SlideShare a Scribd company logo
Cybersecurity winter is not coming…
Cybersecurity winter is already here.
WARNING, THIS ARTICLE CONTAINS SPOILERS.
If we were to look back at some of the most important cyberattacks and cyber-risks that occurred so far in 2016,
a mid-year review would very closely resemble Game of Thrones: full of conspiracies, betrayals, shameless
pretend-to-be friends and unexpected turns of events – we might even end up believing that the cyber-world
served as an inspiration for George R. Martin.
JANUARY: hacktivists and cyber-terrorists, plot masters
The beginning of this year was marked by a strong growth in hacktivism. According to Hackmageddon, 27.7%
of the overall cyber-attacks recorded in January were related to political or religious beliefs. The attack that got
the ball rolling: Anonymous versus the Thai police. Seeing how the local police of Thailand had unfairly sentenced
to death two foreigners for the murder of a pair of British tourists, Anonymous immediately blocked all access
to its website, leaving a single message on the home page: “Failed law. We want justice. #BoycottThailand “.
While this may somehow seem “fair”, we also find a large number of cyber-terrorists (clearly Valar
Morghulis advocates) hiding among these hacktivists. As any other community, cyber-terrorists have become
increasingly more organized (read our previous article on hacking business models here), putting their
technological know-how at the disposal of general disorder. Stingier than the plot masters of Westeros, without
any regard for existing criminal or moral laws, nothing can come in their way when it comes to achieving their
goals.
FEBRUARY: a wall cannot protect you against malware
The cyber-heist of the Central Bank of Bangladesh shook the financial sector to its core when a group of
hackers managed to steal $ 81 million (approximately € 71.5 million) without anyone even noticing. Debts
were certainly paid. The case became even more controversial when the details of the attack were published,
announcing that the international financial institution in question had not previously installed a firewall.
Cybersecurity experts from around the world lost it that day. Although a single “wall” would not have been
enough to keep the outsiders at bay (read our article on the limitations of a firewall here), it still is a basic
cybersecurity measure. As hackers’ favorite target, banking organizations should be the first ones to set up a
« shield » against external threats. Otherwise, nothing can prevent the wildings from coming in through the
front door.
MARCH: ransomware or the Ramsey Bolton of digital extortion
A month after the Hollywood Presbyterian Medical Center agreed to pay the ransom in order to unlock its
system and resume its activity (a rather important activity taking into account the “public”), hackers declared
opened the hunting season on US healthcare institutions. In March, MedStar Health went through a typical
“Boltonian” experience in digital torture when its network, linking together ten hospitals, was infected by a
ransomware (read our article on data hostage situations here).
Another lesson we learned that month: paying a ransom does not guarantee that hackers will keep their word.
Rickon should have probably read this article before placing his trust in Ramsey, don’t you
think? #PoorRickon
APRIL: an Apple backdoor will not hold without Hodor
After the shooting of San Bernardino, the FBI came into possession of one of the iPhones used by the
terrorists and asked Apple to develop a new version of its iOS (read our article on the FBiOS here), which
would enable them to bypass some key security features of the iPhone. And what do you think the CEO of
Apple replied? No backdoor without Hodor. No, seriously now, Tim Cook bluntly stated that the government
could ensure that the FBiOS would not fall into the wrong hands.
We were then emerged in a heated debate between the defenders of security and those of privacy – a similar
debate to that between the faith and the crown in Westeros (before Cersei’s other son – we never remember
his name – sides with the Septon). Each party was fighting for its rightful place on the Iron Throne, while the
real dilemma was not who holds the most power, but rather how to combine these two elements together.
Without wildfire to solve the issue, the question still remains.
MAY: the old ways are vulnerable against Daenerys’s dragons
When the masters attacked the City of Maureen, Dany defied them by asserting their need to “get rid of the
Those monitoring the digital pulse of things quickly realized that it’s high time to head towards a different
approach (“new ways”) if they want to stay in the game. To deal with advanced and unpredictable threats, one
must stray from conventional methods. If Daenerys had the courage to ride a dragon, we can expand the limits
of our imagination too.
JUNE: not aware = not immune to white walkers
Beginning of the month, DDoS (distributed denial of service) attacks wreaked havoc in the French press (see our
article on the latest incidents here). June revealed itself as more generous than the previous months, attacking
all pillars of free expression – social networks, for instance (see our article here). All this because of the lack of
knowledge (or perhaps, the lack of will?) with concern to cybersecurity best practices and emerging cyber-
threats.
How can we protect ourselves against an army of zombies (botnets or not) if 1. we do not have the right
weapons and 2. we do not want to admit their existence. Hmm … well, we probably wouldn’t even have time to
ask the question.
Our mid-year review ends here (phew, we were starting to run out of Game of Thrones references), with a small
token of advice: fiction is not just mere exaggeration, sometimes it is there to inspire us to go beyond what is
achievable in the present. It is with this vision that we developed Reveelium, with the aim of spending more on
predicting attacks rather than treating them. The end of the last GoT season says it all (we were wrong, here’s
another reference): the war is just beginning. We will need assets such as Bran and Melisandre to deal with the
enemies.
Link:
https://www.reveelium.com/en/cybersecurity-winter-is-not-coming/

More Related Content

PDF
The ClearScore Darkpaper: The danger of the dark web 2020
PPTX
Hacktivism 6: Networks and Conspiracy
DOCX
Developer’s silence raises concern about surespot encrypted messenger
PDF
2600 v08 n2 (summer 1991)
PDF
Passwords for sale
PPTX
Media Pitch
PDF
2600 v25 n1 (spring 2008)
PPTX
FNC Free Seminar (public)
The ClearScore Darkpaper: The danger of the dark web 2020
Hacktivism 6: Networks and Conspiracy
Developer’s silence raises concern about surespot encrypted messenger
2600 v08 n2 (summer 1991)
Passwords for sale
Media Pitch
2600 v25 n1 (spring 2008)
FNC Free Seminar (public)

What's hot (18)

PDF
Are You a Hacker's Target?
PDF
Education is the Key to Fighting Cyber Crime
PDF
SURENDER SINGH Senior Prosecutor NIA
PDF
Developer’s silence raises concern about surespot encrypted messenger
PPTX
01.fnc free seminar (public) new
PDF
2600 v24 n4 (winter 2007)
PDF
Facebook Password Sniper
PPTX
Muso Publishing
DOCX
Accurately Attributing the Sony Hack is More Important than Retaliating
DOCX
7 The Media as a Cause of Crime 3
PPTX
DevNexus 2016: Wait! Wait! Don't pwn me!
PDF
Michał Cortez, Serwisy NSFW jako źródło inpiracji (dla E-commerce), I ♥ Marke...
PDF
RSA Monthly Online Fraud Report -- August 2013
 
PDF
Computer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
PPT
Filipinos as netizens darna in cyberspace
PPTX
Cyber Attribution
PDF
Internet Crimes : Why it is scary & How to avoid it
PPTX
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
Are You a Hacker's Target?
Education is the Key to Fighting Cyber Crime
SURENDER SINGH Senior Prosecutor NIA
Developer’s silence raises concern about surespot encrypted messenger
01.fnc free seminar (public) new
2600 v24 n4 (winter 2007)
Facebook Password Sniper
Muso Publishing
Accurately Attributing the Sony Hack is More Important than Retaliating
7 The Media as a Cause of Crime 3
DevNexus 2016: Wait! Wait! Don't pwn me!
Michał Cortez, Serwisy NSFW jako źródło inpiracji (dla E-commerce), I ♥ Marke...
RSA Monthly Online Fraud Report -- August 2013
 
Computer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
Filipinos as netizens darna in cyberspace
Cyber Attribution
Internet Crimes : Why it is scary & How to avoid it
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
Ad

Viewers also liked (11)

PDF
Caty treviño ¿qué estoy haciendo para mejorar la situación del mundo
PPTX
Visita museu 4º anos 01/07
DOCX
La reina de las hormigas
PPTX
урок 30 розробка плану створення презентації визначення мети, сценарію та стр...
PPTX
Festa julina 1
ODP
Componentes básicos do computador
PPTX
Componentes basicos de un computador
PPTX
Plantio de mudas 6º ano 21 09
PPTX
Semana farroupilha
PDF
アイデアを発展・整理するための便利なアプリとその使い方
Caty treviño ¿qué estoy haciendo para mejorar la situación del mundo
Visita museu 4º anos 01/07
La reina de las hormigas
урок 30 розробка плану створення презентації визначення мети, сценарію та стр...
Festa julina 1
Componentes básicos do computador
Componentes basicos de un computador
Plantio de mudas 6º ano 21 09
Semana farroupilha
アイデアを発展・整理するための便利なアプリとその使い方
Ad

Similar to Cybersecurity winter is not coming… (14)

PDF
article cybersecurity must B2B metaverse
DOCX
Cyber Legislation
DOCX
Cybersecurity awesome mix vol. II
PDF
Perform a search on the Web for articles and stories about social en.pdf
PDF
Traditional Terrorists
PDF
HacktivismPaper.docx
PDF
2600 v16 n1 (spring 1999)
PDF
The Patriot Act Title Vii Section 814 And 816
PPTX
Looking Ahead Why 2019 Will Be The year of Cyberwarfare
PPTX
Jason Samide - State of Security & 2016 Predictions
PDF
Terrorist Cyber Attacks
PDF
2600 v13 n2 (summer 1996)
PDF
Cyber Terrorism Essay
PDF
The Hacked World Order By Adam Segal
article cybersecurity must B2B metaverse
Cyber Legislation
Cybersecurity awesome mix vol. II
Perform a search on the Web for articles and stories about social en.pdf
Traditional Terrorists
HacktivismPaper.docx
2600 v16 n1 (spring 1999)
The Patriot Act Title Vii Section 814 And 816
Looking Ahead Why 2019 Will Be The year of Cyberwarfare
Jason Samide - State of Security & 2016 Predictions
Terrorist Cyber Attacks
2600 v13 n2 (summer 1996)
Cyber Terrorism Essay
The Hacked World Order By Adam Segal

More from ITrust - Cybersecurity as a Service (20)

DOCX
IT security : a five-legged sheep
DOCX
Petya, pire que WannaCry ?
DOCX
L’Intelligence Artificielle : un ‘booster’ pour la cybersécurité
PDF
Manifeste ResistanceCYBER 29.05.17
DOCX
Advanced persistent threats, entre mythe et réalité
DOCX
Quand les cybercriminels n’ont plus besoin de fuir les logiciels de sécurité
DOCX
Artificial intelligence and machine learning: ultimate game changers
PDF
Manifeste ResistanceCYBER 19.05.17
PDF
Manifeste ResistanceCYBER 18.05.17
PDF
Manifeste ResistanceCYBER 17.05.17
PDF
Manifeste ResistanceCYBER 15.05.17
DOCX
Passer de la détection d’anomalies à la détection de menaces
DOCX
Meet anomaly detection: a powerful cybersecurity defense mechanism when its w...
DOCX
L’étrange histoire d’un piratage en Angleterre
DOCX
Ignorance is bliss, but not for MongoDB
DOCX
Cisco WebEx vulnerability: it’s a kind of magic
PDF
ITrust Company Overview FR
PDF
ITrust Company Overview EN
PDF
SOC OEM - Datasheet FR
PDF
SOC OEM - Datasheet EN
IT security : a five-legged sheep
Petya, pire que WannaCry ?
L’Intelligence Artificielle : un ‘booster’ pour la cybersécurité
Manifeste ResistanceCYBER 29.05.17
Advanced persistent threats, entre mythe et réalité
Quand les cybercriminels n’ont plus besoin de fuir les logiciels de sécurité
Artificial intelligence and machine learning: ultimate game changers
Manifeste ResistanceCYBER 19.05.17
Manifeste ResistanceCYBER 18.05.17
Manifeste ResistanceCYBER 17.05.17
Manifeste ResistanceCYBER 15.05.17
Passer de la détection d’anomalies à la détection de menaces
Meet anomaly detection: a powerful cybersecurity defense mechanism when its w...
L’étrange histoire d’un piratage en Angleterre
Ignorance is bliss, but not for MongoDB
Cisco WebEx vulnerability: it’s a kind of magic
ITrust Company Overview FR
ITrust Company Overview EN
SOC OEM - Datasheet FR
SOC OEM - Datasheet EN

