Command and Control: Why the CIO Must Lead Cyber War Games and Tabletop Exercises.

In today’s threat landscape, the CIO is the key player in leading cyber war games and tabletop exercises that strengthen organizational resilience and drive strategic advantage. CIOs must lead cyber…

Medium

Cyber Wargaming: Research and Education for Security in a Dangerous Digital World by Frank L. Smith III

This book covers topics such as cyber action during conventional war, information effects in conflict scenarios, individual versus group decision-making, the intersection of cyber conflicts and nuclear crises, business resilience, emerging technologies, and more.

@bookstodon
#books
#nonfiction
#CyberWargames
#security

This is a #doozy "This thing is like a RAT on steroids," Phylum said. "It has all the basic RAT capabilities built into a nice web GUI with a rudimentary remote desktop capability and a stealer to boot!" https://thehackernews.com/2023/01/malicious-pypi-packages-using.html

#threatintelligence #cyberwargames #HackAlert

Malicious PyPI Packages Using Cloudflare Tunnels to Sneak Through Firewalls

Six malicious Python packages distributed via PyPI deploying info stealers and use Cloudflare tunnels to sneak through firewalls.

The Hacker News
Cloud Atlas targets entities in Russia and Belarus amid the ongoing war in Ukraine - Check Point Research

  Introduction Cloud Atlas (or Inception) is a cyber-espionage group. Since its discovery in 2014, they have launched multiple, highly targeted attacks on critical infrastructure across geographical zones and political conflicts. The group’s tactics, techniques and procedures (TTPs) have remained relatively static over the years. However, since the rapid escalation of the conflict between Russia... Click to Read More

Check Point Research