The Australian newspaper published over 22,000 secret documents on six DCNS Scorpene submarines that are being built in India. According to The Australian, Indian authorities is investigating a security breach that affected the French Submarine Firm DCNS, which is 35 percent owned by Thales. The investigation started after more than 22,000 pages related to six DCNS Scorpene […]
A security expert noticed strange transactions from the Bitcoin wallet of the SilkRoad (now in the hands of Feds) to the ShadowBrokers ‘ wallet. I was surfing the Internet searching for interesting data about the ShadowBrokers group that leaked exploits and hacking tools belonging to the NSA Equation Group. I have found a very intriguing analysis […]
The organization that controls the development of the Bitcoin software warns users that nation-state actors may hit the upcoming Bitcoin Core release. The organization that controls the development of the Bitcoin system, Bitcoin.org, has warned of possible cyber attacks coordinated by nation-state attackers. Bitcoin Core is the open source client for Bitcoin, the version Bitcoin Core […]
According to the popular whistleblower Edward Snowden the hack of the NSA Equation Group may be a Russian response to the US. The public auction of stolen NSA exploits and hacking tools may be the response of the Russian Government to the US Government that is blaming it for the DNC hack. This is also […]
A group of hackers claims to have hacked the NSA Equation Group, it is selling hacking tools and exploits in online auction. Security experts discussed several times about potential effects of the militarization of the cyberspace. Government-built malware and cyber weapons may run out of control, cyber weapons and hacking tools developed by nation-state hackers […]
UAV – “Go ahead, look up [points to the sky] … see the drone? No? It’s alright, because the drone sees you. Sees your face. We know who you are.” The scene is from the movie “13 hours – The secret story of the soldiers of Benghazi”: as the member of Ansar al-Sharia looks up, […]
Is it possible to hack voting machines? According to cyber security experts, it is possible due to the use of outdated systems. The recent attacks against the DNC and Hillary Clinton‘s server raised the question about the cyber security of entire US election machine. Speaking at the Aspen Security Forum, Lisa O. Monaco, homeland security […]
Experts spotted a previously unknown APT group dubbed Strider or ProjectSauron that carried out surgical cyber-espionage attacks against targets worldwide. A previously unknown hacking group variously dubbed ‘Strider’ or ‘ProjectSauron’ has been conducting a surgical cyber espionage campaign against targets in Russia, Belgium, China, Iran, Sweden, and Rwanda. According to experts from Symantec, the Strider crew […]
The number of high-profile hacks demonstrates that a silent cyberwar is already ongoing among countries in the cyberspace. The recent hacks of the Democratic National Committee and presidential candidate Hillary Clinton’s campaign and the alleged infections spotted by the Russian FSB inside government networks demonstrate the intense activity in the cyberspace. It is a virtual […]
Hackers accessed Telegram accounts in Iran, a security duo investigated the security breach and will present its findings at the Black Hat Conference. 15 million Iranian Telegram accounts have been compromised, users have reportedly had their personal information exposed (phone number, Telegram ID). The security researchers Collin Anderson and Claudio Guarnieri have investigated the case, more […]