Nextgov: Cyber threats are not always made using the most innovative tools. Even very sophisticated advanced persistent threat groups with access to zero days, such as the Russian group APT28 behind the Democratic National Committee compromise and the Chinese group behind the Office of Personnel Management breach, mostly infiltrate their targets via simple spear-phishing and social-engineering techniques.
The recent distributed denial-of-service attack on Dyn DNS that destabilized and interrupted a portion of the internet in October 2016—brought about by a botnet comprised of internet of things-enabled devices—highlighted the nexus of longstanding, relatively unsophisticated threat vectors and emerging technologies.
The most significant government policy, business, and technology news and analysis delivered to your inbox.
Subscribe Nowi360Gov is an intelligent network of websites and e-newsletters that provides government business, policy and technology leaders with a single destination for the most important news and analysis regarding their agency strategies and initiatives.
Telephone: 202.760.2280
Toll Free: 855.i360.Gov
Fax: 202.697.5045
The most significant government policy, business, and technology news and analysis delivered to your inbox.
Subscribe Now