Remove 2009 Remove Accountability Remove Data collection
article thumbnail

TOP 10 unattributed APT mysteries

SecureList

It was active in the wild for at least for eight years—from 2009 to 2017—and targeted at least 20 civilian and military entities in Syria, Iran, Afghanistan, Tanzania, Ethiopia, Sudan, Russia, Belarus, and the United Arab Emirates. DarkUniverse. DarkUniverse is another APT framework we discovered and reported on in 2018.

Malware 145
article thumbnail

Top VC Firms in Cybersecurity of 2022

eSecurity Planet

Founded in 2009, a16z already has an extensive track record of success, investing in over 500 companies and producing 160 exits. Formerly located in Cambridge, Massachusetts, Greylock migrated headquarters to Menlo Park, California, in 2009. Insight Partners. Also read : Top Cyber Insurance Companies.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Who is the Network Access Broker ‘Wazawaka?’

Krebs on Security

In 2014, Wazawaka confided to another crime forum member via private message that he made good money stealing accounts from drug dealers on these marketplaces. “I used to steal their QIWI accounts with up to $500k in them,” Wazawaka recalled. That last domain was originally registered in 2009 to a Mikhail P.

DDOS 335
article thumbnail

How AI Could Write Our Laws

Schneier on Security

Consider, for example, a 2013 Massachusetts bill that tried to restrict the commercial use of data collected from K-12 students using services accessed via the internet. But having them on the record about their intentions would at least provide a baseline for accountability. Political scientist Amy McKay coined the term.

article thumbnail

‘Unpacking’ technical attribution and challenges for ensuring stability in cyberspace

SecureList

However, the only actors that deliver the entire narrative of a cyberattack – discussing accountability and international law – are nation states. Cyber attribution is a necessary step to accountability in cyberspace. [2] within network activity logs collected by the Internet Service Provider (ISP), etc.).