IPSE'S AUTHORS LAST 24h
Check all the Authors in the last 24h
IPSEs IN THE LAST 24H
  • Dmitry Peskov
    Dmitry Peskov “On the Ukrainian side, the panic is growing on the frontline. And this is first-hand information that there, on that side, the panic is growing. It is very important for us now to maintain this dynamics. It is very important not to stop and continue fulfilling [the tasks of the special military operation].” 1 hour ago
  • Oleksandr Syrskyi
    Oleksandr Syrskyi “In general, the enemy achieved certain tactical successes in these areas [villages of Berdychi and Semenivka, north of Avdiivka, and Novomykhailivka, near the town of Maryinka], but could not gain operational advantages.” 1 hour ago
  • Rina Shah
    Rina Shah “Protests in US universities are a display of democracy in action, a welcome sight in an election year marked by concerns of voter apathy chiefly due to Israel's war on Gaza. So when I see a movement like this of students taking peaceful, non-violent action and expressing their concern about the US government backing of Israel, of where our tax money is going, I think that's extremely healthy. These students are out there concerned about America's role in backing Benjamin Netanyahu. On the one hand, we are supplying weapons and funds to do what he wants to do in Gaza, while on the other we are sending humanitarian aid to Gaza. This is the hypocrisy these students are concerned about.” 17 hours ago
  • Thomas Friedman
    Thomas Friedman “But revenge is not a strategy. It is pure insanity that Israel is now more than six months into this war and the Israeli military leadership - and virtually the entire political class - has allowed Netanyahu to continue to pursue a 'total victory' there, including probably soon plunging deep into Rafah, without any exit plan or Arab partner lined up to step in once the war ends. If Israel ends up with an indefinite occupation of both Gaza and the West Bank, it would be a toxic military, economic and moral overstretch that would delight Israel's most dangerous foe, Iran, and repel all its allies in the West and the Arab world.” 17 hours ago
  • Volodymyr Zelenskiy
    Volodymyr Zelenskiy “Of course, I'm grateful to all of our partners who have helped us with air defence: each air defence system and each air defence missile is literally saving lives. It's important that everything works out as quickly as possible: every new agreement with our partners to strengthen our air defence, every initiative from Ukraine's friends to help us, particularly with finding and supplying Patriot [anti-aircraft missile systems]. Ukraine needs at least seven [Patriot] systems. Our partners have these Patriots. Russian terrorists can see that unfortunately our partners aren't as determined to protect Europe from terror as they are to do so in the Middle East. But [our partners] can give us the air defence systems that we need. We mustn't waste time: we need to signal determination.” 21 hours ago
View All IPSEs inserted in the Last 24h
NEW CONTEXTS IN THE LAST 24H
  • No New Contexts inserted in the last 24 hours
View All New Contexts inserted in the last 24h

Hackers and cybersecurity

Page with all the IPSEs stored in the archive related to the Context Hackers and cybersecurity.
The IPSEs are presented in chronological order based on when the IPSEs have been pronounced.

“This one [Chinese efforts to steal U.S. technology] blew me away. And I'm not the kind of guy that uses words like 'blown away' easily. The FBI is opening a new China related counter-intelligence investigation on average every 12 hours, with over 2,000 such cases currently underway. There is no country that presents a broader, more severe threat to our innovation, our ideas and our economic security than China does. The scale of their hacking program, and the amount of personal and corporate data that their hackers have stolen, is greater than every other country combined.”

author
FBI director
Read More

“Iranian hackers had identified a failure in Israeli understanding about cyber conflict. They realized that they do not need to attack a government agency, which is much more protected, but could easily attack small, private companies, with less sophisticated security, that control enormous amounts of information, including financial or intimate personal information about many citizens.”

author
Head of intelligence at the cybersecurity company Check Point
Read More

“We need to reduce the blast radius. We need to manage the battlefield. Cyberattacks on chip manufacturers are on the rise. There's a lot that can be done ... to not only prevent attacks but to mitigate them as they happen. Companies can limit the blast radius by setting up choke points throughout the network that isolate the spread of the attack and protect the core assets. For example, take semiconductors, we don't mind as much if someone reads someone's emails. What we want is to stop them gaining access to the assets that produce the wafers. This is done by anticipating the hacker's next move. We want to identify them, hunt them, and eradicate them without impacting operations. We can actually lure the threat actor to waste time in a different network segment where we can do no harm while we shore up defenses around the core assets.”

author
Vice President of Enterprise Security at Sygnia, a Tel Aviv-based cybersecurity firm
Read More

“This recent activity is another indicator that Russia is trying to gain long-term, systematic access to a variety of points in the technology supply chain and establish a mechanism for surveilling - now or in the future - targets of interest to the Russian government. Fortunately, we have discovered this campaign during its early stages, and we are sharing these developments to help cloud service resellers, technology providers, and their customers take timely steps to help ensure Nobelium is not more successful.”

