ICIT launches ‘Know Your Enemies 2.0’, an encyclopaedia of prominent hacktivists

In its latest brief, the Institute for Critical Infrastructure Technology (ICIT) walks the reader through the characteristics and intricacies of the world’s most prolific hacktivist, mercenary and state sponsored hacker groups.

Consider, says James Scott, Senior Fellow at ICIT, that every device and network attached to the IoT possesses, within itself, a universe of vulnerabilities. Each vulnerability enables the adversary, whether they be state, hacktivist or mercenary hackers, the technological capability to disrupt networks, exfiltrate sensitive data and wreak havoc on organisations of all sizes. Our adversaries stem from an endless stream of agendas and offensive strategies with the singular aim to pinpoint and exploit unpatched applications and vulnerable networks says, James Scott, Senior Fellow at ICIT.

State and corporate espionage cloaked beneath stealth and technological sophistication continuously plague US critical infrastructure and federal agencies. Topics of Cybersecurity hygiene and cyber defensive training barely make it on the schedule for discussion in board rooms while bad actors plague and infest networks and exfiltrate data.

KYE_V2

This report, Know Your Enemies 2.0, is an encyclopaedia of bad actors stemming from the nation state, mercenary and hacktivist arenas. We cover threat groups not by use of a particular ranking system, rather by the dominant players categorised by geography. Zero days, malware, tool kits, exploit techniques, digital foot prints and targets are covered in-depth in this report.

Download the report at: http://icitech.or g/know-your-enemies-2-0/

The author of this blog is James Scott, Senior Fellow at ICIT.

Comment on this article below or via Twitter: @ VanillaPlusMag OR @jcvplus

 

RECENT ARTICLES

The emerging role of satellites in expanding cellular networks

Posted on: April 25, 2024

Satellites are rapidly gaining prominence in the world of cellular communication. However, the full extent of their potential to complement terrestrial networks as well as phone services and broadband is

Read more

OSIA specification recognized as ITU-T international standard

Posted on: April 24, 2024

The Secure Identity Alliance (SIA) has announced that its OSIA specification is recognised as international standard by the International Telecommunication Union’s Telecommunication Standardization Sector (ITU-T). This milestone establishes OSIA as

Read more