• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Must Read

  • North Korea-linked APT targets Job Seekers with macOS malware
  • ÆPIC Leak is the first CPU flaw able to architecturally disclose sensitive data
  • Zoom fixed two flaws in macOS App that were disclosed at DEF CON
  • Clop gang targeted UK drinking water supplier South Staffordshire Water
  • Russia-linked Gamaredon APT continues to target Ukraine
  • Phone numbers of 1,900 Signal users exposed as a result of Twilio security breach
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Home Archive by category Cyber warfare (Page 91)

Cyber warfare

Iran increased cyber-security spending 12-fold since 2013

Iran is improving its cyber capabilities faster than experts 'would have ever imagined' and increased cyber-security spending 12-fold since2013. The British Business Insider published an interesting post on the Iranian cyber capabilities, according the experts...

March 28, 2015  By Pierluigi Paganini   Posted In  Breaking News  Cyber warfare  Hacking  Reports 

ISIS cell calls on supporters to kill 100 US military personnel

A cell of the ISIS has called on its members and backers in the US to kill 100 service members whose names, photos and addresses it posted online. The ISIS continues to scare the West, its operations are supported by a very aggressive media campaign...

March 23, 2015  By Pierluigi Paganini   Posted In  Breaking News  Cyber warfare  Hacking  Intelligence  Security 

Operation Woolen Goldfish, a hacking campaign in the wild

Security experts at Trend micro uncovered a new hacking campaign dubbed Operation Woolen Goldfish likely run by a threat actor group known as Rocket Kitten. Security experts at Trend Micro have uncovered a new cyber espionage campaign that is targeting...

March 21, 2015  By Pierluigi Paganini   Posted In  Breaking News  Cyber Crime  Cyber warfare  Malware 

China and its cyber capabilities, are you really surprised?

China has admitted the existence in its military organization of special information warfare units, I contacted one of the greatest experts for a comment. Bill Hagestad (Red-DragonRising  @RedDragon1949) is a consultant, speaker and expert on Chinese...

March 20, 2015  By Pierluigi Paganini   Posted In  Breaking News  Cyber warfare 

China admitted the existence of Information warfare units

For the first time China has publicly admitted the existence in its military organization of special information warfare units.  Since quite some time that security experts sustain that China has one of the most advanced cyber army that is responsible...

March 20, 2015  By Pierluigi Paganini   Posted In  Breaking News  Cyber warfare  Security 

North Korea Internet outage could be a response to Sony Hack

According to a US Lawmaker North Korea Internet outage occurred in December could be a response for the cyber attack against the Sony Pictures On December 2014, the North Korea suffered a significant network outage which isolated the country from the internet....

March 19, 2015  By Pierluigi Paganini   Posted In  Breaking News  Cyber warfare 

South Korea – Hacker requests money for data on nuclear plants

Hacker who posted online information on Nuclear Plants in South Korea demands money for not selling other sensitive information to other governments. The Government of Seoul has issued a report blaming North Korea for cyber attacks against computers...

March 18, 2015  By Pierluigi Paganini   Posted In  Breaking News  Cyber Crime  Cyber warfare  Malware  Security 

Cyber attacks against Organizations increased once again

71 percent of organizations were victims of successfully cyber attacks in 2014 according to the “2015 Cyberthreat Defense Report” report. The CyberEdge Group published an interesting report, titled “2015 Cyberthreat Defense Report” that in...

March 16, 2015  By Pierluigi Paganini   Posted In  Breaking News  Cyber Crime  Cyber warfare  Hacking  Reports  Security 

ICS-CERT MONITOR report states most critical infrastructure attacks involve APTs

DHS ICS-CERT MONITOR report reveals that most critical infrastructure attacks involve APTs, but organizations lack monitoring capabilities. The DHS’s Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) has issued its new ICS-CERT MONITOR...

March 16, 2015  By Pierluigi Paganini   Posted In  Breaking News  Cyber Crime  Cyber warfare  Hacking  Reports  Security 

EquationDrug, the hacking platform of the Equation Group APT

Experts at Kaspersky Lab published a detailed analysis of the EquationDrug platform and its modules developed by the Equation Group APT. Recently experts at Kaspersky Lab have uncovered the Equation Group hacking crew, the most sophisticated ever APT....

March 12, 2015  By Pierluigi Paganini   Posted In  Breaking News  Cyber warfare  Intelligence  Reports 


« First‹ Previous878889909192939495Next ›Last »
Page 91 of 117



Copyright 2021 Security Affairs by Pierluigi Paganini All Right Reserved.
Back to top
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
Cookie SettingsAccept All
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT