Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Threat Intelligence

9/21/2018
11:30 AM
100%
0%

US Approves Cyber Weapons Against Foreign Enemies

The White House is changing the rules on its use of digital weapons to fight adversaries targeting US networks.

The Trump administration has authorized the use of "offensive cyber operations" against foreign enemies, officials confirmed in a news briefing this week.

Its announcement aligns with a new, broader policy to relax the rules governing US use of cyber weapons to deter adversaries. The White House is worried about foreign governments targeting US networks, specifically around the November elections. Its latest strategy includes a presidential instruction that replaced a previous order from the Obama administration.

Now, the US military and government agencies can use cyber operations to protect the nation's systems and networks. National security advisor John Bolton, who confirmed the strategy this week, did not share the specifics of these operations or the attacks they are meant to deter.

Overall, the presidential directive allows the military to use tactics that fall below the "use of force" or those that would lead to "death, destruction or significant economic impacts," according to a Washington Post report. The government's strategy is very similar to the Obama administration's national cybersecurity action plan, which was introduced in 2016.

While some officials don't believe the new strategy is forceful enough, it does follow a series of cybersecurity-related efforts from the government this week. The Pentagon released a new strategy this week highlighting Russia and China as top US adversaries.

Read more details here.

 

Black Hat Europe returns to London Dec 3-6 2018  with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier security solutions and service providers in the Business Hall. Click for information on the conference and to register.

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
jcavery
50%
50%
jcavery,
User Rank: Moderator
9/26/2018 | 11:00:12 AM
Re: Unimpeded Attempts
As long as your attribution methods are rock-solid and you're attacking the right enemy, I agree. But I think we need better tools for attribution and identifying attackers before we get more aggressive in regard to cyber weapons.
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
9/24/2018 | 11:02:38 AM
Unimpeded Attempts
I'm in favor of utilizing cyber weapons against nefarious actors that are threatening the facets represented in the article. I'm a firm believer in defense not being enough in these scenarios, instead if you attack your attacker it forces them to react instead of allowing them time to re-adjust their tactics when you are constantly defending from their bombardment. 
More SolarWinds Attack Details Emerge
Kelly Jackson Higgins, Executive Editor at Dark Reading,  1/12/2021
Vulnerability Management Has a Data Problem
Tal Morgenstern, Co-Founder & Chief Product Officer, Vulcan Cyber,  1/14/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-22850
PUBLISHED: 2021-01-19
HGiga EIP product lacks ineffective access control in certain pages that allow attackers to access database or perform privileged functions.
CVE-2021-22851
PUBLISHED: 2021-01-19
HGiga EIP product contains SQL Injection vulnerability. Attackers can inject SQL commands into specific URL parameter (document management page) to obtain database schema and data.
CVE-2021-22852
PUBLISHED: 2021-01-19
HGiga EIP product contains SQL Injection vulnerability. Attackers can inject SQL commands into specific URL parameter (online registration) to obtain database schema and data.
CVE-2021-3178
PUBLISHED: 2021-01-19
** DISPUTED ** fs/nfsd/nfs3xdr.c in the Linux kernel through 5.10.8, when there is an NFS export of a subdirectory of a filesystem, allows remote attackers to traverse to other parts of the filesystem via READDIRPLUS. NOTE: some parties argue that such a subdirectory export is not intended to preven...
CVE-2021-3177
PUBLISHED: 2021-01-19
Python 3.x through 3.9.1 has a buffer overflow in PyCArg_repr in _ctypes/callproc.c, which may lead to remote code execution in certain Python applications that accept floating-point numbers as untrusted input, as demonstrated by a 1e300 argument to c_double.from_param. This occurs because sprintf i...