Recently uploaded (20)

PDF
Adobe Illustrator 28.6 Crack My Vision of Vector Design
PDF
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
PDF
Understanding Forklifts - TECH EHS Solution
PDF
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
PPTX
history of c programming in notes for students .pptx
PPTX
ai tools demonstartion for schools and inter college
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
PPTX
CHAPTER 12 - CYBER SECURITY AND FUTURE SKILLS (1) (1).pptx
PDF
How to Choose the Right IT Partner for Your Business in Malaysia
PDF
Wondershare Filmora 15 Crack With Activation Key [2025
PDF
Raksha Bandhan Grocery Pricing Trends in India 2025.pdf
PDF
PTS Company Brochure 2025 (1).pdf.......
PDF
System and Network Administration Chapter 2
PPTX
Online Work Permit System for Fast Permit Processing
PDF
Nekopoi APK 2025 free lastest update
PPTX
VVF-Customer-Presentation2025-Ver1.9.pptx
PDF
Design an Analysis of Algorithms II-SECS-1021-03
PDF
How to Migrate SBCGlobal Email to Yahoo Easily
PPTX
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
PPTX
Transform Your Business with a Software ERP System
Adobe Illustrator 28.6 Crack My Vision of Vector Design
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
Understanding Forklifts - TECH EHS Solution
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
history of c programming in notes for students .pptx
ai tools demonstartion for schools and inter college
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
CHAPTER 12 - CYBER SECURITY AND FUTURE SKILLS (1) (1).pptx
How to Choose the Right IT Partner for Your Business in Malaysia
Wondershare Filmora 15 Crack With Activation Key [2025
Raksha Bandhan Grocery Pricing Trends in India 2025.pdf
PTS Company Brochure 2025 (1).pdf.......
System and Network Administration Chapter 2
Online Work Permit System for Fast Permit Processing
Nekopoi APK 2025 free lastest update
VVF-Customer-Presentation2025-Ver1.9.pptx
Design an Analysis of Algorithms II-SECS-1021-03
How to Migrate SBCGlobal Email to Yahoo Easily
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
Transform Your Business with a Software ERP System

Cybersecurity winter is not coming…

  • 1. Cybersecurity winter is not coming… Cybersecurity winter is already here. WARNING, THIS ARTICLE CONTAINS SPOILERS. If we were to look back at some of the most important cyberattacks and cyber-risks that occurred so far in 2016, a mid-year review would very closely resemble Game of Thrones: full of conspiracies, betrayals, shameless pretend-to-be friends and unexpected turns of events – we might even end up believing that the cyber-world served as an inspiration for George R. Martin. JANUARY: hacktivists and cyber-terrorists, plot masters The beginning of this year was marked by a strong growth in hacktivism. According to Hackmageddon, 27.7% of the overall cyber-attacks recorded in January were related to political or religious beliefs. The attack that got the ball rolling: Anonymous versus the Thai police. Seeing how the local police of Thailand had unfairly sentenced to death two foreigners for the murder of a pair of British tourists, Anonymous immediately blocked all access to its website, leaving a single message on the home page: “Failed law. We want justice. #BoycottThailand “. While this may somehow seem “fair”, we also find a large number of cyber-terrorists (clearly Valar Morghulis advocates) hiding among these hacktivists. As any other community, cyber-terrorists have become increasingly more organized (read our previous article on hacking business models here), putting their technological know-how at the disposal of general disorder. Stingier than the plot masters of Westeros, without any regard for existing criminal or moral laws, nothing can come in their way when it comes to achieving their goals.
  • 2. FEBRUARY: a wall cannot protect you against malware The cyber-heist of the Central Bank of Bangladesh shook the financial sector to its core when a group of hackers managed to steal $ 81 million (approximately € 71.5 million) without anyone even noticing. Debts were certainly paid. The case became even more controversial when the details of the attack were published, announcing that the international financial institution in question had not previously installed a firewall. Cybersecurity experts from around the world lost it that day. Although a single “wall” would not have been enough to keep the outsiders at bay (read our article on the limitations of a firewall here), it still is a basic cybersecurity measure. As hackers’ favorite target, banking organizations should be the first ones to set up a « shield » against external threats. Otherwise, nothing can prevent the wildings from coming in through the front door. MARCH: ransomware or the Ramsey Bolton of digital extortion A month after the Hollywood Presbyterian Medical Center agreed to pay the ransom in order to unlock its system and resume its activity (a rather important activity taking into account the “public”), hackers declared opened the hunting season on US healthcare institutions. In March, MedStar Health went through a typical “Boltonian” experience in digital torture when its network, linking together ten hospitals, was infected by a ransomware (read our article on data hostage situations here). Another lesson we learned that month: paying a ransom does not guarantee that hackers will keep their word. Rickon should have probably read this article before placing his trust in Ramsey, don’t you think? #PoorRickon APRIL: an Apple backdoor will not hold without Hodor After the shooting of San Bernardino, the FBI came into possession of one of the iPhones used by the terrorists and asked Apple to develop a new version of its iOS (read our article on the FBiOS here), which would enable them to bypass some key security features of the iPhone. And what do you think the CEO of Apple replied? No backdoor without Hodor. No, seriously now, Tim Cook bluntly stated that the government could ensure that the FBiOS would not fall into the wrong hands. We were then emerged in a heated debate between the defenders of security and those of privacy – a similar debate to that between the faith and the crown in Westeros (before Cersei’s other son – we never remember his name – sides with the Septon). Each party was fighting for its rightful place on the Iron Throne, while the real dilemma was not who holds the most power, but rather how to combine these two elements together. Without wildfire to solve the issue, the question still remains. MAY: the old ways are vulnerable against Daenerys’s dragons When the masters attacked the City of Maureen, Dany defied them by asserting their need to “get rid of the
  • 3. Those monitoring the digital pulse of things quickly realized that it’s high time to head towards a different approach (“new ways”) if they want to stay in the game. To deal with advanced and unpredictable threats, one must stray from conventional methods. If Daenerys had the courage to ride a dragon, we can expand the limits of our imagination too. JUNE: not aware = not immune to white walkers Beginning of the month, DDoS (distributed denial of service) attacks wreaked havoc in the French press (see our article on the latest incidents here). June revealed itself as more generous than the previous months, attacking all pillars of free expression – social networks, for instance (see our article here). All this because of the lack of knowledge (or perhaps, the lack of will?) with concern to cybersecurity best practices and emerging cyber- threats. How can we protect ourselves against an army of zombies (botnets or not) if 1. we do not have the right weapons and 2. we do not want to admit their existence. Hmm … well, we probably wouldn’t even have time to ask the question. Our mid-year review ends here (phew, we were starting to run out of Game of Thrones references), with a small token of advice: fiction is not just mere exaggeration, sometimes it is there to inspire us to go beyond what is achievable in the present. It is with this vision that we developed Reveelium, with the aim of spending more on predicting attacks rather than treating them. The end of the last GoT season says it all (we were wrong, here’s another reference): the war is just beginning. We will need assets such as Bran and Melisandre to deal with the enemies. Link: https://www.reveelium.com/en/cybersecurity-winter-is-not-coming/