• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Must Read

  • SessionManager Backdoor employed in attacks on Microsoft IIS servers worldwide
  • A long-running cryptomining campaign conducted by 8220 hackers now targets Linux servers
  • Pro-Russian hackers launched a massive DDoS attack against Norway
  • Korean cybersecurity agency released a free decryptor for Hive ransomware
  • Experts blame North Korea-linked Lazarus APT for the Harmony hack
  • Ex-Canadian government employee admits to being a member of the Russian cybercrime gang NetWalker
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Home Archive by category Cyber warfare (Page 101)

Cyber warfare

New wave of cyber attacks from Iran hit US

New cyber attacks from Iran hit US enterprises focusing on energy sector, the offensive has been revealed by American officials and private security experts. A new series of cyber attacks from Iran hit US enterprises, the offensive has been revealed...

May 26, 2013  By Pierluigi Paganini   Posted In  Cyber warfare  Hacking  Security 

Zero-day market, the governments are the main buyers

Governments, and in particular US one, are principal buyers of zero-day vulnerabilities according a report published by Reuters. Zero-days exploits are considered a primary ingredient for success of a cyber attack, the knowledge of zero-day flaw gives...

May 21, 2013  By Pierluigi Paganini   Posted In  Cyber warfare  Malware  Security 

China vs US mutual accusations, the cyber cold war is begun

China and US governments continue to exchange accusations about the continuing incursions into the respective national networks. China and US governments continue to exchange accusations about the continuing incursions into the respective national networks,...

May 9, 2013  By Pierluigi Paganini   Posted In  Cyber warfare  Intelligence  Security 

Verizon, large scale cyber espionage from China and much more

Verizon has issued the “2013 Data Breach Investigations Report” that investigates on a series of documented data breaches. Verizon’s RISK Team, in collaboration with other 18 partners, has issued the “2013 Data Breach Investigations Report”...

April 24, 2013  By Pierluigi Paganini   Posted In  Cyber Crime  Cyber warfare  Intelligence  Malware  Security 

US army discloses budget for cyber operations

It’s not a mystery, every state despite the spending review on the military budget is continuing to reserve consistent investment in cyber security, in particular majority of states is pushing research and development activities on both defense and offense...

April 21, 2013  By Pierluigi Paganini   Posted In  Cyber warfare 

Anonymous #OpIsrael, use of botnets & hypothesis on attackers

We all remember the debated attacks of Anonymous collective against Israeli government that targeted various websites of the country last April 7th. The data on the cyber attacks reported by Israel government are really different from the one provided...

April 18, 2013  By Pierluigi Paganini   Posted In  Cyber Crime  Cyber warfare  Hacking  Intelligence 

The role of hacktivism in cyber warfare scenario between 2 Koreas

It’s not a surprise South Korean security experts suggest that the North Korea military is training an elite force of “cyber warriors” to involve in cyber attacks against South institutions and companies. The South intelligence revelations follow...

April 3, 2013  By Pierluigi Paganini   Posted In  Cyber warfare  Hacking 

vSkymmer botnet, a financial malware appears in the underground

The principal reports proposed by various security firm demonstrate a sustained growth of cyber criminal activities fueled by increased offer of underground. In the underground it is practically possible to acquire/sell any kind of product and services...

March 29, 2013  By Pierluigi Paganini   Posted In  Cyber warfare  Malware 

Multiplatform Wiper widespread in attacks against South Korea

Recently South Korea has been hit by powerful cyber attack malware based, network provided by LG UPlus Corp was hacked by a group calling itself the “Whois Team”. The attack targeted also media and banking of the country, television networks YTN,...

March 25, 2013  By Pierluigi Paganini   Posted In  Cyber warfare  Malware  Security 

NATO works to define rules for cyber warfare

Recent explosion of cyber attacks worldwide demonstrating the difficulty to maintain order and stability in the cyberspace, within individual states and among the states themselves. Deterrence strategies adopted by almost all countries are inadequate,...

March 21, 2013  By Pierluigi Paganini   Posted In  Cyber warfare 


« First‹ Previous979899100101102103104105Next ›Last »
Page 101 of 115



Copyright 2021 Security Affairs by Pierluigi Paganini All Right Reserved.
Back to top
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
Cookie SettingsAccept All
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT