


Robert Hannigan
Chairman /*=$expert->feature_status*/ ?>
BlueVoyant
Comments Dotted :
2
July 17, 2020
The details in the NCSC’s advisory are an important tool for cybersecurity teams to detect this activity.
It is not a surprise to see Russian state agencies trying to steal valuable COVID-19 research. The methodology of APT29 is familiar and exploits known vulnerabilities, for example in remote services and VPNs, usually to steal credentials. The details in the NCSC’s advisory are an important tool for cybersecurity teams to detect this activity.

June 23, 2020
We need to collectively find ways of raising the cost of cyber-attacks by China and other states.
The technical details of the attack issued by the Australian Government point to China as a likely state actor. Although the techniques and vulnerabilities exploited are not new, the scale, sophistication and targeting are consistent with Chinese cyber-attacks against the Australian parliament, and other organisations and companies in many democratic countries.
Chinese state cyber-attacks of this type are not new but have progressed from large scale and low sophistication to high grade,.....Read More
