• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Must Read

  • Google fixes the fourth Chrome zero-day in 2022
  • Data of a billion Chinese residents available for sale on the dark web
  • Popular Django web framework affected by a SQL Injection flaw. Upgrade it now!
  • Unfaithful HackerOne employee steals bug reports to claim additional bounties
  • Threat Report Portugal: Q2 2022
  • CISA orders federal agencies to patch CVE-2022-26925 by July 22
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Home Archive by category Cyber warfare (Page 95)

Cyber warfare

Kaspersky report on Energetic Bear – Crouching Yeti APT campaign

The Kaspersky Lab Team has issued a report which includes details of the investigation related to the Energetic Bear – Crouching Yeti APT campaign. Energetic Bear, aka Crouching Yeti, is the recently discovered APT campaign that targeted energy companies,...

August 2, 2014  By Pierluigi Paganini   Posted In  Cyber Crime  Cyber warfare  Malware 

Gyges, the mixing of commercial malware with cyber weapon code

Sentinel Labs firm discovered a sophisticated malware dubbed Gyges that is the mixing of commercial malicious code with code of alleged cyber weapon. Experts at Sentinel Labs security firm have discovered Gyges malware in the wild in March 2014, the malicious code...

July 22, 2014  By Pierluigi Paganini   Posted In  Cyber Crime  Cyber warfare  Malware 

Chinese hackers violated systems at the Office of Personnel Management

The New York Times revealed that in March Chinese hackers hacked systems at Office of Personnel Management stealing files of thousands of  Federal employees According to the New York Times, senior American officials revealed that a group of Chinese...

July 11, 2014  By Pierluigi Paganini   Posted In  Cyber warfare  Hacking  Intelligence 

Pentagon confirms that missile defenses are vulnerable to cyber attack

The Director of the Pentagon’s Missile Defense Agency reported to the Congress that missile defenses of the US military are vulnerable to cyber attacks. The Director of the Pentagon’s Missile Defense Agency reported to the Congress last week that...

July 8, 2014  By Pierluigi Paganini   Posted In  Cyber warfare 

North Korea doubles units of its cyber army

North Korea has doubled the number of its elite cyber warriors over the past two years and established overseas bases to run hacking attacks. The majority of people ignores that all over the world, many silent conflicts happen, the cyberspace is considered...

July 7, 2014  By Pierluigi Paganini   Posted In  Cyber warfare  Security 

Dragonfly gang is targeting Western energy industry

Security experts at Symantec have detected a new series of attacks worldwide conducted by the Dragonfly gang on SCADA/ICS in critical infrastructure. The energy industry is under attack, more than one thousand companies in Europe and North America are constantly under...

July 2, 2014  By Pierluigi Paganini   Posted In  Cyber Crime  Cyber warfare  Malware 

Air-gap network hacking technique, infects systems via cellphone even if isolated from the Internet

Israeli researchers presented the air-gap network hacking technique to compromise a system, even if it is isolated from the Internet, using a cellphone. Researchers at Ben Gurion University presented a study on the hacking technique dubbed air-gap network hacking...

June 15, 2014  By Pierluigi Paganini   Posted In  Cyber warfare  Hacking 

Putter Panda APT behind for cyber espionage campaigns, are they members of PLA Unit 61486?

CrowdStrike published a new report which blames the Chinese Putter Panda group for the different cyber espionage campaigns conducted against foreign companies. Putter Panda is the name of bad actor responsible for a series of cyber espionage operations...

June 11, 2014  By Pierluigi Paganini   Posted In  Cyber warfare  Hacking  Intelligence  Security 

Databases of personnel at US command in S Korea hacked

A major cyber attack might have compromised the personal information of 16000 current and former workers employed by the American command in South Korea. US officials have revealed that military database in South Korea has suffered a major cyber attack...

June 8, 2014  By Pierluigi Paganini   Posted In  Cyber warfare  Hacking  Intelligence 

Russia and Ukraine cyber dispute analyzed by FireEye

FireEye has issued data which show the intensification of activities in the cyberspace correspondent  to geopolitical tension between Russia and Ukraine. The Geopolitical dispute between Russia and Ukraine has its correspondence in the cyberspace,...

May 30, 2014  By Pierluigi Paganini   Posted In  Cyber warfare  Intelligence  Security 


« First‹ Previous919293949596979899Next ›Last »
Page 95 of 115



Copyright 2021 Security Affairs by Pierluigi Paganini All Right Reserved.
Back to top
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
Cookie SettingsAccept All
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT