Category Archives: State Sponsored

How Russian hackers breached Microsoft’s network using password spraying

Microsoft has revealed that a state-sponsored Russian hacking group, known as Midnight Blizzard, accessed some of its corporate email accounts and stole some emails and documents from senior executives and employees working in security and legal teams. The breach, which occurred in late November 2023 and was discovered on January 12, 2024, was the result… Read More »

Cyber Espionage and International Law: Chinese State-Sponsored Cyber Activities

As technology advances, so does the intricacy and sophistication of cyber operations. This trend creates an urgent need for robust regulatory frameworks, particularly concerning international law and cyber activities. Recent episodes of state-sponsored cyber espionage, most notably those attributed to the Chinese Communist Party, have thrown this necessity into sharp relief. The spectrum of these… Read More »

Department of Defense Unveils 2023 Cyber Strategy to Safeguard the Nation

Introduction This week, the Department of Defense (DoD) delivered its highly anticipated classified 2023 DoD Cyber Strategy to Congress. This comprehensive strategy outlines the Department’s approach to operating in and through cyberspace, with the aim of safeguarding the American people and advancing the defense priorities of the United States. The strategy builds upon previous initiatives,… Read More »

Volt Typhoon targets US critical infrastructure with living-off-the-land techniques

Microsoft has detected stealthly and targeted malicious attacks that are primarily focused on the access of credentials and exploration of network systems following a successful compromise. These operations target essential infrastructure organisations in the United States and are orchestrated by Volt Typhoon, a China-based state sponsored actor , who engages in information gathering and espionage.… Read More »

Understanding “Living Off the Land” Techniques in Cybersecurity

Cyber threats have become more sophisticated and harder to detect. Among evolving cyber threats, one strategy stands out for its stealth and efficacy: the “Living Off the Land” (LOTL) technique. As the cyber threat landscape continues to evolve, understanding such tactics becomes paramount for businesses and individuals alike. What is Living Off the Land? In… Read More »