Cyberwatch Finland’s produced and published weekly reviews from April 2024 are available for reading & downloading (Below PDF’s).
Week 14: themed review: Information Warfare
- Information Warfare is Topical. Overview of Key Actors
- Russia – Successful or Unsuccessful Information Warfare?
- China – Information Warfare Superpower
- United States – The Goal of Controlling the Information Environment
Keywords: Information warfare, country examples, Russia, Propaganda, information security, information influencing, informationised warfare, information environment, Social media, troll profiles, China, Taiwan, information space, harmful digital information, United States, USA
Week 15:
- Who Is Responsible for Open Source Security
- Exploitation of Zero-Day Vulnerabilities on the Rise
- The Security Risks of a Public Wi-Fi Network Are Always Topical
Keywords: open-source code, XZ Utilis, open-source benefits, open-source pros and cons, Zero-day vulnerabilities, Barracuda Networks, MOVEit attack, Public Wi-Fi, VPN, Evil Twin attack method, Man-in-the-middle attacks
Week 16:
- Microsoft and Lacking Cybersecurity
- Weak Cybersecurity of Small Businesses
- Aukus Defence Cooperation May Expand in Asia
Keywords: Microsoft data breach, USA, CISA, Cybersecurity and Infrastructure Security Agency, Cyber Safety Review Board, SME, small and medium enterprises, SME weak cybersecurity, Aukus defence cooperation, Australia, the United Kingdom, Japan, China
Week 17:
- Mysterious Dark Web
- The Dark Side of Young People’s Online Behaviour
- Routers and Network Edge Devices as Threats
Keywords: dark Web, what is dark web, TOR-network, Youth Cybercrimes, cyber-assisted crimes, cyber-related crimes, Lapsus$ hacker group, router, routers, Network Edge device, Cyber threat Palo Alto Network
Week 18:
- Passwords and Brute Force Attacks
- Cyber Threats Are Highlighted in Health and Wellness Applications
- May Day Special – Unexpected Consequences of Cyberattacks
Keywords: password security, brute force attack, password protection, hash-value, verification method, Health and Wellness Applications, data collecting, personal data, healthcare actors, Polar data leak, May Day, cyberattack consequences