Cyber War and Real War Coincide In Ukraine

Eastern Ukraine Comabt Zone

The type of cyber war that the US government and military are most worried about, and preparing for, is already in full swing in the Ukraine

The Ukraine has found itself on the receiving end of both cyber and direct attacks by Russian groups backing a separatist movement inside their country. And despite the Ukraine's large number of hackers who have played havoc with computer systems around the world, it has found itself woefully unprepared to defend its own computer networks.

According to a Wall Street Journal report, the Ukrainian Ministry of Defense, Foreign Affairs and its presidential administration have all been compromised at one time or another with many of the hacked documents appearing on the CyberBerkut website.

CyberBerkut is a Moscow-based hacking group that has taken credit for attacking Ukrainian computer networks. In addition to conducting cyber attacks, the group took responsibility for a physical attack on the Ukrainian election office destroying computer systems meant to track the elections process, said a report on Globalsecurity.org.

While US forces could most likely thwart direct attacks upon their military and government facilities, American officials are less sure about defending the cyber frontier and are taking steps to buttress these walls.

Recently, the head of the US Cyber Command, Adm. Michael S. Rogers, called for his organization's capabilities to be better integrated into all aspects of the country's cyber security effort. This would include building cybersecurity operations into all military planning. The WSJ said other attacks have targeted Ukrainian officials involved in fighting the land war against the separatists.

The US Army Cyber Command is even running field tests on how to insert cyberspace warfighting into smaller Army units on the battlefield. Here they would handle tasks such as centered on snagging tactical intelligence from the enemy's communications systems that can be put to immediate use by a commander, as well as, defending our own forces from similar incursions, Isaac Porsche, the Rand Corp. associate director, forces and logistics program told SCMagazine.com.

SC Magazine:  

« Mystery Fingers on Keyboard in JPMorgan Hack
Cybercrime: How to Recognize an Online Fraudster »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Swivel Secure

Swivel Secure

Swivel Secure is an award winning provider of multi-factor authentication solutions.

Fastpath Solutions

Fastpath Solutions

Fastpath deliver software solutions that enable you to take control of your security, compliance and risk management initiatives.

HackCon Norway

HackCon Norway

HackCon is for the people who are interested in technology, psychology, IT and security, and who wants to improve their knowledge within these areas.

Cisco Talos

Cisco Talos

Talos is an industry-leading threat intelligence solution that protects your organization’s people, data and infrastructure from active adversaries.

Malware Patrol

Malware Patrol

Malware Patrol provides intelligent threat data that protects against cyber attacks.

Nexthink

Nexthink

Using our solution, hundreds of IT departments effectively balance offering a productive and enjoyable end-user experience with making the right decisions to secure and transform the digital workplace

SecureMetric Technology

SecureMetric Technology

SecureMetric is one of SE Asia’s leading players in the field of digital security with a focus on Software Licensing Protection, 2-Factor Authentication, Advanced Identity and Access Management, Publi

Global EPIC

Global EPIC

Global EPIC is an international cybersecurity initiative designed to combat growing world challenges by facilitating global collaboration in the field of cyber security.

Cyberport

Cyberport

Cyberport is focused on facilitating the growth of major technology trends such as FinTech and cybersecurity as well as the emerging technologies of AI, big data and blockchain.

Risk Ledger

Risk Ledger

Risk Ledger is improving the security of the global supply chain ecosystem, reducing the number of data breaches experienced through supply chain attacks by companies and consumers alike.

CyberNet Albania

CyberNet Albania

Cybernet Albania has been providing IT support and services to small businesses since 2016. We strive to eliminate your IT issues before they cause downtime and impact your operations.

CAPSLOCK

CAPSLOCK

CAPSLOCK delivers career-changing cyber training to help adults re-skill. Learn online to become a cyber security professional and pay no tuition until you land a high-paying job.

Deft

Deft

Deft (formerly ServerCentral Turing Group) is a trusted provider of colocation, cloud, and disaster recovery services.

SecurIT360

SecurIT360

SecurIT360 is a full-service specialized Cyber Security and Compliance consulting firm.

Quatrro Business Support Services (QBSS)

Quatrro Business Support Services (QBSS)

QBSS is a tech-enabled outsourcing firm that’s changing the way companies think about finance, accounting, human resources and technology services.

SydeLabs

SydeLabs

At SydeLabs, our mission is to ensure the comprehensive security of your AI systems.

Corix Partners

Corix Partners

Corix Partners is a Boutique Management Consultancy Firm focused on assisting CIOs and other C-level executives in resolving Cyber Security Strategy, Organisation and Governance challenges.

Thero6

Thero6

Thero6 develop dynamic financial analysis algorithms that help prevent coin collapses and theft of cryptocurrency funds by identifying the transaction absolutely throughout the chain.