Monitoring deep, dark and surface web to detect exposure of your sensitive data, secret projects and initiatives, privileged users, critical systems, IT infrastructure, and more.
Monitoring and alerting of third party data breaches impacting your employees’ emails, usernames, and personally identifiable information.
Assess the risk footprint and security posture of key business relationships to get a handle on external risk introduced through your extended attack surface.

Sign Up for Updates

Digital risk monitoring of key personnel with telemetry and risk metrics. VIPRecon provides broad coverage of social media, deep and dark web, as well as physical threat assessments.
Our Ransomware Response Readiness Assessment, Playbook and Table Top Exercise gives your organization the best chance to survive and recover.
Gain visibility of your digital footprint by reaching into the most active areas of the cyber underground.
Fully managed and tailored Threat Intelligence services that becomes an extension of your current security processes and provides real-time visibility on new threats.
Providing research and investigations into known threats, to save security teams time and stress during a cyber emergency.

Sign Up for Updates

GroupSense offers a comprehensive package of services for assessing and responding to ransomware attacks, including negotiations with threat actors.
Actively researching and monitoring threats from vendors or third-party companies that can affect organizational security.
Monitoring for threats to elections, VIPs, and more on social media to proactively prevent or mitigate digital risk.
Focusing on the threats and risks that matter to your security processes and providing intelligence and insights to prevent or mitigate digital risk.
Taking the next step in security services, by proactively taking down phishing sites or anonymously interacting with threat actors to provide better intelligence.
Active monitoring of your brand's digital assets to protect its reputation and stop further brand abuse from targeting unsuspecting victims.

Sign Up for Updates

Combining your cyber and fraud programs to effectively fight threat actors continually scamming or threatening assets within an organization.
Executives are prime targets for fraudulent activities, but with a proactive approach, any attacks or threats can be neutralized before causing any damage.
Governments, political parties and candidates must all act now to activate cyber threat intelligence services to harden their information security and get ahead of inevitable cyber threats to the election process.
6 min read

Asharq News: Russian Ukraine Conflict

Feb 25, 2022 9:54:16 AM

As Russia unleashes war on Ukraine, many are asking about a possible Russian cyber-attack. Asharq News interviewed Bryce Webster-Jacobsen, Director of Intelligence Operations at GroupSense, about the Russian Ukraine Conflict and its impact on the cyber nexus.

Watch Bryce's segment here >

Note: In the segment linked above, Bryce is being translated.

002

According to Bryce, GroupSense is actively monitoring the ongoing international tension surrounding a potential Russian incursion on Ukraine. Due to Russia’s historical activity against Ukraine, as well as recent developments, it is highly likely that such an incursion would include significant cyber and influence operations carried out by Russian actors. While the bulk of this activity would likely target Ukraine, it is possible that such operations could impact public and private organizations in the United States and other NATO countries.

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) recently issued a warning over the possible risk of Russian cyberattacks onto the U.S. "The Russian government has used cyber as a key component of their force projection over the last decade, including previously in Ukraine in the 2015 timeframe. The Russian government understands that disabling or destroying critical infrastructure — including power and communications — can augment pressure on a country’s government, military and population, and accelerate their acceding to Russian objectives."

Distributed denial of service (DDoS) attacks on Ukrainian government websites, as well as the wiper malware deployed against Ukrainian financial institutions pose a large scale risk of cyber warfare. 

As recently as Wednesday, several Ukrainian government websites were offline as a result of a mass DDoS attack. The attack, which also impacted some banks, began around 4 p.m. local time.

Globally, businesses need to be prepared for potential Russian cyber-attacks by both by state and non-state actors. 

Advice to Corporate Leaders 

According to CISA, if you weren't prepared before now it might be too late. They recommend that corporate leaders and CEOs do the following:

  • Empower Chief Information Security Officers (CISO): In nearly every organization, security improvements are weighed against cost and operational risks to the business. In this heightened threat environment, senior management should empower CISOs by including them in the decision-making process for risk to the company, and ensure that the entire organization understands that security investments are a top priority in the immediate term.
  • Lower Reporting Thresholds: Every organization should have documented thresholds for reporting potential cyber incidents to senior management and to the U.S. government. In this heightened threat environment, these thresholds should be significantly lower than normal. Senior management should establish an expectation that any indications of malicious cyber activity, even if blocked by security controls, should be reported, as noted in the Shields-Up website, to CISA or the FBI. Lowering thresholds will ensure we are able to immediately identify an issue and help protect against further attack or victims.
  • Participate in a Test of Response Plans: Cyber incident response plans should include not only your security and IT teams, but also senior business leadership and Board members. If you’ve not already done, senior management should participate in a tabletop exercise to ensure familiarity with how your organization will manage a major cyber incident, to not only your company but also companies within your supply chain.
  • Focus on Continuity: Recognizing finite resources, investments in security and resilience should be focused on those systems supporting critical business functions. Senior management should ensure that such systems have been identified and that continuity tests have been conducted to ensure that critical business functions can remain available subsequent to a cyber intrusion.
  • Plan for the Worst: While the U.S. government does not have credible information regarding specific threats to the U.S. homeland, organizations should plan for a worst-case scenario. Senior management should ensure that exigent measures can be taken to protect your organization’s most critical assets in case of an intrusion, including disconnecting high-impact parts of the network if necessary.

Schedule a GroupSense Executive Briefing

Book a briefing with a member of the GroupSense Executive Team on the cyber nexus of international conflict. Click to book your briefing >


About Asharq News

The basis of the content provided by Al Sharq is the news, and the news in the Sharq is the starting point for an integrated story that contains news, analysis, and all opinions and their various dimensions. Al-Sharq attaches great importance to the economic content and its analysis, and is also interested in explaining the economic effects on the social and political conditions in the Arab countries, provided by an exclusive partnership with Bloomberg, the leading global company in the field of international business and financial information and news, in addition to the efforts of 2,700 analysts, financial and economic correspondents affiliated with Bloomberg around the world.


About Bryce Webster-Jacobsen

IMG_7635 copyBryce is the Director of Intelligence Operations at GroupSense, a leading provider in Digital Risk solutions. Bryce leads the day-to-day intelligence activities of GroupSense's Analyst and Research teams producing finished, tailored intelligence for our diverse clients.

Prior to GroupSense, Bryce worked in strategic international education initiatives while pursuing OSINT training and investigations, primarily focused on studying extremist movements, as a passion project.

Topics: News

Written by Editorial Team

Featured