The most recent articles from the Strike Source team.
THE RUNDOWN In the summer of 2022, European Commission President Ursula von der Leyen traveled to Baku to ratify a memorandum of understanding between Azerbaijan and the European Union. The agreement was the first of several signed documents that deepened the Transcaucasian state’s cooperation with Brussels. Set against the backdrop of the Russian invasion of […]
THE RUNDOWN Command-and-control (C2) servers are among the most valuable tools in a threat actor’s arsenal, enabling them to control tens of thousands of remote computers, from anywhere in the world. Entering cyberspace in the 90s, C2s have rapidly evolved over the past two and a half decades. What were once simple Internet Relay Chat […]
THE RUNDOWN Dogs of the West are ready to kill. This is a brief summary of the Russian headlines that sprung and spread like wildfire across Russian media outlets on August 16. Just a few days prior to the death of Yevgeny Prigozhin, the infamous head of Wagner mercenaries, the largest Russian news agencies—TASS, RIA […]
THE RUNDOWN This photo was retrieved by Strike Source from a VK page highlighting a donation to Russian forces in Ukraine. The caption on the photo is “Continue to help the front and the administration of the city of Orel. With the support of the Social Cluster, the humanitarian cargo was delivered to our fellow artillerymen, who […]
THE RUNDOWN Rocking headlines earlier this year, a Chinese-backed hacking group known as Volt Typhoon managed to breach a number of U.S. critical infrastructure facilities and position themselves for what could have been immensely destructive attacks. Now, another China-based group, Flax Typhoon, has been identified by Microsoft. Operating on a lower level of sophistication but […]
THE RUNDOWN At the end of July 2023, the White House released its National Cyber Workforce and Education Strategy, a high-level blueprint for the United States to develop its cyber professionals as well as advance an education plan to keep up with the fervent pace of technological change. The strategy focuses on four key pillars […]