• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Must Read

  • A ransomware attack forced publishing giant Macmillan to shuts down its systems
  • SessionManager Backdoor employed in attacks on Microsoft IIS servers worldwide
  • A long-running cryptomining campaign conducted by 8220 hackers now targets Linux servers
  • Pro-Russian hackers launched a massive DDoS attack against Norway
  • Korean cybersecurity agency released a free decryptor for Hive ransomware
  • Experts blame North Korea-linked Lazarus APT for the Harmony hack
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Home Archive by category Cyber warfare (Page 93)

Cyber warfare

Cyber-war or cyber-peace?

Equilibria in cyberspace are evidently unstable and many experts believe that we are in the midst of a cyber-war ... there is the urgency of a regulation. Some month’s ago, news have further stirred the already troubled waters of cyberspace: five Chinese...

December 20, 2014  By Pierluigi Paganini   Posted In  Cyber warfare 

The wiper malware that hit Sony Picture was written in Korean

Security experts at AlienVault discovered further elements of the wiper malware used for the attack on Sony Pictures that link it to North Korean hackers. New evidence has emerged from the investigation on the clamorous cyber attack against the Sony...

December 7, 2014  By Pierluigi Paganini   Posted In  Cyber Crime  Cyber warfare  Malware 

Operation Cleaver – Iranian hackers target industries worldwide

Security firm Cylance revealed that Iranian hackers target airlines, energy, defense companies worldwide as part of the Operation Cleaver campaign. Security firm Cylance released a detailed report on the hacking Operation Cleaver that was run by state-sponsored...

December 3, 2014  By Pierluigi Paganini   Posted In  Cyber warfare  Intelligence 

The Syrian Electronic Army is causing a mass media outage through Gigya hacking

High profile global websites using the customer management platform Gigya suffered a traffic redirection attack operated by the Syrian Electronic Army. A significant number of popular websites belonging to media organizations appeared to has been...

November 27, 2014  By Pierluigi Paganini   Posted In  Cyber warfare  Hacking 

Regin backdoor used to compromise the GSM Networks

Security experts at Kaspersky Lab issued a detailed paper on the analysis of the backdoor Regin focusing on the attacker's activity against the GSM networks. The day after the disclosure of the Regin Backdoor by Symantec, which provided the details...

November 25, 2014  By Pierluigi Paganini   Posted In  Cyber warfare  Intelligence  Malware 

Regin – Highly advanced spying tool discovered by Symantec

Symantec has uncovered the backdoor Regin, a highly advanced spying tool used in cyber espionage campaigns against governments and infrastructure operators. Backdoor Regin, is the name assigned by the experts at Symantec to an advanced spying tool that...

November 24, 2014  By Pierluigi Paganini   Posted In  Cyber Crime  Cyber warfare  Malware 

NSA Director Mike Rogers confirms risks of major cyber attacks

The director of the US National Security Agency Admiral Mike Rogers confirmed that "probably one or two" countries have the cyber ability to hit the USA. In the recent weeks different attacks hit US infrastructure, the networks at The State Department,...

November 21, 2014  By Pierluigi Paganini   Posted In  Cyber warfare 

The US energy industry is constantly under cyber attacks

Data related to the number of incidents occurred to national infrastructure confirms that the US Government energy industry is constantly under attack. The US Government is aware that nation's energy grid is constantly under attack by state-sponsored...

November 19, 2014  By Pierluigi Paganini   Posted In  Cyber Crime  Cyber warfare  Malware  Security 

EASE, the DHS concept of self-repairing networks

The Department of Homeland Security is working with industry to the EASE concept, a self-repairing systems able to avoid the interruption of the operations. The Department of Homeland Security is working on a new generation of self-repairing network...

November 18, 2014  By Pierluigi Paganini   Posted In  Cyber warfare 

State Department network hacked, email system shut down

The State Department has taken the unprecedented step of shutting down its entire unclassified email system in response to a suspected cyber attack. The State Department has decided of shutting down its entire unclassified email system in response to a suspected...

November 17, 2014  By Pierluigi Paganini   Posted In  Cyber warfare  Security 


« First‹ Previous899091929394959697Next ›Last »
Page 93 of 115



Copyright 2021 Security Affairs by Pierluigi Paganini All Right Reserved.
Back to top
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
Cookie SettingsAccept All
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT