solar panels?
DNV provides an update on cyber threats to energy infrastructure, particularly photovoltaic panels
23 September 2022
Israel: pro-Palestine hacktivists hack SCADA/ICS controllers
The GhostSec hacktivist group has claimed it gained control of 55 PLCs at Israeli industrial organisations as part of the “Free Palestine” campaign.
25 July 2022
How can industrial companies ensure the cybersecurity of their supply chain?
Production in industrial companies depends heavily on successful supply chains, as raw materials, materials required for production and usually numerous additional things are necessary to achieve a ...
Cybercrime
13 January 2023
Free decryption key for MegaCortex
Bitdefender, working with Europol, the Swiss authorities and the No More Ransom project, has made this cyber defence tool available online
22 December 2022
New wiper strikes Russian institutions
Known as “CryWiper”, it’s disguised as ransomware. Its origin is unknown, but its power to cause harm is tremendous.
22 December 2022
Chinese cyber attack on Amnesty International
Secureworks reveals that a spyware spied on the Canadian division of the NGO.
23 November 2022
Canada: Sobeys pharmacies fall victim to a cyberattack
In Canada, the Empire Group, owner of Sobeys pharmacies, suffered a cyber attack that paralyzed the processing of prescriptions.
23 November 2022
LockBit affiliate arrested in Canada
In late October 2022, Europol coordinated the arrest of a Lockbit affiliate in Canada. He is suspected of attacks against critical infrastructure.
03 November 2022
Dutch police trick DeadBolt ransomware gang
By faking ransom payments, the Dutch police and the cybersecurity firm Responders recovered 155 decryption keys from the cybercriminal group DeadBolt
Cyber risks
07 February 2023
2023: the year of cybersecurity in healthcare?
The shock dates back to November 2019. The leaders of France’s largest hospitals were stunned by the situation at Rouen University Hospital and the international media’s coverage of the ...
06 February 2023
Anticipating legal cases, a new challenge for cyberattack victims
After a cyberattack, targeted organizations can be brought to court if they are deemed insufficiently protected. While this process only adds to the pressure on the businesses involved, some ...
17 January 2023
The protection of citizens and children on the Internet, a priority issue in 2023
2022 will have seen another explosion in the number of Internet scams. Hackers are becoming more and more professional. They also use all the communication means at their disposal by exploiting our ...
16 January 2023
[OneTrust] The many aspects of GRC platforms (Governance, Risk and Compliance)
Covering a wide variety of risks, what are known as “GRC” solutions allow businesses to deal with conventional and emerging risks that affect them, all the while correcting vulnerabilities and ...
13 January 2023
Cybercriminals are also using ChatGPT
OpenAI’s chat tool is adept at crafting phishing and malware messages
09 January 2023
Israeli spyware targets security cameras
Sold only to state organisations, it can be used to take control of these cameras and even modify recordings
Operational security
13 January 2023
$4.8 million to train cybersecurity experts at the University of Oregon
This National Science Foundation grant is designed to help the US fill its cybersecurity workforce shortage
09 November 2022
Sustainable data destruction: the public sector can do better
Every year, government organizations around the world spend hundreds of millions of dollars on the physical destruction and repurchase of perfectly good IT equipment. Secure data destruction ...
07 November 2022
[EBOOK] Blancco: 3 Guidelines for Communicating (and Implementing) Eco-Friendly IT Asset Disposal Policies
Discover Blancco’s new ebook for Communicating (and Implementing) Eco-Friendly IT Asset Disposal Policies through 3 Guidelines: (1) Embrace Change (Management), (2) Commit to Device ...
12 October 2022
[Interview] Gérald Kugler, HP: “Endpoint devices contribute to enterprise resilience”
In order to provide its equipment with security systems that are independent of any third-party editor, the manufacturer HP has built an ambitious strategy. Gérald Kugler, its Chief Technologist ...
11 October 2022
The CISO as a catalyst for cyber awareness among boards of directors
The attacks that have hit many companies in recent years have made executives and their comex aware of the risks involved and the need to take action. The CISO has played a central role in raising ...
20 September 2022
Tips for Effective Leadership During a Cyberattack
Cyberattacks are almost unavoidable now that everyone relies on the internet daily. While they may not be entirely preventable, you can be prepared in case a cyberattack happens to your ...
