Experts at Kaspersky Lab published an interesting report on the activities of the Naikon APT revealing details on their infrastructures and TTPs. Naikon is one of the Asian largest APT gangs which has been active for several years, its operations...
Experts at Kaspersky Lab published an interesting report on the activities of the Naikon APT revealing details on their infrastructures and TTPs. Naikon is one of the Asian largest APT gangs which has been active for several years, its operations...
Intel Security published an a curious study to test consumer knowledge about phishing practice and measure the ability to detect phishing emails. For this study, Intel Security presented 10 emails where people were asked to identify which emails were...
The Anonymous collective continues the wave of cyber attacks against the Expo 2015 Universal Exposition, the last victim in order of time is the Best Union. Anonymous Italy continues to target the Expo 2015 Universal Exposition being hosted in Milan...
Pro-Isis Hackers belonging to Cyber Caliphate hacking team threaten ‘Electronic War’ on US and Europe. Which are ISIS cyber capabilities? Is the Islamic State group able to engage a cyber war against Western countries? According to prominent hackers...
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free for you in your email box. Hiring hackers, how much is it? US SOCOM and The Special Forces to Scrutinize Social...
The Penn State suffered a high sophisticated cyber attack that that seems to be originated from China and that exposed data belonging to 18K people. The Pennsylvania State University's College of Engineering confirmed that it has been targeted by two "highly...
The computer security researcher Chris Roberts reported the FBI that he obtained the control of at least one commercial flight causing it to “climb”. A new search warrant filed in a federal court in New York state published Friday by the Canadian...
Recently e-mails, text messages, payments, locations, and other data related with mSpy users were posted on the Deep Web, thousand of kids are at risk. Last week, e-mails, text messages, payments, locations, and other data related with mSpy users were...
Oil and gas industry targeted by hackers with a genuine looking windows file, not a malware. The attacks are ongoing for about two years. A unique targeted attack being underway for about two consecutive years exploits Windows file functions that look...
The Chinese threat actor known as APT17 and DeputyDog has been using profile pages and forum threads on Microsoft’s TechNet web portal to host IP addresses for command and control (C&C) servers. Security experts at FireEye and the colleagues at Microsoft...