cyber-kinetic

Dragonfly is Nothing New:  An Objective Assessment of this Energy Sector APT

by James Scott, Sr. Fellow, ICIT Show-of-force intelligence gathering and cyber-kinetic sabotage malware attacks against United States Energy infrastructure are neither novel nor warrant mass-hysteria attempts by fear mongers seeking to exploit the incident for personal gain.  They are deliberate campaigns meant to demonstrate capabilities while offering no real threat to the distributed U.S. energy .. read more

ICIT Brief: Metadata – The Most Potent Weapon in This Cyberwar: The New Cyber-Kinetic-Meta War

Metadata, or “data about data,” is collected and recorded to describe data, identify trends, administer algorithmic solutions, and model potential scenarios. When one understands how to make sense of seemingly random metadata or how to pair the data with other exfiltrated data pools, there are limitless possibilities for social engineering and cyber exploitation in attacks .. read more