Antifraud action
09 January 2023
Digital fraud on the rise worldwide
A LexisNexis report shows that bot attacks have increased by 38% (155% in e-commerce) and human attacks by 32%
09 January 2023
USA: Equifax compensates victims of 2017 data breach
Cybercriminals are taking advantage of this large-scale attack to develop new scams
06 January 2023
Stealers in Google sponsored links
Cybercriminals thwart Google’s vigilance by creating a harmless site, which then redirects to a second site containing malicious software
22 December 2022
Beware of CryptosLabs, the champion of brand spoofing
Group-IB warns against the practices of this dreaded “scam-as-a-service” that has automated tools.
23 November 2022
United States: Complaints after skimming of food aid
In the United States, an association filed a complaint against the State of Massachusetts because of its failure to reimburse food aid funds stolen by skimming.
04 November 2022
U.S. banks are failing to reimburse for instant payment fraud
A U.S. senator’s investigation reveals that major U.S. banks rarely reimburse instant payment service fraud
Digital identity & KYC
06 January 2023
Digital identity as a national security priority in Morocco
When detailing his priorities for 2023, the Director General of the Moroccan National Security made a point of focusing on digital technology
06 January 2023
European Digital Identity Wallet: pilot project awarded
EU Digital Identity Wallet consortium to look at application to travel in 2023
06 January 2023
The EU reaches agreement on the legal framework for its digital identity wallets
Digital ministers adopt a regulation guaranteeing interoperable and secure applications.
07 November 2022
[Case Study] Idemia: The Kingdom of Morocco introduces a national digital ID program
The nation puts into effect its digitalization plan based on new eID cards to reinforce security and convenience for citizens. Discover Idemia’s Case Study on the subject, through the ...
04 November 2022
Digital identity: towards the age of reason?
Digital identity players are gradually getting their act together and the European regulatory framework is becoming more structured. Here is a close-up on a market that is gaining in maturity.
11 October 2022
[Interview] Gregory Kuhlmey, IDEMIA: Biometrics in Digital Identity Wallet
The EU is going all in on its Digital Identity Wallet program. A project that is a source of both hope and worry. Digital Identity Wallet advances, protection privacy, international examples, the ...
Digital Sovereignty
23 January 2023
How the EU wants to protect citizens and businesses from cyberattacks
The EU Commission wants to ensure that future challenges to the security of digital products in the private environment, but also at companies in the EU, are mastered as well as possible. This should ...
14 December 2022
NIS2: New year, new European security rules
The heir to the NIS Directive has been adopted. NIS2 introduces far-reaching changes such as C-level criminal liability to ensure that economic actors take digital assets security seriously. ...
24 November 2022
The European Health Data Space : which answers to which questions?
The draft regulation on the European Health Data Space (EHDS) is proposing a framework for sharing health data in Europe. It is questionable whether the legislation will meet the multiple challenges ...
09 November 2022
The Cloud: how do we renew trust?
Europeans have snapped out of their naivety, and they are now looking for the magic formula to secure their data without foregoing the efficiency of apps backed by American datacenters. France has ...
18 October 2022
What is the Health Data Hub all about?
The Health Data Hub is a public entity responsible for simplifying and standardizing access to health data, while ensuring its control and security. It was created on the recommendation of the ...
18 October 2022
The cybersecurity ecosystem fights for European digital sovereignty
Is sovereignty a mission impossible or the Holy Grail of digital technology? Not so much, says Hexatrust, a group of innovative cloud and cybersecurity companies, who presented its “manifesto ...
Digital transition
27 January 2023
Cybersecurity Maturity in the UAE: A fast and continuous improvement process
The Emirate has been rapidly maturing in the cyber sector, both in the public and private sectors. It took the country only one year (from 2019 to 2020) to move from 33rd to 5th place, according to ...
09 January 2023
Canada’s health records are woefully insecure
Report slams the authority responsible for managing British Columbia’s health data sharing platform
13 December 2022
Is Africa the next cyber El Dorado?
Countries that are evolving and becoming aware of cyber issues, an Internet market that is soaring, but also geopolitical issues and major gaps to fill: Africa is a cyber market that is both ...
09 December 2022
Cybersecurity, a new challenge for the construction industry
The use of digital tools, from design offices to maintenance teams, means that smart buildings are exposed to cyber risks. What are these new types of threats? What are the solutions offered by ...
06 December 2022
Ethics and compliance for the younger generation
Regulatory compliance projects and the application of major ethical principles are both highly challenging issues for companies. Attracting the younger generation and mastering all the algorithms ...
22 November 2022
Predictive analytics in cybersecurity: myth or reality?
Companies are finally using a technology that predicts data breaches before they happen — predictive analytics. Like a radar, telling you when an enemy is approaching, predictive analytics is used ...