New cyber attacks from Iran hit US enterprises focusing on energy sector, the offensive has been revealed by American officials and private security experts. A new series of cyber attacks from Iran hit US enterprises, the offensive has been revealed by American officials and private security experts. The attacks are classified as “potentially destructive” and targeted IT […]
Chinese hackers who breached Google in 2010 are responsible for the recent violation to Google Company’s Surveillance Database according officials revelations. Google data breach is reality and Google Company’s Surveillance Database has been violated by the same hackers who breached Google’network in 2010, the attackers have obtained the access to the company’s tracking system for […]
Governments, and in particular US one, are principal buyers of zero-day vulnerabilities according a report published by Reuters. Zero-days exploits are considered a primary ingredient for success of a cyber attack, the knowledge of zero-day flaw gives to the attacker guarantee of success, state-sponsored hackers and cyber criminals consider zero-day exploits a precious resources around […]
Operation Hangover is the title of a report published by Norman Shark that details a sophisticated cyberattack infrastructure that appears to originate from India, conducted by private threat actors with no evidence of state-sponsorship. Operation Hangover, this is the name assigned by Norman Shark’s security analyst team to an interesting report revealing a large and sophisticated cyber-attack […]
NEW MAC MALWARE HAS BEEN DISCOVERED BY JACOB APPELBAUM ON ATTENDEE COMPUTER AT OSLO FREEDOM FORUM WHERE IS DEBATED ALSO GOVERNMENT SURVEILLANCE. A new Mac Malware has been detected at recent Oslo Freedom Forum workshop, the concerning discovery has been made by the popular security expert Jacob Appelbaum. “Hundreds of the world’s most influential dissidents, innovators, journalists, philanthropists, and […]
US Air Force published a notice that includes a paragraph on the use of social media platforms for computer network exploitation. In the recent months I had the opportunity to conduct an interesting study on the use of Social Media in the Military Sector, large diffusion of media platforms makes them very attractive for governments […]
Cybersecurity goes to the offensive, law enforcement and private companies are discussing the possibility to adopt an offensive approach to defend their assets from the continuous cyber attacks. The press is getting used to news of cyber attacks against companies and government agencies, to date, the trend of the representatives of the cybersecurity of these entities […]
Google is a mine of information that could be used for various purposes, for this reason National Security Agency realized a book to help its spies uncover intelligence hiding on the web. Few days ago I published an interested article inspired by security expert Dancho Danchev and focused on the use of Google Dorks based tool […]
China and US governments continue to exchange accusations about the continuing incursions into the respective national networks. China and US governments continue to exchange accusations about the continuing incursions into the respective national networks, the cyber attacks are mainly motivated by sabotage and cyber espionage purposes and are increasing exponentially. US government and intelligence agencies […]
Security experts have discovered a new IE8 zero-day vulnerability exploited to target U.S. Government experts working on nuclear weapons research. Security experts have discovered a new IE8 zero-day vulnerability exploited to target U.S. Government experts working on nuclear weapons research, the concerning discovery has been confirmed by principal security firms that revealed that the flaw […]