Military patrols working outside their forward operating bases (FOB) are categorized as “working outside the wire.” This is often where reconnaissance patrols and military intelligence officers collect and gather valuable military intelligence to provide back to its unit, base, and section commanders to use in future proactive combat operations. This is no different from what RedXray does in cyber security. RedXray collects and analyzes indicators of compromise (IOCs) to help customers identi
This document summarizes threats reported by Red Sky Alliance’ RedXRay for one of the largest shipping/transportation companies in the world. Analysts observed hits in most collections. The name of the company will be redacted for this report, and the company will be referred to as “Shipping Co.” Recent international events have caused a significantly higher risk for all industries but especially an industry in charge of transporting important commodities around the globe. With many
The coronavirus outbreak in China has forced several countries to resort to stringent quarantine checks in their battle to contain the spread and the measures are starting to have a knock-on effect on the global commodities shipping market.
Delays in loading and delivery of cargoes in the tanker, dry bulk and container shipping segments are being reported due to ships being forced to sit idle amid a lack of crew availability.
Merchant ships arriving in A
Nanyang Technological University in Singapore has just released a report examining the economic losses expected if Asian port systems, including several in China, were subjected to a major cyber-attack. This report did not assess the cyber vulnerabilities of Asian ports but rather postulated a major attack in order to calculate economic impact, with a focus on losses in the insurance industry. The report concluded tha
Wapack Labs reports on the use of vessel names as lures in malicious emails. Using the names of Motor Vessel (MV), or Merchant/Motor Tanker (MT) in the subject line, is a social engineering tactic used by attackers when sending malicious emails to companies related to the shipping industry. Successful infiltrations into transportation related networks can result in the theft of valuable financial information or corrupt a system with damaging results. This report provides details about
Note: this page contains paid content.
Please, subscribe to get an access.