In the last article of this series we looked at how Iran’s state-sponsored hacking activities evolved into the destructive force, it is today. However, Iran is not the only nation-state force in the region to be worried about. Many Arabic countries implement cyber war and cyber espionage to further their geopolitical goals but none are as savvy as Israel. A quick Google search of Israeli activities in this regard will often result in articles detailing Israel as the target, more often than not targeted by Iranian nation-state threat actors. Whether as a result of being the target, or furthering its geopolitical agenda, likely a mixture of the two, Israel is no amateur when it comes to cyber war and cyber espionage. There are three events that will be focused on in this article that show Israel’s cyber capability is incredibly dangerous if you find yourself on the wrong side of it.
In the last article of this series we looked at how Iran’s state-sponsored hacking activities evolved into the destructive force, it is today. However, Iran is not the only nation-state force in...
New and emerging products are built around containers daily to transform how applications are developed and delivered using the DevSecOps methodology. Such a methodology is based on continuous...
Introduction Disclaimer: LMNTRIX neither supports nor condones illegal acts of hacking and/or cyber war-like campaigns in any form. As a cyber defense company, we refuse to take sides with Russia...
When we last looked at zero-day exploits we focused on memory control flaws and flaws found in ICS/SCADA systems. In part three we will look at two more commonly exploited types of zero-day...
By utilising some of the weirder aspects of quantum physics, namely superposition, a whole new field of cryptography is being developed that promises important data is kept secure, even while in...
In the second part of our ongoing series about the dreaded zero-day exploit, we will look at specific types of zero-days. These include memory control flaws and ICS/SCADA flaws. If you don’t...
At the start of any year, we are often looking ahead to what is coming in the year ahead. Dusting off the crystal ball can be pure folly in many cases however in cybersecurity we have datacenters...
At the start of any year, we are often looking ahead to what is coming in the year ahead. Dusting off the crystal ball can be pure folly in many cases however in cybersecurity we have datacenters...
In the first part of this series, we focussed on the role nation-state threat actors play in shaping the current threat landscape with a particular focus on China. In this part, we take a look at...
Security vendors are constantly on the back foot, since attackers and their tools, tactics, and procedures are constantly evolving at a rapid pace. The security vendor mistakenly assumes...
Our security experts are standing by to help you with an incident or answer questions about our consulting and managed detection and response services.