Cyber Warfare
Search documents
Evercore's Peter Levine talks 2026 cybersecurity playbook
Youtube· 2025-12-29 23:00
Take a look at the cyber security group. One of the earliest litmus tests for investors navigating the impact of AI. The CIBR ETF underperforming broader tech this year, especially over the last three months.But under the surface, it has a tale of halves and have nots. Cloudflare and Crowdstrike, for example, posting strong years while Sentinel 1 and Forinet struggling. Let's talk more about what 2026 could bring for cyber stocks.Joining us now is Peter Lavine, Evercore Enterprise software analyst. Peter, w ...
Peace of Mind Is a Basic Human Right, Not a Privilege! | H.E. Dr. Mohammed Al Kuwaiti | TEDxAlBateen
TEDx Talks· 2025-11-20 16:05
[music] I have a friend who wants to start his company and as a matter of fact all of his saving went into that startup. He built up his cloud. He start putting all of his data there.He starts serving the community and that perspective to build this trust to build that great trust that will not only bring him a great development digital economy but also it will add value to him to his family to everybody in that respective. However, he got an attack. All of his saving flourished and went into loss.Not only ...
X @Bloomberg
Bloomberg· 2025-11-20 15:38
The cyber warfare startup Twenty has nabbed US government contracts that give military hackers AI tools https://t.co/W8TGHc3m6X ...
Rapid7 Q3 Threat Report Reveals Ransomware Alliances, AI Weaponization, and the Obsolescence of “Time to Patch”
Globenewswire· 2025-11-12 14:00
Core Insights - Rapid7's Q3 2025 Threat Landscape Report highlights the evolving tactics of threat actors, emphasizing the acceleration of vulnerability exploitation and the rise of ransomware groups leveraging artificial intelligence [1][2][5] Vulnerability Exploitation - The total number of newly exploited vulnerabilities decreased by 21% from Q2 to Q3 2025, yet attackers are increasingly targeting older, unpatched vulnerabilities, including those over a decade old [2] - The exploitation of critical vulnerabilities in Microsoft SharePoint (CVE-2025-53770) and Cisco ASA/FTD products illustrates the urgent need for timely patching [3] Ransomware Activity - The number of active ransomware groups surged to 88 in Q3 2025, up from 65 in Q2 and 76 in Q1, indicating a significant increase in ransomware activity [4] - New alliances among ransomware groups, such as Qilin, SafePay, and WorldLeaks, are targeting various industries and employing innovative tactics like fileless operations and single-extortion data leaks [4] AI and Cyber Warfare - Generative AI is facilitating the creation of sophisticated phishing campaigns and adaptive malware, lowering barriers for cybercriminals [5] - Nation-state actors from Russia, China, and Iran are refining their tactics, focusing on supply chain and identity system attacks, which blur the lines between espionage and disruption [5] Report Overview - The Rapid7 Threat Landscape Report provides a comprehensive analysis of global adversary behavior, covering various threats from ransomware to state-sponsored operations and AI-driven attacks [7]
China hacking America’s critical infrastructure, retired four-star general warns | 60 Minutes
60 Minutes· 2025-10-13 03:00
Cybersecurity Threats & Vulnerabilities - China has been hacking into US computer networks extensively, targeting not only the military and industry but also American homes [2] - Critical infrastructure, including water, electrical power, and transportation, has been targeted, revealing vulnerabilities [3] - Intrusions at utilities were discovered in 2023, with China having accessed some networks for at least 5 years [4] - China aims to gain an advantage in a crisis or conflict by targeting telecommunications and critical infrastructure in the US and other countries [5] - Small entities like the Littleton, Massachusetts Electric and Water Utility, with 10,000 residents, were targeted, highlighting the broad scope of potential targets [7][8] - China exploits vulnerabilities in network equipment, such as unpatched software or outdated equipment, to gain access [16] - Once inside, China steals login credentials and remains dormant, ready for later use in a crisis [17] Geopolitical & Economic Implications - China's hacking is seen as a way to deter the US from intervening in a conflict, potentially causing chaos in financial markets [14][15] - Disruptions to critical infrastructure, even in small locations, could distract the US and strain resources during a crisis [11][12] - If the US does not dominate in cyberspace, China could steal intellectual property, impacting the US economy, and gain intelligence advantages [30] US Response & Challenges - The White House is working to assess exposure and mitigate the damage from Chinese hacking [18] - Removing intruders from a network is more resource-intensive than preventing access, emphasizing the importance of basic security measures [19] - The scale of the challenge is immense, requiring the US government to build partnerships with industry to counter these threats [20][29]
From Iron to Intelligence | Rajeev Bagga | TEDxKIET
TEDx Talks· 2025-08-25 14:53
Military Technology and Tactics - Military technology is transcendent and constantly changing, evolving from ancient weapons to AI and intercontinental ballistic missiles [4][5] - Modern warfare tactics, while advanced, still draw from past strategies, highlighting the importance of judicious application [6] - The industry emphasizes adaptability to current scenarios for the betterment of future generations, advocating for human control over technology [9] - Simple strategies and lessons from the past remain relevant, even in modern cyber warfare [10][11] Environmental and Human Impact of War - Warfare leaves emotional and environmental scars, necessitating a curbing of destructive technologies to protect the Earth [8] - The long-term impact of war on future generations includes physical signatures like war memorials and battlefields, serving as reminders of past conflicts [12] - Minimizing destruction requires diplomatic talks and a reduction in the lethality of weapons, emphasizing the importance of humanity [13][16] Military Leadership and Ethics - Military leadership requires adaptability, moral clarity, and prioritizing the protection of soldiers [19][20] - Leadership involves operating under stress, ensuring the well-being of subordinates, and integrating military ethos into planning [21][22] - The industry respects technology but cautions against allowing it to dominate military plans, emphasizing the importance of human judgment [23] Endurance and Legacy - Endurance, both physical and mental, is crucial for survival and adapting to challenging situations [17][18] - Actions taken today will shape the future, urging individuals to ensure their actions are beneficial for future generations [24]