Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Threat Intelligence

9/21/2018
11:30 AM
100%
0%

US Approves Cyber Weapons Against Foreign Enemies

The White House is changing the rules on its use of digital weapons to fight adversaries targeting US networks.

The Trump administration has authorized the use of "offensive cyber operations" against foreign enemies, officials confirmed in a news briefing this week.

Its announcement aligns with a new, broader policy to relax the rules governing US use of cyber weapons to deter adversaries. The White House is worried about foreign governments targeting US networks, specifically around the November elections. Its latest strategy includes a presidential instruction that replaced a previous order from the Obama administration.

Now, the US military and government agencies can use cyber operations to protect the nation's systems and networks. National security advisor John Bolton, who confirmed the strategy this week, did not share the specifics of these operations or the attacks they are meant to deter.

Overall, the presidential directive allows the military to use tactics that fall below the "use of force" or those that would lead to "death, destruction or significant economic impacts," according to a Washington Post report. The government's strategy is very similar to the Obama administration's national cybersecurity action plan, which was introduced in 2016.

While some officials don't believe the new strategy is forceful enough, it does follow a series of cybersecurity-related efforts from the government this week. The Pentagon released a new strategy this week highlighting Russia and China as top US adversaries.

Read more details here.

 

Black Hat Europe returns to London Dec 3-6 2018  with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier security solutions and service providers in the Business Hall. Click for information on the conference and to register.

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
jcavery
50%
50%
jcavery,
User Rank: Moderator
9/26/2018 | 11:00:12 AM
Re: Unimpeded Attempts
As long as your attribution methods are rock-solid and you're attacking the right enemy, I agree. But I think we need better tools for attribution and identifying attackers before we get more aggressive in regard to cyber weapons.
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
9/24/2018 | 11:02:38 AM
Unimpeded Attempts
I'm in favor of utilizing cyber weapons against nefarious actors that are threatening the facets represented in the article. I'm a firm believer in defense not being enough in these scenarios, instead if you attack your attacker it forces them to react instead of allowing them time to re-adjust their tactics when you are constantly defending from their bombardment. 
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/2/2020
Ripple20 Threatens Increasingly Connected Medical Devices
Kelly Sheridan, Staff Editor, Dark Reading,  6/30/2020
DDoS Attacks Jump 542% from Q4 2019 to Q1 2020
Dark Reading Staff 6/30/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-9498
PUBLISHED: 2020-07-02
Apache Guacamole 1.1.0 and older may mishandle pointers involved inprocessing data received via RDP static virtual channels. If a userconnects to a malicious or compromised RDP server, a series ofspecially-crafted PDUs could result in memory corruption, possiblyallowing arbitrary code to be executed...
CVE-2020-3282
PUBLISHED: 2020-07-02
A vulnerability in the web-based management interface of Cisco Unified Communications Manager, Cisco Unified Communications Manager Session Management Edition, Cisco Unified Communications Manager IM & Presence Service, and Cisco Unity Connection could allow an unauthenticated, remote attack...
CVE-2020-5909
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, when users run the command displayed in NGINX Controller user interface (UI) to fetch the agent installer, the server TLS certificate is not verified.
CVE-2020-5910
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, the Neural Autonomic Transport System (NATS) messaging services in use by the NGINX Controller do not require any form of authentication, so any successful connection would be authorized.
CVE-2020-5911
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, the NGINX Controller installer starts the download of Kubernetes packages from an HTTP URL On Debian/Ubuntu system.