From Fun to Responsibility: Inspiring Young Gamers to Embrace Ethical Hacking and Cybersecurity

Video games have evolved significantly since their rise in popularity in the 1970s, leading to a remarkable surge in players. Today, there are around 3 billion gamers globally, with estimates indicating that over 90% of Gen Z engage in gaming for more than 12 hours a week. Contemporary gaming blockbusters are vibrant and imaginative, immersing young people in dynamic and expansive worlds they can explore and influence.

This burgeoning creative talent has caught the attention of criminals, who target children and teenagers within popular online games, transforming them into skilled hackers.

The financial and societal repercussions of cybercrime are staggering. It is predicted that global costs of cybercrime will reach: 12 trillion dollars by 2025. Moreover, research indicates that 69% of youth in Europe report having engaged in some form of cybercrime. In the UK, the last statistics released by the National Crime Agency in 2015 revealed that the average age for cybercrime suspects is 17, which is notably younger than for other criminal activities like drug offenses (37 years old).

“If you’re facing arrest at 17, it likely began around age 11,” states Fergus Hay, co-founder and CEO of The Hacking Games, an initiative aimed at helping young individuals channel their coding talents into legitimate paths. “This transition doesn’t happen instantly. Games are often the gateway that enables skill development and experimentation in a controlled setting. These young hackers are continually modifying and hacking games to exploit vulnerabilities.”

He further noted that social media platforms are integral, offering tools and steps for hacking while also fostering a desirable lifestyle and community belonging.

This challenge coincides with a notable uptick in serious cyber-attacks within the UK. The National Cyber Security Center (NCSC) recently reported a historic surge in large-scale cyber assaults. In the year leading to August 2025, GCHQ categorized 204 incidents as being of ‘national significance,’ an increase from 89 the prior year.

In response to these threats, Hay initiated the Hacking Games and collaborated with John Madeline, a cybersecurity expert, to realize a vision of “cultivating a generation of ethical hackers who will enhance global safety.”

“This is a generation of inherent hackers. They can either serve society positively or become a liability. If we can engage them, we can guide them towards becoming ethical rather than criminal hackers,” Madeline emphasizes.

The Hacking Games recently unveiled the HAPTAI platform, which assists in creating hacking aptitude profiles for youths by evaluating their performance in popular games and aligning those results with psychometric data. Subsequently, candidates are matched with suitable job roles and teams where they can flourish.

The projected global average annual cost of cybercrime is $23 trillion by 2027, fueled by threats from state entities and organized crime groups worldwide. These groups often seek out young individuals, steering them towards criminal activities.

For youths approached by these “cyber Fagins,” there is a lure of significant financial gain. Initial payments often come in the form of virtual currencies for gaming but can escalate to tens of thousands in real money or its virtual equivalent.




They approach young hackers and offer payment for their abilities, often using cryptocurrencies. Composite: Stocksy/Guardian Design

“When they identify talent displaying genuine hacking or game modification skills, they engage them under the guise of another youth, asking, ‘How would you utilize cryptocurrency?'” Hay explains. “Many are exceptionally bright, sometimes neurodivergent, employing games as a medium to push creative boundaries. They do not inherently possess a criminal mindset.”

The scale of the cybercrime issue in the UK has become increasingly evident over the past year, with businesses experiencing significant disruption and monetary loss. Major corporations, including Co-op, have reported losses amounting to millions due to hacking incidents, one of which saw four arrests as part of an ongoing investigation by the National Crime Agency.

Social Issues Behind Crime

As a socially conscious organization, Co-op is dedicated to community enhancement and has partnered with The Hacking Games to mitigate future cyber threats and foster opportunities for vulnerable youth.

“When they experienced a cyberattack, Co-op sought to understand the nature of the issue. Upon discovering underlying societal factors, they recognized their responsibility to grasp the root causes impacting youth and to collaborate with us to address these challenges, not just the technical aspects,” Madeline clarifies.

The Co-op has a longstanding tradition of community initiatives addressing issues like social mobility and isolation. Together, Co-op and The Hacking Games aim to establish a pilot program within the Co-op Academies Trust across Northern England. Sponsored by Co-op Group, the Trust encompasses a network of 38 academies with around 20,000 students, including primary, secondary, special schools, and universities, dedicated to guiding aspiring hackers towards legitimate career trajectories.

For this pilot, students will be selected based on their interests in gaming and technology. Through interactive and creative sessions, participants will delve into the principles of ethical hacking and understand its crucial role in cybersecurity. The program will also highlight career education, with reputable industry partners introducing talented youths to the vast prospects available in this rapidly expanding domain.

“Our academy students’ curiosity about technology-related roles is on the rise, yet there is scant data regarding their home gaming environments and whether these interests extend to hacking,” remarks Joe Sykes, careers director at Co-op Academies Trust. “As educators, we must confront these challenges directly—this initiative will undoubtedly provide fresh perspectives and foster insights for students eager to explore these pathways.”




Hay and Madeline aspire to bridge the cybersecurity skills gap by showcasing the potential of gifted young developers. Composite: Stocksy/Guardian Design

A Path to a Legitimate Career

Young gamers may find themselves simply altering game experiences without authorization or creating cheat codes to sell them on the dark web.

Some parents associated with The Hacking Games have only discovered their child’s online activities when asked about tax implications after their digital wallets reached $400,000 (£298,000).

“For the youth unsure about further education, many are starting to realize that substantial earnings can come from just a few keystrokes,” explains Madeline.

According to Hay and Madeline, it’s essential to engage young individuals before they stray too far, to identify their skills, recognize their potential, and integrate these into an educational framework that aims to fill the cybersecurity skills gap in the UK and globally—a concept Hay refers to as “intergenerational opportunities.”

“Many of these youths have felt marginalized in school and, at times, victimized. They possess a deep disdain for wrongdoers and bullies. If you understand their motivations, you can channel that into something positive,” he concludes.

Learn more

Source: www.theguardian.com

Cyber Threats Can Be Conquered: GCHQ Chief Calls on Businesses to Strengthen Cybersecurity Efforts

The chief of GCHQ emphasized the importance for businesses to implement additional measures to mitigate the potential consequences of a cyber-attack, such as maintaining a physical paper version of their crisis plan for use in the event that an attack disables their entire computer infrastructure.

“What is your contingency plan? Because attacks will inevitably succeed,” stated Anne Keast Butler, head of GCHQ, the UK government’s cyber and signals intelligence agency, since 2023.

“Have you genuinely tested the outcome if that were to occur in your organization?” Keast Butler remarked Wednesday at a London conference organized by cybersecurity firm Record Future. “Is your plan… documented on paper somewhere in case all of your systems go offline? How do you communicate with each other if you are entirely reliant on those systems and they fail?”

Recently, the National Cyber Security Center, part of GCHQ, reported a 50% rise in “very serious” cyber-attacks over the last year. Security and intelligence agencies are now confronting new attacks several times a week, according to the data.

Keast Butler mentioned that governments and businesses must collaborate to address future threats and enhance defense mechanisms, as contemporary technology and artificial intelligence make risks more widespread and lower the “entry-level capabilities” that malicious actors need to inflict harm. He highlighted their efforts in “blocking millions of potential attacks” by partnering with internet service providers to eliminate harmful websites at their origin, but noted that larger companies need to ramp up their self-protection measures.

On Tuesday, a Cyber Monitoring Center (CMC) report revealed that the Jaguar Land Rover hack could cost the UK economy around £1.9 billion, marking it as the most costly cyberattack in British history.

After the attacks in August, JLR was forced to suspend all factory and office operations and may not achieve normal production levels until January.

Keast Butler pointed out that “[there are] far more attacks that have been prevented than those we highlight,” adding that the increased focus on the JLR and several other significant cyber incidents serves as a crucial reminder of the need for robust cybersecurity protocols.

She regularly converses with CEOs of major companies and has conveyed that they should include individuals on their boards who possess expertise in cybersecurity. “Often, due to the board’s composition, nobody knows the pertinent questions to ask, which results in interest, but the right inquiries go unposed,” she noted.

Earlier this year, the Co-op Group experienced a cyberattack that cost it up to £120 million in profits and compromised the personal data of several of its members. Shireen Khoury Haq, CEO of the group, mentioned in a public letter the critical role of cybersecurity training in formulating strategies to respond to attacks.

“The intensity, urgency, and unpredictability of a real-time attack are unparalleled to anything that can be rehearsed. Nonetheless, such training is invaluable; it cultivates muscle memory, sharpens instincts, and reveals system vulnerabilities.”

Keast Butler mentioned a “safe space” that has been created to encourage companies to exchange information about attacks with government entities, allowing them to do so without risking the disclosure of sensitive commercial data to competitors.

“I believe sometimes individuals struggle to come forward due to personal issues or challenges within the company, which hinders our ability to assist in making long-term strategic improvements to their systems,” she remarked.

Source: www.theguardian.com

Qantas Incident Highlights That One Phone Can Exploit the Weakest Link in Cybersecurity: Humans

a
A phone call may be coming your way. This week’s revelations show that cybercriminals stole personal data from as many as 6 million customers after breaching offshore IT call centers and accessing third-party systems.

This incident adds to a troubling trend of cyberattacks affecting major Australian corporations, including the personal information of millions linked to the recent breaches involving Optus, Medibank, and more recently, the $4 trillion superannuation sector in Australia.

The attack on Qantas follows recent targeting by a group known as “spiders,” focusing on various airline sectors. They employ social engineering techniques to manipulate employees and contractors into granting access, often bypassing multifactor authentication.



New technology brings old methods

Although companies can implement the latest software updates and safeguard their systems, hackers continue to exploit social engineering tactics, often targeting the weakest link: human behavior.

Social engineering is not a new concept; it revolves around tricking individuals into revealing sensitive information, predating the internet.

Phishing is the most common manifestation of social engineering, crafted to appear legitimate to lure unsuspecting users into divulging credentials.

The telephone variation, known as vishing, presents a greater challenge for attackers as they must employ persuasive tactics over the phone to manipulate employees into providing sensitive information.

The emergence of user-friendly artificial intelligence tools, including voice cloning, has made such attacks even simpler for cybercriminals.

The latest report from Australia’s intelligence commissioner covering the latter half of 2024 indicated a significant rise in complaints about social engineering attacks, particularly within government agencies, finance, and health sectors.

Qantas’ breach involved compromised details such as names, email addresses, phone numbers, birth dates, frequent flyer numbers, etc. While these breaches might not directly lead to financial theft, the growing number of incidents in Australia enables hackers to aggregate stolen data to target new vulnerable entities.

Data breaches lead to more data breaches

In April, the national pension fund acknowledged the risks associated with hackers collecting credentials from previous breaches to gain access to superannuation accounts, a tactic termed “eligibility smashing.”

Fortunately, only a small number of customers incurred losses totaling around $500,000. However, this could represent a significant number of fund holders who are yet to reach retirement age.



The Albanese government has been cautioned that this attack signals potential risks within the financial sector. In a recent advisory provided to the incoming government, released under the Freedom of Information Act, Australia’s Prudential Regulation Authority (APRA) warned that superannuation assets are susceptible to cyber threats.

“The prevalence and frequency of cyberattacks on large pension funds reinforce the necessity for enhancing our capabilities in managing both cyber and operational risks,” stated APRA.

“Despite only a small number of accounts reporting fraudulent withdrawals, it highlights the need for the sector to mature its cybersecurity and operational resilience.”

“As the sector expands and more members retire, continuity and increasing interconnectedness with the banking sector are crucial.”


Skip past newsletter promotions

APRA cautioned the industry in 2023 about the critical nature of multifactor authentication, yet some funds were unable to implement it before the April breach.

Regulators noted that there is an ongoing wave of cyberattacks targeting banking and insurance sectors, necessitating continuous testing of their defenses against emerging threats.

Who is at the most risk?

According to Craig Searle, global leader in cyber advisory at Trustwave, healthcare, finance, technology, and critical infrastructure sectors such as telecommunications are particularly vulnerable to cyber threats.

“The technology sector is especially at risk due to its pivotal role in digital infrastructure and interconnected supply chains,” he explained. “Recent high-profile supply chain attacks demonstrate how breaches of a single tech provider can ripple through to hundreds or thousands of downstream clients.”

“Overall, the sectors facing the highest risks are those that manage valuable data, maintain complex supply chains, and deliver critical services.”

Searle noted that attackers intentionally target third-party systems and outsourced IT support, which presents significant risks for large corporations, as exemplified by the breaches at Qantas.

“The interconnected dynamics of the digital supply chain can lead to vulnerabilities among partners or contractors, creating a ripple effect that compromises sensitive data far beyond the initial breach,” he remarked.

Christian Beek, senior director of threat analysis at Rapid7, highlighted that third-party systems are now integral to the operations of many organizations and thus become prime targets for cybercriminals.

“Organizations must apply adequate levels of due diligence when evaluating the security protocols of these third-party systems to mitigate the risk of data being compromised.”

Searle emphasized the necessity for organizations to adopt a proactive cybersecurity posture, swiftly applying software patches and establishing robust access controls, such as multifactor authentication.

Beek echoed that organizations need to be proactive, insisting that executive leadership must take responsibility for cybersecurity and board oversight.

“The new tactics utilized by modern cybercrime groups extend beyond standard security management protocols,” he warned. “These unconventional approaches compel us to rethink the typical defensive strategies, especially regarding social engineering tactics and how we counter them.”

Source: www.theguardian.com

British Cybersecurity Agency Issues Warning About Quantum Hacker Threats In Relation to Cybercrime

By 2035, the UK cybersecurity agency is urging organizations to protect their systems from quantum hackers, as the prospects for a strong computing breakthrough threaten digital encryption.

The National Cyber Security Center (NCSC) has issued new guidance recommending large entities, including energy and transport providers, to introduce “post-Quantum encryption” to prevent quantum technology from infiltrating their systems.

NCSC warned that quantum computers, although still in development, pose a serious threat to encryption as they can solve complex mathematical problems that underpin public key cryptography. Quantum Computing’s ability to compute at incredible speeds is a major concern for encryption.

“Today’s encryption methods are used to protect everything from banking communication, but rely on mathematical problems that quantum computers could solve much faster, posing a threat to current encryption methods,” the agency stated.

NCSC recommends that large organizations, critical national infrastructure operators, and businesses with bespoke IT systems implement post-Quantum encryption to combat this threat.

Organizations must identify services that require upgrades by the 2028 deadline, undergo essential overhauls by 2031, and complete migration to a new cryptographic system by 2035 according to the guidance provided.

Skip past newsletter promotions

Traditional computers use bits to represent information as 0 or 1, but quantum computers can simultaneously encode various combinations of 1 and 0, enabling them to perform much larger calculations at incredible speeds.

However, qubits, the building blocks of quantum computing, are highly sensitive to interference such as temperature changes and cosmic rays, hindering the development of large quantum computers despite significant investments. NCSC hopes its guidance will give organizations ample preparation for the future arrival of quantum computers.

“There is now a new way to encrypt public keys, making it prudent to act now rather than wait for the threat to materialize,” said Alan Woodward, a cybersecurity professor at the University of Surrey.

Source: www.theguardian.com

Alphabet’s Google Parent Company makes historic purchase of cybersecurity firm Wiz

Alphabet, the owner of Google, has agreed to purchase Cybersecurity Group Wiz for $32 billion (£24.7 billion).

Google is acquiring an Israeli startup in an effort to compete with rivals Microsoft and Amazon in the cloud services market.

Wiz provides services that scan data from cloud storage providers like Amazon Web Services and Microsoft Azure for security risks. It previously turned down Alphabet’s $23 billion bid last summer.

However, concerns about regulatory approval caused some issues with the initial bid.

