BAE Expands Cyber-Security Range with the Acquisition of ETI

BAE Systems is strengthening its cyber and intelligence services activities by acquiring the Danish cyber intelligence company ETI A/S. BAE will pay DKK 1.2 billion (approximately US$211 million) for the acquisition. // ETI provides diagnostic and data analysis products supporting Law Enforcement Agencies in data-crime investigations. According to BAE Systems' Chief Executive BAE Systems Ian King, “The combination of Detica...

Cyber Intelligence Report – October 15, 2014

In this edition: IDF building new cloud-base infrastructure | Apple updates iOS after major hack on iCloud | NetScout to acquire communications business of Danaher Corp and expand cyber intelligence expertise | Russia will not give government full power over Internet | Jordan to open cybercrime centre in Amman | Qatar is third most targeted country in cyber threats and attacks | Anonymous hacker group launches cyber war against Islamic State militants | Chinese Army calling to strengthen domestic cyber security software media | Cyber criminals target Africa’s food and beverage sector | Zambia hosted first Cyber security drill | Ethiopia to Host Second Annual Cyber Security Africa’s Banking & ICT Summit 2014 | London Metropolitan Police launched anti-fraud cybercrime unit | Estonian to launch first e-residency card

Stuxnet Computer Worm Exposes Potentially Disastrous Vulnerabilities to Cyber Terrorism

"Stuxnet is definitely not a military code, at least not a Western one" said Shai Blitzblau, Head of Maglan-Computer Warfare and Network Intelligence Labs, interviewed by Defense Update. "Stuxnet is a sophisticated and highly advanced code, but it lacks certain elements commonly associated with military operations" Blitzblau explains that the broad, indiscriminate attack on industrial computers launched by Stuxnet...

Cyber Intelligence Report – February 20, 2014

In this edition: UK targeted Anonymous with cyber-terrorism tactics | The Syrian Electronic Army hacks Forbes.com website | IDF reveals five-year plan | Edward Snowden used low-cost tool to belittle NSA | Internet security concerns at Sochi Olympic Games | Israel - A growing cyber nation | Singapore welcomes new Israel Aerospace Industry cyber R&D center | Saudis could face five-year jail term and up to $800,000 fines for sending offensive tweets | German government and intelligence services accused of involvement in NSA affair...

Denial of Service (DDoS) Cyber attacks – are they using the same logic as terror threats?

Much has been discussed about the damage that the Advanced Persistent Threat (APT) attacks cause to corporates and governments alike. It is estimate that at least 50% of Fortune 500 companies have been compromised by APT, and the potential financial damage to these organizations is almost impossible to quantify, but probably in the trillions of US dollars. Compared to this...

Stuxnet Under the Microscope – Israeli Cyber Warfare Expert Analyzes the Malicious Code

Stuxnet uncovers the vulnerability of our infrastructure system – exposing the vulnerable interfaces between the logical and physical world, these elements are totally unprotected and open disastrous vulnerabilities to attack by cyber terrorism and cyber criminals. "We have analyzed the code, and compared it to other, similar known malware, this new code has definitely the parameters of a 'military code',...

A “Silver Tail” that Protect You Online

RSA, introduced the next generation of its Silver Tail web threat detection solution, with the ability to quickly separate the activities of friend from foe, and enabling security and fraud teams to investigate and mitigate web session and mobile applications threats in real time. I-HLS reports. Designed to ensure that organizations have the tools to identify more threats faster and...

Turning a Mountain of Information into a Grain of Intelligence

Israel's BIG Data Analysis: The evolving capability to turn 'Big Data' into intelligence in timely and methodical processes enable governments, law enforcement and intelligence agencies to tap new sources of intelligence, gaining insights never before available. Israel's leaders in Big Data Analysis gathered in Tel Aviv today, for the first Israel Big Data Fusion (IBDF) conference organized today by i-HLS....

Cyber Intelligence Report – January 15, 2014

In this report: Cyber-attacks on 29 embassies in Iran | Hackers of the Islamic Cyber Resistance Group claim to have breached Israel Airports Authority computer systems | Cracking down on Cyber Activism in China | UK Ministry of Defense dedicates millions for ‘digital insurgency’, social networking research | Obama announces new policies in surveillance in wake of NSA scandal | Microsoft hacked by the SEA while making email alterations | Major retailers in the U.S. hacked during holiday season | Russian online forum being formed to expand new cyber strategy | Controversial update to Brazilian Internet law | UK: Investment into Cyber Streetwise

A New Land Systems Division at Rafael – adapting systems for the new way of war

Rafael Advanced Defense Systems ltd, developer of highly advanced weapon systems for the IDF and the defense establishment, has recently undergone reorganization. One of the changes has been the long awaited establishment of the new Land & Naval Systems Division, which will develop and produce, among others, weapon platforms, armored vehicle defense systems, shoulder-launched systems and naval defense systems....

Dynamic Quarantine Program

Countermeasures against computer worms The dynamic quarantine program, managed by DARPA, is developing new capabilities for automatic detection and respond to worm-based protecting enterprise networks. As the protection system studies the threat, it will determine the worm’s propagation and epidemiology, and provide off-line rapid response forensic analysis of malicious code to identify its capabilities, modalities, and future behavior.

Protecting the Military Cyberspace – DARPA Gears to Counter Network Worms

One of the most imminent threats to C4 systems, particularly mobile ad-hoc and COTS based networks, are large scale attacks by computer worms spreading malicious code. Such threats can target specific elements of the network, exploit valuable information and reduce net-centric warfare to a halt by overrunning the network capacity with "garbage", stealing the identity of units and destinations,...

Cyber Intelligence Report – February 5, 2014

In this report: Saudi Arabia to launch National e-Security Center to Protect Government against Hackers | Changes in NSA and cyber security matters due to Snowden affair | Israel’s Darknet and TOR dilemma | USA: Major retailers in the U.S. hacked during holiday season | Palestinian hackers suspected to be behind breach in Israeli defense ministry computers | Cyber Park in Beer Sheba expanding | Russia to set up a cyber-defense unit | Microsoft answers to growing criticism | Germany: Increase of Cyber Attacks | Iran unveils new cyber security products | Europol smashed financial cyber-crime gang targeting UK citizens | Japan sending Self Defense Forces to U.S. for cyber training | SEA attacks PayPal UK and eBay UK

FBI Clamp Down an International Cyber Network

The FBI arrested 20 persons suspected to be members and operators in an international cyber crime network charged with bank fraud scheme. The network compromised dozens of individual and business accounts in the U.S. and transferred more than $3 million under false identities. The FBI is charging more than 60 people  from Russia, from Belarus, Kazakhstan and Ukraine, as well...