<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Russian Hacking in Threats</title>
    <link>https://community.isc2.org/t5/Threats/Russian-Hacking/m-p/42125#M219</link>
    <description>&lt;P&gt;Regardless of motive, doing so is likely illegal, under U.S. and some foreign laws, and could result in civil and/or criminal liability.” What makes hacking back “likely illegal” is the Computer Fraud and Abuse Act.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT size="1 2 3 4 5 6 7"&gt;&lt;A href="https://www.mygreatlakes.me/" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;&lt;FONT color="#FFFFFF"&gt;Great Lakes Login&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;/FONT&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 06 Jan 2021 11:24:22 GMT</pubDate>
    <dc:creator>Richardds</dc:creator>
    <dc:date>2021-01-06T11:24:22Z</dc:date>
    <item>
      <title>Russian Hacking</title>
      <link>https://community.isc2.org/t5/Threats/Russian-Hacking/m-p/42106#M210</link>
      <description>&lt;P&gt;Insider threats run deep throughout corporate America and the developer community across the globe. What makes supply chain compromises so fascinating is the patience that these subterranean foreign controlled agents have and their cloaking mechanisms. Thanks to FireEye we at least have a better understanding of the C2 (&lt;A href="https://www.fireeye.com/blog/threat-research/2020/12/sunburst-additional-technical-details.html" target="_blank" rel="noopener"&gt;description here&lt;/A&gt;). The Russian S.V.R will continue to target the weakest links and move laterally to their targets across all industry sectors. What happened with Solarwinds is not just an intelligence failure, but a failure of cybersecurity tools to identify, protect, and respond in real-time. Why are we so complacent with that? The New York Times has an excellent piece &lt;A href="https://www.nytimes.com/2021/01/02/us/politics/russian-hacking-government.html?action=click&amp;amp;module=Top%20Stories&amp;amp;pgtype=Homepage" target="_blank" rel="noopener"&gt;here&lt;/A&gt;&amp;nbsp;that will get you thinking about who you trust.&lt;/P&gt;</description>
      <pubDate>Mon, 09 Oct 2023 09:44:42 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/Russian-Hacking/m-p/42106#M210</guid>
      <dc:creator>AppDefects</dc:creator>
      <dc:date>2023-10-09T09:44:42Z</dc:date>
    </item>
    <item>
      <title>Re: Russian Hacking</title>
      <link>https://community.isc2.org/t5/Threats/Russian-Hacking/m-p/42125#M219</link>
      <description>&lt;P&gt;Regardless of motive, doing so is likely illegal, under U.S. and some foreign laws, and could result in civil and/or criminal liability.” What makes hacking back “likely illegal” is the Computer Fraud and Abuse Act.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT size="1 2 3 4 5 6 7"&gt;&lt;A href="https://www.mygreatlakes.me/" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;&lt;FONT color="#FFFFFF"&gt;Great Lakes Login&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 06 Jan 2021 11:24:22 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/Russian-Hacking/m-p/42125#M219</guid>
      <dc:creator>Richardds</dc:creator>
      <dc:date>2021-01-06T11:24:22Z</dc:date>
    </item>
  </channel>
</rss>