If the deal falls through, Alphabet has agreed to pay a $3.2 billion fee. This acquisition indicates a test of the Trump administration’s willingness and shows President Biden’s leadership in acquiring major technology companies.

Alphabet is currently facing pressure from US Department of Justice officials to sell off its Chrome browser to address concerns about its dominance in the search market.

Wiz, founded in 2020 by graduates of the Israeli Intelligence Corps, has offices in New York and Israel, with its European headquarters in London.

Despite the acquisition, Wiz will operate independently from Google, similar to how Microsoft operates LinkedIn.

Wiz will continue to collaborate with major cloud platforms such as Amazon Web Services, Microsoft Azure, and Oracle Cloud.




Wiz co-founder and CEO Assaf Rappaport will remain in his position until October 2024. Photo: Bloomberg/Getty

“We’re excited for the future,” said Sundar Pichai, Google’s CEO. “Google Cloud and Wiz will enhance cloud security and multi-cloud capabilities. Businesses and governments operating in the cloud seek stronger security solutions and a wider range of cloud computing providers.”

Startup CEO Assaf Rappaport previously rejected Alphabet’s $23 billion offer to focus on growth and potentially going public.

Analyst Dan Ives from Wedbush commented on the acquisition, highlighting Wiz’s strong presence in the cloud cybersecurity industry.

Skip past newsletter promotions

Google’s move to acquire Wiz is seen as a strategic step to compete with other tech giants like Microsoft and Amazon in the cloud security space.

Wiz currently generates $750 million in annual revenue, and Google aims to capitalize on the company’s market position for future growth.

Alphabet’s previous acquisitions include Motorola Mobility, Mandiant, YouTube, and Deep Mind as part of its strategy to diversify from search-related ads.

With Wiz’s expertise, Alphabet hopes to gain a larger share of the global cloud market, currently lagging behind Microsoft Azure and Amazon Web Services.

Analyst Dan Ives sees Google’s acquisition of Wiz as a strategic move to enhance cloud security offerings and drive cloud and AI initiatives forward.

Source: www.theguardian.com

Wizz, a cybersecurity company, turns down $23 billion acquisition bid from Alphabet Inc., Google’s parent company

Cybersecurity company Wizz has turned down a $23bn (£18bn) takeover offer from Google’s parent Alphabet, making it the largest takeover bid ever for a tech company, and has opted for a stock market listing instead.

Alphabet had been in discussions with Wizz, a company established by graduates of Israel’s cyber-intelligence program, in an effort to catch up with competitors Microsoft and Amazon in the competitive cloud-services market.

Wiz provides a service that scans data on cloud storage platforms like Amazon Web Services and Microsoft Azure for potential security threats.

The New York-based startup, which is financially backed by investors such as Sequoia Capital and Thrive Capital, was last valued at $12 billion.

In an internal email to employees, the company expressed gratitude for the offer but decided to remain committed to its mission of building Wiz. CEO Assaf Rapaport outlined the company’s objectives of reaching $1 billion in annual recurring revenue and going public.

Despite the tempting offer, the company’s trust in its skilled team reaffirmed their decision. The positive response from the market further reinforced their aim to create a platform that is loved by both security and development teams.

As of Tuesday morning, neither Wizz nor Google have released an official statement regarding the end of the acquisition negotiations.

There are concerns that the deal may face regulatory challenges as authorities seek to tighten their control over acquisitions involving major tech companies.

Last month, the US Department of Justice and the Federal Trade Commission agreed to investigate leading players in the AI market, including Microsoft, OpenAI, and Nvidia.

Established in 2020, Wizz was valued at $12 billion in a funding round in May, attracting investments from Andreessen Horowitz, Lightspeed Venture Partners, and Thrive.

Wiz claims to have 40% of the Fortune 100 as clients and boasts an annual recurring revenue of $350 million.

Source: www.theguardian.com

Live Nation probes data breach at Ticketmaster’s US division | Cybersecurity Breach

Live Nation Entertainment is currently investigating a data breach at its Ticketmaster division that was discovered on May 20. This breach is the latest in a string of major corporate hacks that have occurred over the past year.

In a filing with the U.S. Securities and Exchange Commission, Live Nation reported finding “unauthorized activity” in a third-party cloud database containing primarily Ticketmaster data and is working with forensic investigators to address the issue.

Reports surfaced last week that a cybercrime group known as ShinyHunters claimed to have stolen user data for over 500 million Ticketmaster customers. However, Live Nation did not mention Shiny Hunters in its SEC filing.

Live Nation has not yet responded to requests for comment regarding the breach.

Skip Newsletter Promotions

This breach comes at a time when concert promoters are facing antitrust scrutiny. Live Nation is at the center of this scrutiny as the first target of antitrust lawsuits filed by U.S. and state governments seeking to break up the company for alleged price gouging on concert tickets.

According to Live Nation’s filing, on May 27, a criminal threat actor attempted to sell purported user data from Live Nation on the dark web. The company is actively working to mitigate risks, notify law enforcement, regulators, and users as needed, and ensure the security of personal information.

Despite the breach, Live Nation believes it will not have a significant impact on its operations or finances. The company is evaluating risks and implementing measures to enhance its operations.

Source: www.theguardian.com

Top 10 Countries Ranked for Cybersecurity Strengths and Weaknesses

According to a study by Harvard Business in 2023, data breaches in the US have reached an “all-time high”, with a 20% increase in the first three quarters of 2023 compared to 2022. This trend was seen globally, with concentrated attacks in the UK, Australia, and Canada. In the Middle East, ransomware gang activity increased by 77% in the same year.

Exploring the dynamic global cybersecurity landscape gives us an understanding of the level of threats faced by countries worldwide.

In response, governments are implementing new laws and policies to safeguard data and infrastructure. Additionally, national Computer Emergency Response Teams (CERT) and Cyber Instance Response Teams (CIRT) are being established, along with reporting channels for breaches.

ExpressVPN delves into the impact of cybercrime on individuals and economies in this blog post, highlighting which countries excel or lag in cybersecurity.

5 countries with the best cybersecurity

Earth in outer space with network connections and sunlight. (City Lights 2012 – Flat Map – https://images.nasa.gov/details-GSFC_20171208_Archive_e001589 – Software: 3dsMax, Adobe After Effects, Photoshop)

US

The United States has been a frontrunner in cybersecurity, but recent challenges like a real estate information leak in 2023, which exposed financial details of 1.5 billion individuals, have been concerning. In March 2023, the Biden administration introduced a national cybersecurity strategy focusing on safeguarding critical infrastructure.

Denmark

Denmark, with a high cybersecurity score of 92.6, faced a major cyberattack in 2023 by Russian hackers targeting 22 electricity companies, despite its Nordic region’s generally high cybersecurity rating.

England

The UK ranks 5th globally in cybersecurity and has initiated a cyber intelligence hub, the Cyber Coordination Centre, as part of its 2022 Cybersecurity Strategy to combat cyber threats.

Poland

Poland leads in cybersecurity readiness according to the National Cyber Security Index, attributing its success to public awareness campaigns and education about cyber threats.

Saudi Arabia

Saudi Arabia, ranking second in the ITU Global Cybersecurity Index, has made significant strides in bolstering its cybersecurity infrastructure, spending $1.2 billion on cybersecurity education for young people.

Global cybersecurity: Which countries are failing?

System hacking warning alert on notebook (laptop). Cyber-attacks on computer networks, viruses, spyware, malware, or malicious software. Cybersecurity and Cybercrime. Compromised Information Internet.

Namibia

Namibia faces increased cyberattacks due to inadequate cybersecurity regulations and infrastructure, prompting calls for stronger network and data security measures.

Tajikistan

Central Asia, including Tajikistan, Uzbekistan, Kazakhstan, and Kyrgyzstan, is vulnerable to cyber threats, with Tajikistan experiencing a high rate of malware attacks.

China

China, despite decent rankings, has a significant number of malware-infected mobile phones and IoT-based attacks originating from the country.

Bangladesh

Bangladesh struggles with cybersecurity, with a high percentage of malware-infected mobile devices and recent breaches exposing citizen data.

Iran

Iran faces major cybersecurity challenges, including a high rate of mobile phone infections with malware and vulnerabilities in critical infrastructure exposed through cyberattacks.

Source: www.sciencefocus.com

Chinese Hackers for Hire Exposed in Major Cybersecurity Breach | The Dark Reality of Cybercrime

The recent data breach from a Chinese cybersecurity company has exposed national security agencies paying substantial amounts of money to collect information about a variety of targets, including foreign governments, while hackers gather vast amounts of data on individuals and organizations that might be of interest to potential customers for their companies.

A set of over 500 leaked files from the Chinese company, I-Soon, has been posted on the developer’s website Github, with cybersecurity experts confirming their authenticity. The targets discussed in the leaked files include NATO and the UK Foreign Office.

The leak provides an unprecedented glimpse into the world of Chinese-employed hackers, with Britain’s security chief describing it as a “significant” challenge for the country. The leaked files consist of chat logs, company prospectuses, and data samples, revealing the scope of China’s intelligence-gathering operations and highlighting the market pressures faced by Chinese commercial hackers in a sluggish economy.

Yisun is believed to have collaborated with another Chinese hacking organization, Chengdu 404, which has been indicted by the U.S. Department of Justice for cyberattacks not only in the United States but also on companies in China and Hong Kong democracy activists.

Other targets discussed in the I-Soon leak include the British think tank Chatham House, public health agencies of Asean countries, and foreign ministries. The leak also indicates that certain data has been collected according to specifications, while in other cases special agreements have been made with the Chinese Public Security Bureau to collect specific types of data.

Chatham House has expressed concern over the leaked data, emphasizing the importance of safeguarding their data and information. Similarly, NATO has acknowledged the persistent cyber threats and stated that it is investing in large-scale cyber defense. However, the British Foreign Office declined to comment.

I-Soon’s services range from gaining access to email inboxes to hacking accounts, obtaining personal information from social media platforms, retrieving data from internal databases, and compromising various operating systems. The leaked files also suggest that the Chinese state is collecting as much data as possible.

Isun’s office building in Chengdu, Sichuan Province, southwest China. Photo: Kang Dak/AP

The leaked documents further reveal that I-Soon has sought “anti-terrorism” support and has claimed to have obtained data from various organizations. The company was also involved in discussions about sales practices and the company’s internal situation.

The leaked data also includes screenshots and chat logs where employees discuss the company’s operations and the impact of the COVID-19 pandemic on their business. The company’s CEO expressed concerns about the loss of core staff, the subsequent impact on customer confidence, and the loss of business.

