SlideShare a Scribd company logo
One year away from the third decade of the 21st century and technology has finally caught up with science fiction. In
2019, we’re going to hear more news about driverless cars, revolutions in artificial intelligence and commercial
applications for drones. One thing is for sure: it’s an exciting time to be alive.
Unfortunately, advances in technology bring about advances in public threats; 2019 is not an exception. Last year we
saw a startling number of security breaches, ransomware attacks and data leaks from Fortune 500 organizations.
Hackers are getting smarter all the time, and – with increased incentive to profit from booming digital black markets –
they haven’t rested yet.
It’s Getting Political
Things are going to be a little different this year. Hacking culture has always been entangled with a certain political ethos (hence the
connectionbetween Anonymous and the anarchist thriller V for Vendetta), but in recent years money has dominated as the end game in a
majority of highly publicized attacks.
With rising political unrest around the world, cyber attacks are becoming more about nations, countries and governments than ever before.
Take several examples: In March of last year, the FBI and Department of Homeland Security (DHS) filed a joint report disclosing that Russian
hackers had been tied to attacks on U.S infrastructure, including energy, water and aviation. The attackers stole sensitive information for
unknown purposes, spreading widespread alarm. For some time, different departments of the U.S government dealt with information
security, including the FBI, CISA and NSA. In November of 2018, Congress approved the formation of a ‘Cybersecurity Agency,’ signaling a
unified bipartisan emphasis on the threat of cyberattacks against the U.S. Last December, Chinese nationals Zhu Hua and Zhang Shilong were
indicted for stealing vast amounts of sensitive data related to American industries and technologies. The attackers also stole social security
numbers and other personal information from over 100,000 U.S Navy personnel, officially ending a three-year agreement between the U.S
and China not to engage in cyberattacks or espionage.
While the threat of cyberwarfare has existed since cyberattacks became a technological possibility, it was once – for the most part – an
intrigue of science fiction and futurism. Now that key government resources are increasingly digitized, the threat has become a palpable
reality.
As former DHS Under Secretary Suzanne Spaulding observes, “Until recently the US did not publicly attribute various cyber incidents to
specific nations, despite public pressure to do so.” The country’s attitude has finally changed: when it comes to international relationships,
cyberwarfare is no longer a weird exception to the rule.
New Technology, New Threats
In addition to the new temperature that has raised cybersecurity stakes for world powers, 2019 will likely witness the rise of
new threats that experts are only just coming to terms with.
Here are a few that will pose a risk for domestic security:
Attacks Fueled by IoT Botnets
In order to manage incoming traffic from visitors, websites must be hosted on servers with enough bandwidth. One common
way to attack a server is to send a large amount of fake traffic from multiple computers, thus exceeding the server’s
bandwidth and taking it offline.
These Distributed Denial of Service (DDoS) attacks are hardly new, but in recent years, the Internet of Things (IoT) has made
them dramatically more powerful.
Here’s the basic script: a hacker discretely accesses thousands of Internet connected devices – from phones to smart
thermostats – and links them altogether in a “botnet”. Then the hacker instructs the devices to target a server,
overwhelming it with traffic.
Three years ago, this kind of attack took large portions of the Internet offline along the U.S east coast. Now, Symantec
predicts that IoT botnets will be used to conduct much more sophisticated attacks giving attackers unprecedented power.
Critical Infrastructure Attacks
We’ve already mentioned that in 2018, the U.S acknowledged cyber attacks against critical infrastructure. This event
wasn’t a proof-of-concept: in 2015, attackers successfully targeted the Ukrainian power grid, and managed to
leave 230,000 citizens without electricity.
While it’s not a brand-new idea, infrastructure attacks are becoming more common for a simple reason: more of it is
connected to the web. This vulnerability goes to show that IoT isn’t just a tool for attackers to use; it’s a weakness for
them to exploit.
As Brian NeSmith of Forbes Council points out,
“With digital technology wherever we look and the explosion of the internet of things (IoT), the possibilities of cyber-
mayhem are limitless. Think of nuclear reactors, chemical plants and satellites in space — all are potentially
vulnerable targets.”
The possibility that hackers could cripple the U.S power grid was so concerning to U.S Senators that last year,
they proposed a bill that would have banned digital control systems sometimes used by power stations.
Spear Phishing and APT Groups
Most organizations are aware of phishing threats: an attacker can use false login portals, domains and forms to dupe
employees into sharing sensitive information that can be used to further sabotage a business.
Phishing attacks have been common from the beginning of the Internet, but spear phishing is an entirely different
animal. Also known as “targeted phishing,” spear phishers single out an organization or business and tailor the attack
to ensnare a target.
Much like social engineering, spearfishing is effective because it exploits intimate knowledge of an organization or
insider. They are both more dangerous and more convincing than traditional phishing attacks and present an active
threat to government agencies.
The Chinese attackers who targeted NASA last year employed spear phishing to access sensitive information, and
it’s a favorite tactic of organizations deemed Advanced Persistent Threats (APTs) by the U.S government.
In December of last year, the U.S. House of Representatives passed a bill requiring the White House to maintain an
active list of APTs and the individuals who work for them. It is but one step on the long road to America’s national
security in the wake of new cyber threats.

More Related Content

What's hot

Securing Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay RobertsonSecuring Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay RobertsonEljay Robertson
 
Cyberdefense strategy - Boston Global Forum - 2017
Cyberdefense strategy - Boston Global Forum - 2017Cyberdefense strategy - Boston Global Forum - 2017
Cyberdefense strategy - Boston Global Forum - 2017
NgocHaBui1
 
Final Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayFinal Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayCallum Craigie
 
Why Are We Being Watched?
Why Are We Being Watched?Why Are We Being Watched?
Why Are We Being Watched?
Crystal Miller
 
HacktivismPaper.docx
HacktivismPaper.docxHacktivismPaper.docx
HacktivismPaper.docxDesarae Veit
 
Cyber War ( World War 3 )
Cyber War ( World War 3 )Cyber War ( World War 3 )
Cyber War ( World War 3 )
Sameer Paradia
 
Web Breaches in 2011-“This is Becoming Hourly News and Totally Ridiculous"
Web Breaches in 2011-“This is Becoming Hourly News and Totally Ridiculous"Web Breaches in 2011-“This is Becoming Hourly News and Totally Ridiculous"
Web Breaches in 2011-“This is Becoming Hourly News and Totally Ridiculous"
Jeremiah Grossman
 
Privacy in the Information Age [Q3 2015 version]
Privacy in the Information Age [Q3 2015 version]Privacy in the Information Age [Q3 2015 version]
Privacy in the Information Age [Q3 2015 version]
Jordan Peacock
 
Privacy in the Information Age
Privacy in the Information AgePrivacy in the Information Age
Privacy in the Information Age
Jordan Peacock
 
Cyber crime:The Transformation Of Crime In The Information Age.
Cyber crime:The Transformation Of Crime In The Information Age.Cyber crime:The Transformation Of Crime In The Information Age.
Cyber crime:The Transformation Of Crime In The Information Age.
Omkar Walavalkar
 
Global Commision on Internet Governance
Global Commision on Internet GovernanceGlobal Commision on Internet Governance
Global Commision on Internet GovernanceDominic A Ienco
 
Bashar H. Malkawi, The Forum on National Security Law
Bashar H. Malkawi, The Forum on National Security LawBashar H. Malkawi, The Forum on National Security Law
Bashar H. Malkawi, The Forum on National Security Law
Bashar H. Malkawi
 
Causes of the Growing Conflict Between Privacy and Security
Causes of the Growing Conflict Between Privacy and SecurityCauses of the Growing Conflict Between Privacy and Security
Causes of the Growing Conflict Between Privacy and Security
Don Edwards
 
Cyber war
Cyber warCyber war
Cyber war
Praveen
 
Class 21 and 22
Class 21 and 22Class 21 and 22
Class 21 and 22
Dr. Ajith Sundaram
 
Great Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLIGreat Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLIJames Bollen
 

What's hot (20)

Securing Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay RobertsonSecuring Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay Robertson
 
Cyberdefense strategy - Boston Global Forum - 2017
Cyberdefense strategy - Boston Global Forum - 2017Cyberdefense strategy - Boston Global Forum - 2017
Cyberdefense strategy - Boston Global Forum - 2017
 
Final Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayFinal Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research Essay
 
Communications
CommunicationsCommunications
Communications
 
Why Are We Being Watched?
Why Are We Being Watched?Why Are We Being Watched?
Why Are We Being Watched?
 
HacktivismPaper.docx
HacktivismPaper.docxHacktivismPaper.docx
HacktivismPaper.docx
 
Cyber War ( World War 3 )
Cyber War ( World War 3 )Cyber War ( World War 3 )
Cyber War ( World War 3 )
 
Web Breaches in 2011-“This is Becoming Hourly News and Totally Ridiculous"
Web Breaches in 2011-“This is Becoming Hourly News and Totally Ridiculous"Web Breaches in 2011-“This is Becoming Hourly News and Totally Ridiculous"
Web Breaches in 2011-“This is Becoming Hourly News and Totally Ridiculous"
 
Privacy in the Information Age [Q3 2015 version]
Privacy in the Information Age [Q3 2015 version]Privacy in the Information Age [Q3 2015 version]
Privacy in the Information Age [Q3 2015 version]
 
Privacy in the Information Age
Privacy in the Information AgePrivacy in the Information Age
Privacy in the Information Age
 
6026 Cybersecurity China
6026 Cybersecurity China6026 Cybersecurity China
6026 Cybersecurity China
 
Cyber crime:The Transformation Of Crime In The Information Age.
Cyber crime:The Transformation Of Crime In The Information Age.Cyber crime:The Transformation Of Crime In The Information Age.
Cyber crime:The Transformation Of Crime In The Information Age.
 
Global Commision on Internet Governance
Global Commision on Internet GovernanceGlobal Commision on Internet Governance
Global Commision on Internet Governance
 
Bashar H. Malkawi, The Forum on National Security Law
Bashar H. Malkawi, The Forum on National Security LawBashar H. Malkawi, The Forum on National Security Law
Bashar H. Malkawi, The Forum on National Security Law
 
Causes of the Growing Conflict Between Privacy and Security
Causes of the Growing Conflict Between Privacy and SecurityCauses of the Growing Conflict Between Privacy and Security
Causes of the Growing Conflict Between Privacy and Security
 
Cyber war
Cyber warCyber war
Cyber war
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Internet Security Threat
Internet Security ThreatInternet Security Threat
Internet Security Threat
 
Class 21 and 22
Class 21 and 22Class 21 and 22
Class 21 and 22
 
Great Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLIGreat Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLI
 

Similar to Looking Ahead Why 2019 Will Be The year of Cyberwarfare

Terrorist Cyber Attacks
Terrorist Cyber AttacksTerrorist Cyber Attacks
Terrorist Cyber Attacks
Write My Paper One Day Mercy College
 
Katherine Neal_Written Brief 1
Katherine Neal_Written Brief 1Katherine Neal_Written Brief 1
Katherine Neal_Written Brief 1Kate Neal
 
The Real Threat of CyberattacksEmmanuel .docx
The Real Threat of CyberattacksEmmanuel .docxThe Real Threat of CyberattacksEmmanuel .docx
The Real Threat of CyberattacksEmmanuel .docx
helen23456789
 
ECON 202 Written AssignmentDue April 28th Submitted through Blac
ECON 202 Written AssignmentDue April 28th Submitted through BlacECON 202 Written AssignmentDue April 28th Submitted through Blac
ECON 202 Written AssignmentDue April 28th Submitted through Blac
EvonCanales257
 
Running headEMERGING THREATS AND COUNTERMEASURES .docx
Running headEMERGING THREATS AND COUNTERMEASURES             .docxRunning headEMERGING THREATS AND COUNTERMEASURES             .docx
Running headEMERGING THREATS AND COUNTERMEASURES .docx
rtodd599
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
Buy A Paper Gallatin
 
Katherine Neal_Written Brief 2
Katherine Neal_Written Brief 2Katherine Neal_Written Brief 2
Katherine Neal_Written Brief 2Kate Neal
 
Cyber warfare ss
Cyber warfare ssCyber warfare ss
Cyber warfare ss
Maira Asif
 
LAST ISSUE -CYBER ESPIONAGEBusinesses and government agencies in.docx
LAST ISSUE -CYBER ESPIONAGEBusinesses and government agencies in.docxLAST ISSUE -CYBER ESPIONAGEBusinesses and government agencies in.docx
LAST ISSUE -CYBER ESPIONAGEBusinesses and government agencies in.docx
smile790243
 
THE PROFESSIONALIZATION OF THE HACKER INDUSTRY
THE PROFESSIONALIZATION OF THE HACKER INDUSTRYTHE PROFESSIONALIZATION OF THE HACKER INDUSTRY
THE PROFESSIONALIZATION OF THE HACKER INDUSTRY
ijcsit
 
The Professionalization of the Hacker Industry
The Professionalization of the Hacker IndustryThe Professionalization of the Hacker Industry
The Professionalization of the Hacker Industry
AIRCC Publishing Corporation
 
Instructions please write a 5 page paper answering the question con
Instructions please write a 5 page paper answering the question conInstructions please write a 5 page paper answering the question con
Instructions please write a 5 page paper answering the question con
simba35
 
Cyber Terrorism Essay
Cyber Terrorism EssayCyber Terrorism Essay
Cyber Terrorism Essay
Custom Paper Services
 
Can cloud computing survive the NSA disclosures
Can cloud computing survive the NSA disclosuresCan cloud computing survive the NSA disclosures
Can cloud computing survive the NSA disclosures
Jason Fernandes
 
The Biggest Cyber and Physical Security Threats to Critical Infrastructure FM...
The Biggest Cyber and Physical Security Threats to Critical Infrastructure FM...The Biggest Cyber and Physical Security Threats to Critical Infrastructure FM...
The Biggest Cyber and Physical Security Threats to Critical Infrastructure FM...
Fas (Feisal) Mosleh
 
Cyber-Terrorism Essay
Cyber-Terrorism EssayCyber-Terrorism Essay
UNPROTECTED DATA REVIEW OF INTERNET ENABLED PSYCHOLOGICAL .docx
UNPROTECTED DATA REVIEW OF INTERNET ENABLED PSYCHOLOGICAL  .docxUNPROTECTED DATA REVIEW OF INTERNET ENABLED PSYCHOLOGICAL  .docx
UNPROTECTED DATA REVIEW OF INTERNET ENABLED PSYCHOLOGICAL .docx
ouldparis
 
The Hacked World Order By Adam Segal
The Hacked World Order By Adam SegalThe Hacked World Order By Adam Segal
The Hacked World Order By Adam Segal
Leslie Lee
 

Similar to Looking Ahead Why 2019 Will Be The year of Cyberwarfare (20)

Terrorist Cyber Attacks
Terrorist Cyber AttacksTerrorist Cyber Attacks
Terrorist Cyber Attacks
 
Katherine Neal_Written Brief 1
Katherine Neal_Written Brief 1Katherine Neal_Written Brief 1
Katherine Neal_Written Brief 1
 
The Real Threat of CyberattacksEmmanuel .docx
The Real Threat of CyberattacksEmmanuel .docxThe Real Threat of CyberattacksEmmanuel .docx
The Real Threat of CyberattacksEmmanuel .docx
 
ECON 202 Written AssignmentDue April 28th Submitted through Blac
ECON 202 Written AssignmentDue April 28th Submitted through BlacECON 202 Written AssignmentDue April 28th Submitted through Blac
ECON 202 Written AssignmentDue April 28th Submitted through Blac
 
28658043 cyber-terrorism
28658043 cyber-terrorism28658043 cyber-terrorism
28658043 cyber-terrorism
 
Running headEMERGING THREATS AND COUNTERMEASURES .docx
Running headEMERGING THREATS AND COUNTERMEASURES             .docxRunning headEMERGING THREATS AND COUNTERMEASURES             .docx
Running headEMERGING THREATS AND COUNTERMEASURES .docx
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
Katherine Neal_Written Brief 2
Katherine Neal_Written Brief 2Katherine Neal_Written Brief 2
Katherine Neal_Written Brief 2
 
Cyber warfare ss
Cyber warfare ssCyber warfare ss
Cyber warfare ss
 
LAST ISSUE -CYBER ESPIONAGEBusinesses and government agencies in.docx
LAST ISSUE -CYBER ESPIONAGEBusinesses and government agencies in.docxLAST ISSUE -CYBER ESPIONAGEBusinesses and government agencies in.docx
LAST ISSUE -CYBER ESPIONAGEBusinesses and government agencies in.docx
 
THE PROFESSIONALIZATION OF THE HACKER INDUSTRY
THE PROFESSIONALIZATION OF THE HACKER INDUSTRYTHE PROFESSIONALIZATION OF THE HACKER INDUSTRY
THE PROFESSIONALIZATION OF THE HACKER INDUSTRY
 
The Professionalization of the Hacker Industry
The Professionalization of the Hacker IndustryThe Professionalization of the Hacker Industry
The Professionalization of the Hacker Industry
 
Instructions please write a 5 page paper answering the question con
Instructions please write a 5 page paper answering the question conInstructions please write a 5 page paper answering the question con
Instructions please write a 5 page paper answering the question con
 
Cyber Terrorism Essay
Cyber Terrorism EssayCyber Terrorism Essay
Cyber Terrorism Essay
 
Can cloud computing survive the NSA disclosures
Can cloud computing survive the NSA disclosuresCan cloud computing survive the NSA disclosures
Can cloud computing survive the NSA disclosures
 
The Biggest Cyber and Physical Security Threats to Critical Infrastructure FM...
The Biggest Cyber and Physical Security Threats to Critical Infrastructure FM...The Biggest Cyber and Physical Security Threats to Critical Infrastructure FM...
The Biggest Cyber and Physical Security Threats to Critical Infrastructure FM...
 
Cyber Legislation
Cyber LegislationCyber Legislation
Cyber Legislation
 
Cyber-Terrorism Essay
Cyber-Terrorism EssayCyber-Terrorism Essay
Cyber-Terrorism Essay
 
UNPROTECTED DATA REVIEW OF INTERNET ENABLED PSYCHOLOGICAL .docx
UNPROTECTED DATA REVIEW OF INTERNET ENABLED PSYCHOLOGICAL  .docxUNPROTECTED DATA REVIEW OF INTERNET ENABLED PSYCHOLOGICAL  .docx
UNPROTECTED DATA REVIEW OF INTERNET ENABLED PSYCHOLOGICAL .docx
 
The Hacked World Order By Adam Segal
The Hacked World Order By Adam SegalThe Hacked World Order By Adam Segal
The Hacked World Order By Adam Segal
 

Recently uploaded

Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 

Recently uploaded (20)

Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 

Looking Ahead Why 2019 Will Be The year of Cyberwarfare

  • 1. One year away from the third decade of the 21st century and technology has finally caught up with science fiction. In 2019, we’re going to hear more news about driverless cars, revolutions in artificial intelligence and commercial applications for drones. One thing is for sure: it’s an exciting time to be alive. Unfortunately, advances in technology bring about advances in public threats; 2019 is not an exception. Last year we saw a startling number of security breaches, ransomware attacks and data leaks from Fortune 500 organizations. Hackers are getting smarter all the time, and – with increased incentive to profit from booming digital black markets – they haven’t rested yet.
  • 2. It’s Getting Political Things are going to be a little different this year. Hacking culture has always been entangled with a certain political ethos (hence the connectionbetween Anonymous and the anarchist thriller V for Vendetta), but in recent years money has dominated as the end game in a majority of highly publicized attacks. With rising political unrest around the world, cyber attacks are becoming more about nations, countries and governments than ever before. Take several examples: In March of last year, the FBI and Department of Homeland Security (DHS) filed a joint report disclosing that Russian hackers had been tied to attacks on U.S infrastructure, including energy, water and aviation. The attackers stole sensitive information for unknown purposes, spreading widespread alarm. For some time, different departments of the U.S government dealt with information security, including the FBI, CISA and NSA. In November of 2018, Congress approved the formation of a ‘Cybersecurity Agency,’ signaling a unified bipartisan emphasis on the threat of cyberattacks against the U.S. Last December, Chinese nationals Zhu Hua and Zhang Shilong were indicted for stealing vast amounts of sensitive data related to American industries and technologies. The attackers also stole social security numbers and other personal information from over 100,000 U.S Navy personnel, officially ending a three-year agreement between the U.S and China not to engage in cyberattacks or espionage. While the threat of cyberwarfare has existed since cyberattacks became a technological possibility, it was once – for the most part – an intrigue of science fiction and futurism. Now that key government resources are increasingly digitized, the threat has become a palpable reality. As former DHS Under Secretary Suzanne Spaulding observes, “Until recently the US did not publicly attribute various cyber incidents to specific nations, despite public pressure to do so.” The country’s attitude has finally changed: when it comes to international relationships, cyberwarfare is no longer a weird exception to the rule.
  • 3. New Technology, New Threats In addition to the new temperature that has raised cybersecurity stakes for world powers, 2019 will likely witness the rise of new threats that experts are only just coming to terms with. Here are a few that will pose a risk for domestic security: Attacks Fueled by IoT Botnets In order to manage incoming traffic from visitors, websites must be hosted on servers with enough bandwidth. One common way to attack a server is to send a large amount of fake traffic from multiple computers, thus exceeding the server’s bandwidth and taking it offline. These Distributed Denial of Service (DDoS) attacks are hardly new, but in recent years, the Internet of Things (IoT) has made them dramatically more powerful. Here’s the basic script: a hacker discretely accesses thousands of Internet connected devices – from phones to smart thermostats – and links them altogether in a “botnet”. Then the hacker instructs the devices to target a server, overwhelming it with traffic. Three years ago, this kind of attack took large portions of the Internet offline along the U.S east coast. Now, Symantec predicts that IoT botnets will be used to conduct much more sophisticated attacks giving attackers unprecedented power.
  • 4. Critical Infrastructure Attacks We’ve already mentioned that in 2018, the U.S acknowledged cyber attacks against critical infrastructure. This event wasn’t a proof-of-concept: in 2015, attackers successfully targeted the Ukrainian power grid, and managed to leave 230,000 citizens without electricity. While it’s not a brand-new idea, infrastructure attacks are becoming more common for a simple reason: more of it is connected to the web. This vulnerability goes to show that IoT isn’t just a tool for attackers to use; it’s a weakness for them to exploit. As Brian NeSmith of Forbes Council points out, “With digital technology wherever we look and the explosion of the internet of things (IoT), the possibilities of cyber- mayhem are limitless. Think of nuclear reactors, chemical plants and satellites in space — all are potentially vulnerable targets.” The possibility that hackers could cripple the U.S power grid was so concerning to U.S Senators that last year, they proposed a bill that would have banned digital control systems sometimes used by power stations.
  • 5. Spear Phishing and APT Groups Most organizations are aware of phishing threats: an attacker can use false login portals, domains and forms to dupe employees into sharing sensitive information that can be used to further sabotage a business. Phishing attacks have been common from the beginning of the Internet, but spear phishing is an entirely different animal. Also known as “targeted phishing,” spear phishers single out an organization or business and tailor the attack to ensnare a target. Much like social engineering, spearfishing is effective because it exploits intimate knowledge of an organization or insider. They are both more dangerous and more convincing than traditional phishing attacks and present an active threat to government agencies. The Chinese attackers who targeted NASA last year employed spear phishing to access sensitive information, and it’s a favorite tactic of organizations deemed Advanced Persistent Threats (APTs) by the U.S government. In December of last year, the U.S. House of Representatives passed a bill requiring the White House to maintain an active list of APTs and the individuals who work for them. It is but one step on the long road to America’s national security in the wake of new cyber threats.