top of page
Writer's pictureTheCyberDiplomat LLC

The CyberDiplomat Daily

Date : 20 May 2024



Optus denies claims of ‘cloaking’ Deloitte cyber attack report findings


The telco's claim of legal professional privilege was rejected by Federal Court judge Justice Jonathan Beach. He ruled against the claim, stating that the telco had not sufficiently proven their claim of privilege. Optus sought to appeal the ruling, arguing that the report was commissioned to obtain legal advice.



US woman allegedly aided North Korean IT workers infiltrate 300 firms


The U.S. Justice Department has charged five individuals, including a U.S. citizen woman, a Ukrainian man, and three foreign nationals, for their involvement in cyber schemes that generated revenue for North Korea's nuclear weapons program. The scheme involved infiltrating U.S. job markets through fraud to raise revenue for the North Korean government and its illicit nuclear program. Two individuals have been arrested, and the DOJ is seeking extradition for one of them. The defendants face various charges, including conspiracy to defraud the United States and money laundering. If convicted, they could face lengthy prison sentences. The scheme compromised over 60 U.S. identities and affected more than 300 U.S. companies, resulting in false tax liabilities for more than 35 U.S. citizens and generating at least $6.8 million in revenue for overseas IT workers.



World War War III May Already Have Started—in the Shadows


Britain's signals intelligence chief warned of Russia coordinating cyberattacks and physical sabotage against the West. This comes after FBI Director Christopher Wray's caution about China targeting American infrastructure. GCHQ Director Anne Keast-Butler expressed concern about growing links between Russian intelligence services and proxy groups for cyberattacks and physical sabotage.



Cyber Wyoming: Reported scams across the Cowboy State


List of dubious scams and their modus operandi 



Global Aerospace Offers Insights on the Latest Developments in Use of Remote and Virtual Towers for Air Traffic Control


The European Aviation Safety Agency (EASA) and the U.K. Civil Aviation Authority (CAA) have issued guidelines for remote aerodrome air traffic services. In the U.S., the Federal Aviation Administration (FAA) regulates remote towers as a potential solution for the National Airspace System (NAS), although they are not yet approved for use. Remote control towers offer significant advancements in air traffic management, providing benefits such as improved operational efficiency and enhanced situational awareness. This technology may be the future of air traffic control, with larger airports and smaller aerodromes likely to adopt it in different capacities.



Asian Threat Actors Use New Techniques to Attack Familiar Targets


Since June 2023, Microsoft has observed increased cyber and influence trends from China and North Korea. Chinese actors are targeting entities across the South Pacific islands, regional adversaries in the South China Sea, and the US defense industrial base. They are also refining their use of AI-generated content to amplify controversial domestic issues in the US and the Asia-Pacific region. North Korean cyber threat actors have engaged in cryptocurrency theft and software supply chain attacks, targeting the US, South Korea, and Japan to generate revenue for the North Korean government. Security teams for defense and related industries must remain vigilant against these threats.



Vodafone Italy Bridges the Digital Gap: Connecting Bobbio to Ultra-Broadband Network


The project is helping to overcome the digital divide between Italian cities and towns. Everyone in Bobbio can benefit from the improved connectivity, from residents and local businesses to tourists paying a visit. Digital services that can often be taken for granted in better connected areas, from remote learning to video streaming, can now be enjoyed at a wider scale across Bobbio. The quality of voice calls has also dramatically increased, helping to connect families and friends with people outside the area. In addition to setting up the network, Vodafone is using Big Data solutions to monitor the performance of the network. This ensures that connectivity is consistent and that any areas of improvement are identified.




1 view0 comments

Σχόλια


bottom of page