• Tech News
    • Games
    • Pc & Laptop
    • Mobile Tech
    • Ar & Vr
    • Security
  • Startup
    • Fintech
  • Reviews
  • How To
What's Hot

Elementor #32036

January 24, 2025

The Redmi Note 13 is a bigger downgrade compared to the 5G model than you might think

April 18, 2024

Xiaomi Redmi Watch 4 is a budget smartwatch with a premium look and feel

April 16, 2024
Facebook Twitter Instagram
  • Contact
  • Privacy Policy
  • Terms & Conditions
Facebook Twitter Instagram Pinterest VKontakte
Behind The ScreenBehind The Screen
  • Tech News
    1. Games
    2. Pc & Laptop
    3. Mobile Tech
    4. Ar & Vr
    5. Security
    6. View All

    Bring Elden Ring to the table with the upcoming board game adaptation

    September 19, 2022

    ONI: Road to be the Mightiest Oni reveals its opening movie

    September 19, 2022

    GTA 6 images and footage allegedly leak

    September 19, 2022

    Wild west adventure Card Cowboy turns cards into weird and silly stories

    September 18, 2022

    7 Reasons Why You Should Study PHP Programming Language

    October 19, 2022

    Logitech MX Master 3S and MX Keys Combo for Business Gen 2 Review

    October 9, 2022

    Lenovo ThinkPad X1 Carbon Gen10 Review

    September 18, 2022

    Lenovo IdeaPad 5i Chromebook, 16-inch+120Hz

    September 3, 2022

    It’s 2023 and Spotify Still Can’t Say When AirPlay 2 Support Will Arrive

    April 4, 2023

    YouTube adds very convenient iPhone homescreen widgets

    October 15, 2022

    Google finishes iOS 16 Lock Screen widgets rollout w/ Maps

    October 14, 2022

    Is Apple actually turning iMessage into AIM or is this sketchy redesign rumor for laughs?

    October 14, 2022

    MeetKai launches AI-powered metaverse, starting with a billboard in Times Square

    August 10, 2022

    The DeanBeat: RP1 simulates putting 4,000 people together in a single metaverse plaza

    August 10, 2022

    Improving the customer experience with virtual and augmented reality

    August 10, 2022

    Why the metaverse won’t fall to Clubhouse’s fate

    August 10, 2022

    How Apple privacy changes have forced social media marketing to evolve

    October 16, 2022

    Microsoft Patch Tuesday October Fixed 85 Vulnerabilities – Latest Hacking News

    October 16, 2022

    Decentralization and KYC compliance: Critical concepts in sovereign policy

    October 15, 2022

    What Thoma Bravo’s latest acquisition reveals about identity management

    October 14, 2022

    What is a Service Robot? The vision of an intelligent service application is possible.

    November 7, 2022

    Tom Brady just chucked another Microsoft Surface tablet

    September 18, 2022

    The best AIO coolers for your PC in 2022

    September 18, 2022

    YC’s Michael Seibel clarifies some misconceptions about the accelerator • DailyTech

    September 18, 2022
  • Startup
    • Fintech
  • Reviews
  • How To
Behind The ScreenBehind The Screen
Home»Security»Black Hat 2022 – Cyberdefense in a global threats era
Security

Black Hat 2022 – Cyberdefense in a global threats era

September 8, 2022No Comments3 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
Black Hat 2022 – Cyberdefense in a global threats era
Share
Facebook Twitter LinkedIn Pinterest Email

Our Security evangelist’s take on this first day of Black Hat 2022, where cyberdefense was on every mind.

As day one at Black Hat USA 2022 came to an end someone asked me, ”What is your takeaway from today’s conference?” There have been several interesting presentations, and as expected a number of them detailed the cyberwar in Ukraine, including the presentation by ESET’s own Robert Lipovsky and Anton Cherepanov – Industroyer2: Sandworm’s Cyberwarfare Targets Ukraine’s Power Grid Again .

But, there is one standout moment of the day for me, a simple moment when all the mentions of Ukraine and the detailed analysis of the cyberincidents the country has endured was put in perspective. SentinelOne’s Juan Andres Guerrero and Thomas Hegel presented Real ‘Cyber War’: Espionage, DDoS, Leaks, and Wipers in the Russian Invasion of Ukraine, a detailed timeline of the cyberattacks relating to the conflict. As did all presentations relating to the war, this opened to a full room of over a thousand attendees; Juan clicked the first slide and reminded the audience that while we are here to talk about cyberattacks relating to the war, we should remember that there is a war – a real war – one that is happening on the streets and affecting people’s lives (or words to that effect).

The moment was a stark reminder that while the cybersecurity industry is united in stopping attacks happening in Ukraine, we do so remotely while there are people on the ground in an actual war zone. The remainder of the presentation by Juan and Thomas was a fascinating timeline of the attacks and how numerous cybersecurity companies and organizations have come together to provide unprecedented cooperation, including the sharing of research and intelligence. A slide calling out the main contributors listed them as: CERT-UA, United States Cyber Command, Cybersecurity and Infrastructure Security Agency (CISA), SentinelLabs, Microsoft Threat Intelligence Center, TALOS, Symantec, Mandiant, Inquest Labs, red canary, and ESET. The list demonstrates how companies that normally compete in business are united in this mission, and even under normal conditions – if there is such a thing in the cybersecurity industry – work together to keep the digital environment we rely on safe and accessible.

See also  DC reveals new Black Adam and Shazam! Fury of the Gods trailers

The ESET presentation delivered by Robert and Anton detailed the recent attempt by attackers known as Sandworm, a group that is attributed by different countries’ cyberagencies, including the US CISA, and the UK NCSC, as being part of Russia’s GRU, with unleashing a cyberattack against the power infrastructure. The combined efforts and knowledge of previous attacks against industrial control systems (ICS) used in electrical distribution plants provided cyberdefenders within the power utility company, CERT-UA and backed by experts from ESET the ability to thwart the potential attack. This attack, known as Industroyer2, is one of many aimed at causing disruption and destruction, and demonstrates that cyberattacks have now matured to a level where they are an asset, a weapon, available to those wishing to wage war.

To summarize, my takeaway of the day is one of pride to be a member of the cybersecurity industry, and more importantly that we need to recognize and thank the dedicated cyberdefense teams that have stepped up to protect systems and infrastructure from an aggressor.

Source link

Black Cyberdefense era global Hat threats
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

WD Black SN770M review

November 1, 2023

Andrew Eweka On Bridging The Gap Between Africa And Global Business

September 24, 2023

3 Reasons To Downgrade VC And Embrace A New Era In Venture Financing

August 5, 2023

Tapping His Experience, Serial Tech Entrepreneur Launches VC Firm To Back Black Founders

July 31, 2023
Add A Comment

Comments are closed.

Editors Picks

New trailers for Genshin Impact introduce the gangboss Kuki Shinobu

June 27, 2022

Desus and Mero are over

July 19, 2022

Apple iPhone 15 review

October 25, 2023

Bring Elden Ring to the table with the upcoming board game adaptation

September 19, 2022

Subscribe to Updates

Get the latest news and Updates from Behind The Scene about Tech, Startup and more.

Top Post

Elementor #32036

The Redmi Note 13 is a bigger downgrade compared to the 5G model than you might think

Xiaomi Redmi Watch 4 is a budget smartwatch with a premium look and feel

Behind The Screen
Facebook Twitter Instagram Pinterest Vimeo YouTube
  • Contact
  • Privacy Policy
  • Terms & Conditions
© 2025 behindthescreen.uk - All rights reserved.

Type above and press Enter to search. Press Esc to cancel.