Source: www.theguardian.com

Understanding Bolt Typhoon: The Most Destructive Threat of Our Time | Cybersecurity

Tensions between the United States and China have escalated in recent years, primarily due to Beijing’s threats to annex Taiwan. This has raised concerns about potential hostilities and the risk of a full-scale conflict. The recent revelation that a Chinese hacking network, known as Bolt Typhoon, had been dormant within America’s critical infrastructure for five years, has caused significant alarm.

This network exploited weaknesses in US technological and security systems. However, US and allied intelligence agencies have stated that their focus was on “prepositioning” for future acts of sabotage rather than stealing secrets.

FBI Director Christopher Wray described Bolt Typhoon as “the defining threat of our generation” during a US committee hearing last week.

The Netherlands and the Philippines have also publicly acknowledged that Chinese-backed hackers were targeting their national networks and infrastructure.

What is Bolt Typhoon?

Western intelligence officials believe that Volt Typhoon (also known as Vanguard Panda, Bronze Silhouette, Dev-0391, UNC3236, Voltzite, and Insidious Taurus) is a state-sponsored Chinese cyber operation. Thousands of internet-connected devices were compromised as part of a larger effort to infiltrate critical infrastructure in the West, including military ports, internet service providers, communications services, and public utilities.

The recent Bolt Typhoon advisory follows US authorities’ announcements of dismantling a bot network of hundreds of compromised devices attributed to a hacking network.

“CISA [Cybersecurity and Infrastructure Agency] The team includes aviation, water, energy, [and] transportation,” CISA Director Jen Easterly said at a U.S. House of Representatives committee hearing earlier this month.

How does it work?

Volt Typhoon works by exploiting vulnerabilities in small or end-of-life routers, firewalls, and virtual private networks (VPNs), often using administrator credentials or stolen passwords, and by using outdated technology that lacks regular security updates. This is the main weakness identified in US digital infrastructure. It uses a “living off the land” technique where the malware only uses existing resources within the target operating system, rather than introducing new (and more detectable) files.

A report released last week by CISA, the National Security Agency, and the FBI revealed that the Bolt Typhoon hackers had maintained access for the past five years, only targeting US infrastructure but also affecting allies of the Five Eyes, including Canada, Australia, New Zealand, and the United Kingdom.

What is its purpose?

US officials noted that Bolt Typhoon’s target selection and behavioral patterns were inconsistent with traditional cyber espionage or intelligence gathering operations. Microsoft’s research has shown that Bolt Typhoon has been active since mid-2021.

“People's Republic of China (PRC) state-sponsored cyber adversaries are using their IT networks to prepare for disruptive or devastating cyber attacks on U.S. critical infrastructure in the event of a major crisis or conflict with the United States. ,” the joint report said.

What does China say?

The Chinese government regularly denies any accusations of cyberattacks or espionage linked to or sponsored by the Chinese state. However, evidence of Chinese government cyber espionage has been accumulating for more than two decades.

Secureworks, a division of Dell Technologies, mentioned Bolt Typhoon’s interest in operational security last year, as a response to increasing pressure from the Chinese leadership to avoid public scrutiny of cyber espionage.

What's next?

The widespread nature of the hack prompted a series of meetings between the White House and the private technology industry, including several telecommunications and cloud computing companies, during which the US government sought assistance in tracking the activity.

The institutions and assets targeted by the now-dismantled botnet were ordered by CISA to disconnect affected devices and products in January, starting an intensive and difficult remediation process.

“Given the extent of targeting and compromise around the world, with three vulnerabilities currently being exploited affecting these devices, this is a significant It was necessary,” said Eric Goldstein, executive assistant director of cybersecurity at CISA.

“All organizations running these devices need to be targeted and expect a breach.”

Source: www.theguardian.com

What Venture Capitalists Seek in Emerging Cybersecurity Startups

In cybersecurity, AI is often stands for “already implemented”. Security vendors have leveraged AI-based technology to leverage existing knowledge databases to address talent shortages. As an investor focused on supporting expansion-stage B2B startups in the cybersecurity, AI, and DevOps space, he has recently invested in cybersecurity company Huntress and AI startup Weights & Biases. and cybersecurity companies, I feel fortunate to have a unique perspective on both. It is scheduled to take off after 2024.

From my perspective, organizations today face an uphill battle when it comes to securing their data and networks. Cyber ​​threats are becoming more frequent and severe as the potential attack surface grows and hackers organize increasingly sophisticated schemes. Thanks to the power of artificial intelligence (AI), malicious attackers are becoming more efficient, conducting more personalized attacks, and increasing their scale, resulting in billions of dollars in lost business. .

Meanwhile, organizations of all sizes are innovating new defenses at an astonishing rate, often leveraging advanced AI capabilities as well. Businesses are hungry for solutions that can further enhance their efforts. According to Gartner, global corporate security spending will reach an estimated $188 billion this year and is expected to rise to $215 billion by 2024. Security software spending is the IT area least likely to be cut during an economic downturn. morgan stanley.

The next wave of successful startups will help businesses leverage GenAI to prevent attacks while increasing organizational productivity.

Over the next year, we aim to partner with players to help cybersecurity teams increase productivity and address talent shortages while addressing growing threats.

What VCs are looking for in the next wave of cybersecurity startups

The emergence of large-scale language models (LLMs) such as ChatGPT has created new opportunities for AI-driven innovation within the industry. Here are some of the features investors are looking for in the next successful cybersecurity startup.

