The controversial American security firm CrowdStrike, which was called in to investigate the alleged Russian hack of DNC servers in 2016, had no proof that any emails from the system had been exfiltrated despite public assertions that this had occurred, according to the transcript of an interview released by the US Government a few days ago.
Security firm CrowdStrike is touting for more business, beyond its base in the US. That's probably why the company has put out a mid-year threat report which mostly contains details of tactics, techniques and procedures.
Controversial American security firm CrowdStrike did not provide an unredacted or final report to the FBI after it was called in to examine the servers at the Democratic National Committee that were hacked in 2016 and which led to claims of Russian interference in the US presidential election of the same year.
US security firm CrowdStrike has issued its annual Global Threat Report about cyber threats and their incidence, but the 75-page document contains no mention of any American state-based malware, otherwise known as APTs or advanced persistent threats.
Security firm CrowdStrike appears to be trying to adopt a "business as usual" mode as it tries to make the world at large forget its role in one of the most publicised hacks of modern times: the breach of servers of the Democrat National Committee in 2016.
The latest round of "Russia hacked the DNC" claims has arrived in the form of a jailed Russian who claims to have left proof on the Democrat National Committee's server that he was behind the hack, which, he claims, was done at the behest of Russia's FSB.
ANALYSIS The current reds-under-the-beds scare in the US is increasingly being sold by the media, with unproven claims often being paraded as fact. A prime case of this was seen recently when the Associated Press claimed that the group that had allegedly targeted Hillary Clinton last year had also been hacking many other foes of the Russian state.
Russian security firm Kaspersky Labs may have put itself squarely in the crosshairs of the lobby promoting the theory that Russia hacked the Democratic National Committee in 2016, by producing a paper that underscores the difficulty of attribution where cyber exploits are concerned.
Two former senior US intelligence officials claim that evidence, if any, of Russian interference in the US elections last year would still be available in NSA databases.
Security companies in the US tend to see a Russian hand in everything these days. The latest firm to come up with a Russian bogeyman is FireEye, which issued a report last week, claiming with "moderate confidence" that a campaign against the hospitality sector was being run by APT28, a group that FireEye claims is sponsored by the Russian Government.
Cyber security firms appear to be tailoring their research to help one side of politics or the other in the US in pursuit of their respective enemies of the day, judging by the recent attempt by two prominent firms to lay the blame for the WannaCry ransomware attack on North Korea.
Most cybersecurity is making up for weak platforms. We need to address the fundamentals, design platforms that prevent out-of-bounds access[…]
For most developers the security/performance trade off is still the hardest one to tackle, even as the cost of processing[…]
RISC has been overhyped. While it is an interesting low-level processor architecture, what the world needs is high-level system architectures,[…]
There are two flaws that are widespread in the industry here. The first is that any platform or language should[…]
Ajai Chowdhry, one of the founders and CEO of HCL is married to a cousin of a cousin of mine.[…]