-
Technology & National Security Reflection Series Paper 10: International Responsibility for Hacker-for-Hire Operations: The BellTrox Problem
Anmol Dhawan* About the Author: The author is a 2021 graduate of National Law University, Delhi. Editor’s Note: This post is part of the Reflection Series showcasing exceptional student essays from CCG-NLUD’s Seminar Course on Technology & National Security Law. In the present essay, the author’s contribution serves as an adapted reflection to the following…
-
Introducing the Reflection Series on CCG’s Technology and National Security Law and Policy Seminar Course
In February 2022, CCG-NLUD will commence the latest edition of its Seminar Course on Technology and National Security Law and Policy (“the Seminar Course”). The Seminar Course is offered to interested 4th and 5th year students who are enrolled in the B.A. LL.B. (Hons.) programme at the National Law University, Delhi. The course is set…
-
Technology and National Security Law Reflection Series Paper 5: Legality of Cyber Weapons Under International Law
Siddharth Gautam* About the Author: The author is a 2020 graduate of National Law University, Delhi. Editor’s note: This post is part of the Reflection Series showcasing exceptional student essays from CCG-NLUD’s Seminar Course on Technology & National Security Law. In the present essay, the author reflects upon the following question: What are cyber weapons?…
-
Google’s Willow Quantum Chip and Its Potential Threat to Current Encryption Standards
Introduction: Google’s recent announcement of their Willow quantum processor marks a significant advancement in quantum computing technology while raising questions about the security and sustainability of current encryption methods. As quantum computers grow more powerful, cybersecurity experts grow increasingly concerned about their potential to break widely used encryption standards that protect sensitive data worldwide. Quantum…
-
US Treasury Department Sanctions Chinese Company Over Cyberattacks
From the Washington Post: The sanctions target Beijing Integrity Technology Group, which U.S. officials say employed workers responsible for the Flax Typhoon attacks which compromised devices including routers and internet-enabled cameras to infiltrate government and industrial targets in the United States, Taiwan, Europe and elsewhere. From the Washington Post: The sanctions target Beijing Integrity Technology…
-
How New Year Traffic Stresses Your Cloud Security (And What to Do About It)
The New Year is here — a time for fresh beginnings, renewed goals, and ambitious business plans. However, it’s also a period where cybercriminals remain active, exploiting vulnerabilities that arise during high-traffic events and transitions into the new calendar year. While your focus is on starting the year strong and setting goals for growth, hackers…
-
Critical Dell SupportAssist Vulnerability (CVE-2024-52535) Exploited
Dell announced a critical security vulnerability affecting its SupportAssist software, widely used for system diagnostics and updates on Dell PCs. Identified as CVE-2024-52535, this flaw poses significant risks to cybersecurity experts and end-users. Understanding the Vulnerability Dell SupportAssist versions up to 4.6.1 for Home PCs and up to 4.5.0 for Business PCs contain a symbolic…
-
Palo Alto PAN-OS Severe Vulnerability (CVE-2024-3393) Exploited
Palo Alto announced a critical security vulnerability affecting its PAN-OS software. PAN-OS is the operating system developed by Palo Alto Networks for its network security devices, which is used to provide advanced security features.The vulnerability tracked as CVE-2024-3393 can cause a denial of services (DoS) condition on susceptible devices. Understanding the Vulnerability Rated as High,…