author
Report by Microsoft
Read More

“Some member states observed malicious cyberactivities, collectively designated as Ghostwriter, and associated these with the Russian state. Such activities are unacceptable as they seek to threaten our integrity and security, democratic values and principles, and the core functioning of our democracies. The Ghostwriter cybercampaign has targeted numerous members of parliaments, government officials, politicians, and members of the press and civil society in the EU, with the hackers accessing computer systems and personal accounts and stealing data.”

author
EU High Representative for Foreign Affairs and Security Policy
Read More

“What you saw here was real recklessness. The Hafnium attack on Exchange [Microsoft Exchange] was in complete contrast to the Russian exploitation of SolarWinds software for espionage purposes. In that case there was no collateral damage - but as for Hafnium when they realised they had been caught, the hackers booby-trapped the software on the way out.”

author
Professor of Practice and former CEO of the UK’s National Cyber Security Centre
Read More

“The reality is, most of our critical infrastructure is owned and operated by the private sector, and the federal government can't meet this challenge alone. I've invited you all [business and government leaders] here today because you have the power and the capacity and responsibility, I believe, to raise the bar on cybersecurity. And so, ultimately, we've got a lot of work to do.”

author
President of the United States
Read More

“I think it's more than likely we're going to end up, if we end up in a war - a real shooting war with a major power - it's going to be as a consequence of a cyber breach of great consequence and it's increasing exponentially, the capabilities.”

author
President of the United States
Read More

“China has long sought asymmetrical areas where they could exert influence in a way that didn't challenge US predominance and preeminence… It takes a lot of money, time and know-how to build a modern navy, but in cyberspace there's a lower threshold for having an impact.”

author
Chinese foreign and security policy analyst with the Center for Strategic and International Studies
Read More

“The Chinese government, not unlike the Russian government, is not doing this [cyber hacking] themselves, but are protecting those who are doing it and maybe even accommodating them being able to do it.”

author
President of the United States
Read More

“These attacks appear to be a continuation of multiple efforts by Nobelium [hacking group] to target government agencies involved in foreign policy as part of intelligence gathering efforts. This is yet another example of how cyberattacks have become the tool of choice for a growing number of nation-states to accomplish a wide variety of political objectives.”

author
Microsoft Vice President
Read More

“All organizations should really sit up and take notice and make urgent investments to make sure that they're protecting their networks against these threats [ransomware attacks].”

author
CISA’s (U.S. Department of Homeland Security's cyber arm) executive assistant director for cybersecurity
Read More

“Ransomware is absolutely out of control and one of the biggest threats we face as a nation. The problem we face is most companies are grossly underprepared to face these threats.”

author
Founder and senior principal security consultant at TrustedSec
Read More

“Unfortunately, these sorts of attacks [ransomware attacks] are becoming more frequent. We have to work in partnership with business to secure networks to defend ourselves against these attacks.”

author
US Secretary of Commerce
Read More

“Cybersecurity vulnerabilities have become a systemic issue. Unless cybersecurity measures are embedded in a technology's development phase, we are likely to see more frequent attacks on industrial systems like oil and gas pipelines or water treatment plants.”

author
Cyber strategy lead at the World Economic Forum's Centre for Cybersecurity
Read More

“When we’re not engaged, when we don’t lead, then one of two things happen: either some other country tries to take our place, but probably not in a way that advances our interests or values. Or no one does, and then you get chaos. Either way, that does not serve the American people. We’ll engage the world not as it was, but as it is. A world of rising nationalism, receding democracy, growing rivalry with China, Russia, and other authoritarian states, mounting threats to a stable and open international system, and a technological revolution that is reshaping every aspect of our lives, especially in cyberspace.”

author
U.S. Secretary of State chosen by President-elect Joe Biden
Read More

“The Cyber Hack is far greater in the Fake News Media than in actuality. Russia, Russia, Russia is the priority chant when anything happens because Lamestream is, for mostly financial reasons, petrified of discussing the possibility that it may be China (it may!).”

author
President of the United States
Read More

“I can't say much more as we're still unpacking precisely what it is, and I'm sure some of it will remain classified. This was a very significant effort, and I think it's the case that now we can say pretty clearly that it was the Russians that engaged in this activity.”

author
U.S. Secretary of State
Read More

“Based on my 25 years in cyber security and responding to incidents, I’ve concluded we are witnessing an attack by a nation with top-tier offensive capabilities. This attack is different from the tens of thousands of incidents we have responded to throughout the years. The attackers tailored their world-class capabilities specifically to target and attack FireEye. They are highly trained in operational security and executed with discipline and focus. They operated clandestinely, using methods that counter security tools and forensic examination. They used a novel combination of techniques not witnessed by us or our partners in the past.”

author
FireEye Chief Executive Officer
Read More
IPSEs by Author
IPSEs by Country
arrow