• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me

Must Read

  • Operation Triangulation: previously undetected malware targets iOS devices
  • California-based workforce platform Prosperix leaks drivers licenses and medical records
  • Apps with over 420 Million downloads from Google Play unveil the discovery of SpinOk spyware
  • BlackCat claims the hack of the Casepoint legal technology platform used by US agencies
  • Widespread exploitation by botnet operators of Zyxel firewall flaw
  • Experts warn of backdoor-like behavior within Gigabyte systems
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me

Home Archive by category Cyber warfare (Page 104)

Cyber warfare

Operation Arachnophobia, targeted attacks from Pakistan

Operation Arachnophobia is a cyber espionage campaign originated in Pakistan descovered by experts from FireEye and ThreatConnect. Researchers from FireEye and ThreatConnect recently conducted a joint investigation on a series of targeted attacks that...

August 21, 2014  By Pierluigi Paganini   Posted In  Cyber warfare  Intelligence  Malware 

Nuclear Regulatory Commission hit by foreign hackers

Nuclear Regulatory Commission systems were hacked three times in the last three years. According to investigators the bad actors are foreign hackers. U.S. Nuclear Regulatory Commission (NRC) has been hit by cyber attacks three times during the past three...

August 20, 2014  By Pierluigi Paganini   Posted In  Cyber Crime  Cyber warfare  Intelligence 

Kaspersky revealed that Stuxnet Exploits is still used worldwide

Experts at Kaspersky discovered that Stuxnet exploits targeting a Windows Shell Vulnerability is still largely used in cyber attacks. Stuxnet has changed the history of malware development, it is considered the fist cyber weapon used by a government...

August 19, 2014  By Pierluigi Paganini   Posted In  Cyber Crime  Cyber warfare  Malware 

A new Citadel trojan variant includes different remote management tools to maintain persistence on victims PC

Experts at IBM discovered a new variant of Citadel banking malware which includes different remote management tools to maintain persistence on victims' PC. Researchers at IBM discovered a new variant of the Citadel banking malware which includes a new interesting...

August 3, 2014  By Pierluigi Paganini   Posted In  Cyber warfare  Malware  Security 

Kaspersky report on Energetic Bear – Crouching Yeti APT campaign

The Kaspersky Lab Team has issued a report which includes details of the investigation related to the Energetic Bear – Crouching Yeti APT campaign. Energetic Bear, aka Crouching Yeti, is the recently discovered APT campaign that targeted energy companies,...

August 2, 2014  By Pierluigi Paganini   Posted In  Cyber Crime  Cyber warfare  Malware 

Gyges, the mixing of commercial malware with cyber weapon code

Sentinel Labs firm discovered a sophisticated malware dubbed Gyges that is the mixing of commercial malicious code with code of alleged cyber weapon. Experts at Sentinel Labs security firm have discovered Gyges malware in the wild in March 2014, the malicious code...

July 22, 2014  By Pierluigi Paganini   Posted In  Cyber Crime  Cyber warfare  Malware 

Chinese hackers violated systems at the Office of Personnel Management

The New York Times revealed that in March Chinese hackers hacked systems at Office of Personnel Management stealing files of thousands of  Federal employees According to the New York Times, senior American officials revealed that a group of Chinese...

July 11, 2014  By Pierluigi Paganini   Posted In  Cyber warfare  Hacking  Intelligence 

Pentagon confirms that missile defenses are vulnerable to cyber attack

The Director of the Pentagon’s Missile Defense Agency reported to the Congress that missile defenses of the US military are vulnerable to cyber attacks. The Director of the Pentagon’s Missile Defense Agency reported to the Congress last week that...

July 8, 2014  By Pierluigi Paganini   Posted In  Cyber warfare 

North Korea doubles units of its cyber army

North Korea has doubled the number of its elite cyber warriors over the past two years and established overseas bases to run hacking attacks. The majority of people ignores that all over the world, many silent conflicts happen, the cyberspace is considered...

July 7, 2014  By Pierluigi Paganini   Posted In  Cyber warfare  Security 

Dragonfly gang is targeting Western energy industry

Security experts at Symantec have detected a new series of attacks worldwide conducted by the Dragonfly gang on SCADA/ICS in critical infrastructure. The energy industry is under attack, more than one thousand companies in Europe and North America are constantly under...

July 2, 2014  By Pierluigi Paganini   Posted In  Cyber Crime  Cyber warfare  Malware 


« First‹ Previous100101102103104105106107108Next ›Last »
Page 104 of 125



Copyright 2021 Security Affairs by Pierluigi Paganini All Right Reserved.
Back to top
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
Cookie SettingsAccept All
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT
Go to mobile version