Proactive approach to customer education

During the cloud computing revolution, many companies are rushing to implement cloud solutions, putting security on the back burner. This has allowed cybersecurity to catch up to some extent. So far, the opposite is true for generative AI (GenAI). Businesses are keen to reap the benefits of technology, but are very aware of the risks of compromising sensitive information and betraying customer trust. Concerns are growing after major data breaches occur at companies such as samsung. In response, many companies have been reluctant to launch GenAI initiatives, limiting usage to a small cohort or, in some cases, issuing blankets. prohibit.

Source: techcrunch.com

5 Cybersecurity Stories That Make Us Green with Envy in 2023

In 2018, my former VICE Motherboard colleague Joseph Cox and I began publishing a list of the best cybersecurity articles published elsewhere, with HTML tags for our readers. It wasn’t just to honor a friendly competitor, by adding articles from other publications, we were providing readers with a complete picture of what happened in the world of cybersecurity, privacy, and surveillance in the year that was just coming to an end. Our original inspiration was Bloomberg Businessweek’s Jealous List, which is an Overview of current progress A selection of the best stories published elsewhere, chosen by Bloomberg reporters and editors. Now that both Cox and I have left Motherboard, TechCrunch is taking a look at the Cyber ​​Jealousy List, relisting the year’s best cybersecurity stories and the ones we were most jealous of. — Lorenzo Franceschi-Bicchierai.

If you were using the internet in October 2016 and lived on the East Coast of the United States, you may have heard of the day Twitter, Spotify, Netflix, PayPal, Slack, and hundreds of other major websites stopped working for several hours. You will remember that. As it turns out, this is the work of his three enterprising young hackers, who have built one of the most effective distributed denial-of-service tools ever created. In this long work, andy greenberg profiles three young hackers and tells the untold stories of their lives, from teenage computer geeks to seasoned cybercriminals and ultimately reformed cybersecurity experts. . Sit back in your comfortable chair and immerse yourself in this must-read. In September, an unholy alliance of Russian cybercriminals and Western teenagers with exceptional social engineering skills allegedly hacked and destroyed the MGM casino in Las Vegas, causing widespread chaos. . This was one of the most talked about cyberattacks of the year, and several publications were written about this story. jason kabler former editor-in-chief of VICE Motherboard and currently one of the co-founders of the worker-owned outlet. 404 Media He had the smart idea to fly to Las Vegas and see the mess for himself. The result of his trip was a work that showed just how badly MGM was hurting, creating, as Kebler puts it, a “nightmare” for casino employees. NPR cybersecurity correspondent Jenna McLaughlin reported from Kiev that she had recorded a series of excellent news and audio stories about life in wartime Ukraine. People defending the country after the Russian invasion. Cyber ​​warfare has played an important role in warfare. Cyber ​​attack hits Ukraine’s energy sector and the military operation.Mr. McLaughlin’s dispatch period varied widely. In reporting on Ukraine’s defensive (and offensive) operations against the Russian invaders, Highlights of ordinary daily life in Ukraine Of course, it’s a special feature on soccer. In a surprising change of attitude, electronics manufacturer Anker admitted that its cameras were not always encrypted. In short, security researchers discovered a bug that shows: Access unencrypted streams of customer videos, even though Anker’s Eufy cameras claim to be end-to-end encrypted. The Verge verified and reproduced the security researcher’s findings and his Anker The company eventually admitted that its cameras were not end-to-end encrypted. and was actually producing an unencrypted stream. Hats off to The Verge for their impressive and tenacious reporting that gets to the bottom of the issue. Anker’s misrepresentation and failure to cover it up. In 2020, Russian government hackers slipped malicious code into the software supply chain of SolarWinds, a tech company whose customers range from giant corporations to federal agencies. The hack was stealthy and incredibly effective, giving the Russians an opportunity to steal secrets from a rival country.Veteran cyber security reporter Kim Zetter They spoke with those who helped investigate the incident and reconstructed the stealth hack almost shot by shot in an incredibly detailed and deep investigation.Zetter also published Convenient and detailed timeline of events On her substack, worth subscribing If you haven’t done so yet. The SolarWinds hack two years ago went down in history as the most audacious and sophisticated supply chain hack ever undertaken.

For years, few people knew about Appin, an Indian company. However, as reported by Reuters, thanks to an investigation based on “hundreds of interviews, thousands of documents, and research from multiple cybersecurity companies,” a team of journalists discovered that Appin was involved in hacking activities for hacking purposes. reported and made public evidence showing that It helped obtain information on executives, politicians, military personnel, and wealthy people around the world. This is one of the most detailed and thorough looks inside the shadow world of professional hacking companies that don’t work for governments like his team or his NSO group, but for wealthy private clients. This is one of the things I researched.When this story itself became a headline Reuters forced to remove article to comply with New Delhi court order. Reuters reported. Editor’s note It supports the report. Trickbot is one of the most active and damaging Russian cybercrime organizations, attacking thousands of businesses, hospitals, and governments over the past few years.The study is based on interviews with cybersecurity experts and analysis of large amounts of data from ransomware gangs leaked online. matt burgess and lily hay newman Revealing one of Trickbot’s “key personas”.Journalists identified him as a Russian man who said he was “obsessed” with Metallica and liked classic movies. hacker. A week after the reporter published this article, US and UK governments announce sanctions against 11 people For alleged involvement in Trickbot, including the man identified in WIRED’s original article. Today, U.S. and British authorities sanctioned 11 suspected Trickbot members, and the Department of Justice dropped three charges against Trickbot and Conti members. Maxim Galochkin is the only person charged in all three cases. @WIRED It was made public in an investigation last week. Data obtained by a Politico reporter includes nearly a year’s worth of facial recognition requests. Alfred Ng In the year after New Orleans police began using facial recognition, the technique was shown to fail to identify suspects in most cases and was used almost exclusively against black people.The use of facial recognition by police, law enforcement, and government agencies remains highly controversial act all over America. Critics have argued that facial recognition is deeply flawed at the technical level because it is almost always trained on white faces, but Ng’s report shows that facial recognition is a serious problem for authorities using the technology. It confirms what civil rights activists have long argued is that it amplifies prejudice. Or, in the words of a New Orleans City Council member who voted against facial recognition, its use in New Orleans is “totally ineffective and patently racist.” Toward the end of last year, password management company LastPass lost its encrypted password vault containing customer passwords and other sensitive information to cybercriminals during a previous data breach. I admitted that. The full impact of this theft remained unknown until September 2023. Cybersecurity reporter Brian Krebs Researchers have reported that they have identified a “highly reliable set of leads” to more than 150 possible victims of cryptocurrency theft related to stolen LastPass password vaults. According to Kleb’s extensive reporting, more…

Source: techcrunch.com

Senior Official in Ukraine’s Cybersecurity Department Dismissed

Ukraine’s government has fired two top cybersecurity officials following accusations of embezzlement.

The head of the State Special Communications Service of Ukraine (SSSCIP) Yuri Shtykhor and the deputy head Viktor Zola (pictured), who served as SSSCIP’s deputy chairman and chief digital transformation officer, have both been dismissed by the government, a cabinet official said. I made it.Official Taras Melnychuk In a public post on Telegram.

Melnychuk did not give a reason for his dismissal.

SSSCIP confirmed in a statement Ukraine’s Cabinet announced on Monday the appointment of Dmytro Makovsky as acting head of SSSCIP due to the ongoing investigation by the National Anti-Corruption Bureau of Ukraine (NABU).Nabu said in a press release Several members of the SSSCIP senior leadership have been accused of misappropriating and embezzling more than $62 million in state funds.

When asked for comment, Zola told TechCrunch: I will defend my name and reputation in court. ”

Mr. Sichhor could not immediately be reached for comment.

Reuters first reported departure. SSSCIP did not immediately respond to a request for comment. It is unclear whether the U.S. cybersecurity agency CISA, a close partner of the Ukrainian government and SSSCIP, was aware of the layoffs or was notified in advance. A CISA spokesperson did not respond as of press time.

U.S. officials have long touted the close ties between SSSCIP and Zola in particular.Zola and CISA Director Jen Easterly Memorandum of Understanding signed between the US and Ukrainian governments Several months have passed since Russia’s unprovoked invasion of Ukraine.

Zola was recently in the United States to give a keynote speech at Cyberwarcon, a cybersecurity conference.Earlier this year, Zora and Easterly Interviewed together on stage at the Black Hat Security Conference In Las Vegas.

More soon…

Lorenzo Franceschi-Bicchierai contributed reporting.

Source: techcrunch.com

Investment Firm Ballistic Ventures Seeks $300 Million for New Cybersecurity Fund

Ballistic Ventures, a venture capital firm specializing in funding and nurturing cybersecurity startups, aims to raise up to $300 million for a new fund, according to a regulatory filing.

The San Francisco-based VC firm on Wednesday It has been submitted Working with U.S. Securities and Exchange Commission to raise $300 million for second fund – more than a year after launch Initial funds of equal amount In May 2022.

Ballistic spokeswoman Michelle Kincaid declined to comment on the filing when contacted by TechCrunch.

Targeting early-stage cybersecurity and cyber-related startups, ballistic ventures was co-founded by Kleiner Perkins general partner Ted Schlein, with three other general partners: Barmak Meftah, Jake Seid and Roger Thornton, and Mandiant founder Kevin Mandia as a strategic partner. The company also welcomes Derek Smith as strategic advisor and Agnes So as head of finance and operations.

Ballistic has backed more than a dozen startups to date, according to details available on the company’s website. Ballistic says it founded, operates and funds more than 90 cybersecurity companies. Previous investments the company has made include AuthMind, Oligo, and Nudge Security. The company also recently appointed Former U.S. National Cyber ​​Secretary Chris Inglis and former CISA Chief of Staff Kirsten Todd will serve as advisors.

Cybersecurity investments so far this year are well below all-time highs.

Cybersecurity investments to date in 2023 are well below all-time highs. Venture funding to cybersecurity startups around the world fell more than 14% to $2.4 billion in the third quarter of 2023 from $2.8 billion in the same period last year, according to Pitchbook data shared with TechCrunch.

The number of deals completed in the most recent quarter also fell from 248 to 198.

Nevertheless, as the digital economy expands globally, cyber-attacks and online crimes are becoming more prevalent. Investors are also optimistic about the growth of cybersecurity startups and investments driven by significant advances in generative AI and cloud adoption.

Global Cybersecurity VC Funding 2020–23 by PitchBook

Image credits: pitch book data

Source: techcrunch.com