• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Must Read

  • CISA adds Oracle, SugarCRM bugs to its Known Exploited Vulnerabilities Catalog
  • GoAnywhere MFT zero-day flaw actively exploited
  • CERT-FR warns of a new wave of ransomware attacks targeting VMware ESXi servers
  • Tallahassee Memorial HealthCare, Florida, has taken IT systems offline after cyberattack
  • Exploitation attempts for Oracle E-Business Suite flaw observed after PoC release
  • VMware Workstation update fixes an arbitrary file deletion bug
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Home Archive by category Cyber warfare (Page 106)

Cyber warfare

Chinese hackers increasingly attracted to the drone technology

Intelligence agencies reveal that Chinese hackers increasingly attracted to the drone technology while Chinese drone industry grows like never before! The fact that Chinese hackers areĀ most persistent collectors for sensitive information is not a mystery,Ā more...

September 25, 2013  By Pierluigi Paganini   Posted In  Cyber warfare  Intelligence  Security 

CBMEN, DARPA’s peer-to-peer technology for battlefield

DARPA is conducting a program codenamed CBMEN (Content-Based Mobile Edge Networking) for sharing of reconnaissance and Intelligence data on battlefield through P2P technology DARPA is conducting a programĀ codenamed CBMEM (Content-Based Mobile Edge Networking)...

September 15, 2013  By Pierluigi Paganini   Posted In  Cyber warfare  Intelligence 

Syrian Electronic Army hit NYT and Twitter

The group of Syrian Electronic Army hackers is intensification its hacking campaign pro-Assad. Details of the attacks against the HuffingtonPost UK, Twitter and the NYT. TheĀ Syrian Electronic ArmyĀ once again successful in an attack,Ā to be precise...

August 29, 2013  By Pierluigi Paganini   Posted In  Cyber warfare  Hacking  Security 

Information Warfare, Russia, New Zeland…it is arms race

Information warfare, under this term governments are working to improve their cyber capabilities, last in order of time are Russia and the New Zeland. Information warfare, cyber warfare, are all terms that are becoming familiar for population all over...

August 27, 2013  By Pierluigi Paganini   Posted In  Cyber warfare 

The cyber capabilities of Iran can hit US

A study titled ā€œIran:How a Third Tier Cyber Power Can Still Threaten the United States" states that Iran has sufficient cyber capabilities to attack the US Iran has sufficient cyber capabilities to attack the US causing serious damages to the critical...

August 14, 2013  By Pierluigi Paganini   Posted In  Cyber warfare  Hacking  Intelligence 

Credit Card Redirection, the evolution of phishing

Researchers at Securi discover Credit Card Redirection attack technique to hijack credit card data during transactions on e-commerce sites. With the term credit card redirection is indicated the illegal practice to steal credit and debit card information...

July 30, 2013  By Pierluigi Paganini   Posted In  Cyber warfare  Security 

Hackers hit South Korea also spread spyware to steal military secrets

Mc Afee Lab experts revealed that hackers behind large scale cyberattacks against South Korea also designed malware to steal military secrets. The hackers behind the recent attacks against South Korean infrastructure are professionals that designed also...

July 9, 2013  By Pierluigi Paganini   Posted In  Cyber warfare  Hacking  Security 

Watering hole attacks and exploit kits – Indian gov site case

Number of Watering hole attacks is increasing, most of them based on well known exploit kits. The case of compromised Indian gov Web site leads to BlackHole Watering HoleĀ attacks increase in a meaningful way in the last years following a scaring trend,...

May 27, 2013  By Pierluigi Paganini   Posted In  Cyber warfare  Hacking 

New wave of cyber attacks from Iran hit US

New cyber attacks from Iran hit US enterprises focusing on energy sector, the offensive has been revealed by American officials and private security experts. A new series of cyber attacks fromĀ IranĀ hit US enterprises, the offensive has been revealed...

May 26, 2013  By Pierluigi Paganini   Posted In  Cyber warfare  Hacking  Security 

Zero-day market, the governments are the main buyers

Governments, and in particular US one, are principal buyers of zero-day vulnerabilities according a report published by Reuters. Zero-days exploits are considered a primary ingredient for success of a cyber attack, the knowledge of zero-day flaw gives...

May 21, 2013  By Pierluigi Paganini   Posted In  Cyber warfare  Malware  Security 


« First‹ Previous102103104105106107108109110Next ›Last »
Page 106 of 121



Copyright 2021 Security Affairs by Pierluigi Paganini All Right Reserved.
Back to top
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking ā€œAccept Allā€, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
Cookie SettingsAccept All
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT
Go to mobile version