home bbs files messages ]

Just a sample of the Echomail archive

Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.

   CONSPRCY      How big is your tinfoil hat?      2,445 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 1,392 of 2,445   
   Mike Powell to All   
   As political violence man   
   16 May 25 08:49:00   
   
   TZUTC: -0500   
   MSGID: 1125.consprcy@1:2320/105 2c8c8057   
   PID: Synchronet 3.20a-Linux master/acc19483f Apr 26 202 GCC 12.2.0   
   TID: SBBSecho 3.20-Linux master/acc19483f Apr 26 2024 23:04 GCC 12.2.0   
   BBSID: CAPCITY2   
   CHRS: ASCII 1   
   As political violence manifests through cyber attacks, companies must prepare   
      
   Date:   
   Thu, 15 May 2025 14:27:56 +0000   
      
   Description:   
   "Old vs. new tech," reliance on technology, geopolitical instability increase   
   cyber threat, according to Allianz.   
      
   FULL STORY   
   ======================================================================   
      
   The Allianz Risk Barometer, an annual report detailing the risks businesses   
   are most concerned about for the year ahead, has seen companies rank    
   political risks and violence as a top 10 global risk for the past three    
   years. Businesses concerns have been exacerbated by 2024s record-breaking   
   number of elections, the developing conflict in the Middle East, and ongoing   
   war in Ukraine.    
      
   The negative impact of political violence on companies can manifest in many   
   ways, from endangering employee and customer safety to operational    
   disruptions caused by material damage to premises or assets. As technology   
   advances, uncertainty grows, and political tensions remain high around the   
   world, businesses must consider their vulnerabilities, particularly in the   
   cyber realm.    
      
   According to Allianz Commercials new Political Violence and Civil Unrest   
   Trends 2025 report, cyber breaches represent one important way that political   
   violence activity can impact businesses. This years report identified a key   
   trend: that new tech versus old tech has increased the threat of rogue   
   state-triggered damage and disruption, alongside increased reliance on   
   technology around the world and ongoing instability in the geopolitical   
   landscape. Addressing areas of vulnerability will be essential as companies   
   grow operations in an increasingly volatile cyber environment.   
      
   New tech, new threats   
      
   Advances in technology and global connectivity have increased production and   
   dissemination of misinformation and disinformation. To sow discord, Advanced   
   Persistent Threat (APT) actors, which are usually sponsored by rogue nations   
   or organizations, leverage cyber-attacks to disseminate false information,   
   using techniques such as manipulated online news platforms and compromised   
   social media accounts to instigate real-world events such as aggravating   
   political polarization, promoting social unrest and riots and undermining   
   democratic elections.    
      
   APT groups often engage in sophisticated cyber espionage, such as in the case   
   of the Southport attacks and subsequent far-right riots during 2024 in the    
   UK, which spread disinformation and caused social disruption.    
      
   Increased digital reliance and geopolitical instability are also heightening   
   the risk of cyber-attacks that inflict physical harm at the same time.   
      
   Exposures in critical infrastructure    
      
   Critical infrastructure, including energy, transportation, and manufacturing,   
   faces growing vulnerability to disruptions, equipment damage, and threats to   
   human safety via cyber means.    
      
   To manage physical processes at these large installations, complex Industrial   
   Control Systems (ICS) or operational technology (OT) systems are used for   
   control and monitor purpose. Typically, these systems are legacy in nature    
   and have obsolescence issues. That means they are vulnerable to attacks that   
   can disrupt physical processes which can lead to potentially hazardous   
   scenarios. For example, in refinery operations manipulation of ICS and safety   
   systems can lead to catastrophic fire, explosions and can cause major   
   environmental damage due to hydrocarbon releases.    
      
   Utility companies, too, depend extensively on OT systems. The prevalence of   
   outdated, internet-unsecured devices within such networks poses a major   
   security challenge due to infrequent updates. The utility sectors cyber   
   security weaknesses render it highly vulnerable. Exploiting   
   internet-accessible OT and ICS devices, including those in the wastewater and   
   water sectors could affect millions of people, with potentially severe   
   consequences for public health and safety.    
      
   The vulnerability of transportation systems to cyber threats also raises   
   critical concerns regarding the potential for cyber-physical attacks to cause   
   tangible damage. While modern aircraft possess strong security protocols,   
   vulnerabilities within airport infrastructure, including baggage handling and   
   air traffic control, present a tangible risk of physical damage stemming from   
   cyberattacks. Cyber-attacks targeting other transportation infrastructure    
   also pose a significant risk of physical damage, with disruptions to    
   signaling systems capable of triggering collisions or derailments. In August   
   2023, a cyber-attack on Polands railway system, where hackers manipulated   
   unsecured radio signals to activate emergency train stops, demonstrates the   
   susceptibility of outdated infrastructure to digital threats.   
      
   Addressing cyber vulnerabilities   
      
   Assessing the robustness of cybersecurity for key infrastructure demands a   
   multi-faceted approach. Companies should engage with their insurance    
   providers through cyber risk dialogue to discuss potential threats to the   
   industry, as well as the insureds weaknesses in people, technology and   
   processes. Beyond traditional IT defenses, evaluations also include   
   scrutinizing vulnerabilities, including legacy systems which are often   
   ill-equipped for modern cyber threats, as well as an end-to-end assessment of   
   the insureds value chain.    
      
   Key weaknesses often reside in unpatched, poorly secured legacy systems, and   
   the convergence of IT and OT networks. Supply chain vulnerabilities,   
   inadequate incident response plans, and a lack of robust security awareness   
   training further exacerbate these risks. Human error, particularly in access   
   management and patching protocols, remains a significant entry point for   
   malicious actors.    
      
   The convergence of Artificial Intelligence , social media, phishing, and   
   Business Email Compromise attacks creates a potent and evolving threat   
   landscape. These technologies are being weaponized to create more convincing   
   and effective cyber-attacks.    
      
   How an organization will recover and maintain critical functions during and   
   after a disruption is key. A robust business continuity plan encompasses a   
   business impact analysis to pinpoint critical functions, defined recovery   
   strategies and procedures, clear communication protocols, reliable data    
   backup and recovery systems, flexible alternative work arrangements, and   
   regularly conducted testing and exercises. Comprehensive audits encompass   
   physical security, incident response protocols, and supply chain resilience.   
   Regular penetration testing and threat intelligence integration are also   
   crucial for identifying and mitigating emerging risks, ensuring the    
   continuous protection of essential services.    
      
    This article was produced as part of TechRadarPro's Expert Insights channel   
   where we feature the best and brightest minds in the technology industry   
   today. The views expressed here are those of the author and are not   
   necessarily those of TechRadarPro or Future plc. If you are interested in   
   contributing find out more here:   
   https://www.techradar.com/news/submit-your-story-to-techradar-pro   
      
   ======================================================================   
   Link to news story:   
   https://www.techradar.com/pro/as-political-violence-manifests-through-cyber-at   
   tacks-companies-must-prepare   
      
   $$   
   --- SBBSecho 3.20-Linux   
    * Origin: capitolcityonline.net * Telnet/SSH:2022/HTTP (1:2320/105)   
   SEEN-BY: 105/81 106/201 128/187 129/14 305 153/7715 154/110 218/700   
   SEEN-BY: 226/30 227/114 229/110 111 114 206 300 307 317 400 426 428   
   SEEN-BY: 229/470 664 700 705 266/512 291/111 320/219 322/757 342/200   
   SEEN-BY: 396/45 460/58 712/848 902/26 2320/0 105 3634/12 5075/35   
   PATH: 2320/105 229/426   
      

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca