Symantec CTO: World War III could start with a cyber battle

Sooraj Shah
clock • 3 min read

Cyber tools could also be used for propaganda and disinformation, says Greg Day

Day said that Symantec had also been tracking APT1 for six years.

"We can see consistency in the codes that were behind it, and the source sites which [the group] were using and where they were hosting from, but does it add any value for us whether it is a government group, a state-sponsored group or a military group? It's not our focal area," he said.

But added that the firm is now working more with government to get this information to them.

"We would always reach out to the ISP to say ‘we think your site is compromised, you should shut it down and here is why', and work with law enforcement and say ‘here is the evidence we've got, you may want to take this further'," he said.

Day gave an example of the Taiwanese government updating some of its military capabilities as evidence that any situation could be seen differently by a number of nations.

"As the Taiwanese government were going out to tender, we could see traffic going back to the US, Taiwan, China and other countries as well, but obviously someone was trying to get in the middle of that bid process," he said.

"You could argue it was a company trying to outbid everyone else or that it was one of the other nations trying to understand what Taiwan's future capabilities were going to be. People can look at it from so many different angles. It was interesting in that they were trying to update their military capability and cyber was used as a sub-part of that process," he added.

You may also like
Accidental exclusion exacerbating cyber's staffing problem

Careers and Skills

Many people who would excel in cybersecurity roles see no obvious way in, with those that do make it getting stuck in entry-level positions

clock 12 May 2023 • 4 min read
Former Head of Police National Cyber Crime Unit joins Cybersecurity Festival

Leadership

Charlie McMurdie spent 32 years in the Met and built the Police Central e-crime Unit

clock 29 March 2023 • 2 min read
Security challenges: Five midsize IT leaders on where they need help

Security

From ransomware and malware to the Internet of Things, midmarket IT leaders are staring down a number of security threats, often with limited resources at hand.

clock 28 March 2023 • 8 min read

More on Threats and Risks

Mandiant's 2024 threat report - five takeaways

Mandiant's 2024 threat report - five takeaways

Latest M-Trends report details how ransomware, zero-day attacks and other threats evolved last year.

Kyle Alspach
clock 24 April 2024 • 5 min read
Proportion paying ransoms declines in Q1 2024, even as takings break a new record

Proportion paying ransoms declines in Q1 2024, even as takings break a new record

Only 28% willing to meet ransomware gangs' demands

Muskan Arora
clock 23 April 2024 • 2 min read
ToddyCat cybercriminals using high-end tools to commit 'industrial scale' theft

ToddyCat cybercriminals using high-end tools to commit 'industrial scale' theft

ToddyCat restrict access to compromised systems while they steal valuable data.

Muskan Arora
clock 23 April 2024 • 2 min read