Cyber risks contributed by your supply chain

There is nothing new about the risk of cyber-attacks on IT and Industrial Control Systems (ICS). About a decade ago, people believed that cyber-attacks can only be launched through the internet and adopted the principle of air-gap-isolated systems. The famous Stuxnet attack (2010) was the first strong indication that cyber-attack on IT and ICS (known as Operation Technology- OT) organizations can be also launched internally after the adversary entered your facility.

A hacker tried selling stolen military drone documents for $200

Researchers at the cybersecurity firm Recorded Future recently released a report about one of its more interesting findings. 

While scouring the hacker forums on the dark web, the firm’s analysts discovered someone selling MQ-9 Reaper drone documents — maintenance books, training guides, and a list of airmen assigned to the military drone. The hacker was looking for $150-200 for the documentation.