• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Must Read

  • Asian media company Nikkei suffered a ransomware attack
  • Russia-linked Sandworm continues to conduct attacks against Ukraine
  • Cisco fixes an IOS XR flaw actively exploited in the wild
  • QNAP warns of a new wave of DeadBolt ransomware attacks against its NAS devices
  • Pwn2Own Vancouver 2022 D2
  • The activity of the Linux XorDdos bot increased by 254% over the last six months
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Home Archive by category Cyber warfare (Page 97)

Cyber warfare

Cost of conducting APT campaigns is dramatically dropping

Speaking at Kaspersky Lab's Industry Analyst Summit Costin Raiu, revealed that the cost for APT campaign is dramatically dropping. The cost of developing advanced malware has fallen dramatically malicious code like Stuxnet and Flame are today economically...

February 9, 2014  By Pierluigi Paganini   Posted In  Cyber Crime  Cyber warfare  Hacking 

Admiral Rogers chosen as new NSA director.The man of Information Warfare

The Obama Administration will assign the command of NSA to Michael S. Rogers, the US Government has chosen a military Expert on Information Warfare. The Obama Administration will assign the command of NSA to Michael S. Rogers, presently the U.S Navy's...

February 2, 2014  By Pierluigi Paganini   Posted In  Cyber warfare  Intelligence 

Israeli Defense computer hacked via spear phishing attack

Aviv Raff, CTO at Seculert, confirmed that the attackers have penetrated into the network of Israeli Defense accessing to 15 computers. Israeli Defense is another illustrious victim of spear phishing attack, just on Friday Microsoft suffered a similar...

January 27, 2014  By Pierluigi Paganini   Posted In  Cyber warfare  Hacking 

Perception of cyberwarfare in US Defence and society

Which is the perception of cyberwarfare in the US Government and within the American population? How much cost Information warfare to the US citizens? In this post I desire to put together a series of useful information to better understand the perception...

January 11, 2014  By Pierluigi Paganini   Posted In  Cyber warfare 

CDM MAGAZINE – CYBER WARNINGS DECEMBER 2013 ED. for free

CDM (CYBER DEFENSE MAGAZINE) PRESENTS: CYBER WARNINGS DECEMBER 2013 EDITION The December edition of the free Cyber Defense Magazine is out. Don't miss it.   SPONSORED BY RSA CONFERENCE 2014 Read each FLIPBOOK edition electronically, online...

December 31, 2013  By Pierluigi Paganini   Posted In  Cyber Crime  Cyber warfare  Digital ID  Hacking  Intelligence  Laws and regulations  Malware  Security  Social Networks 

NATO has constituted Cyber Response Teams

The NATO has announced to be close to launch two Cyber Response Teams to protect the infrastructures of the Alliance in the case of cyber attacks. NATO is establishing its reaction units to protect its infrastructure in case of cyber attacks, the organization...

December 24, 2013  By Pierluigi Paganini   Posted In  Cyber warfare 

NSA – A bios malware can remotely destroy any US system

During a CBS Interview show "60 Minutes", The NSA Director General Alexander and the Information Assurance Director Plunkett  claimed a foreign government has developed a BIOS based malware that can remotely destroy any computer. Senior National Security...

December 17, 2013  By Pierluigi Paganini   Posted In  Cyber Crime  Cyber warfare  Hacking  Intelligence  Malware  Security 

Near East – new heaven for bulletproof hosting providers, first effects of cyberwar

Intelligence experts at IntelCrawler discovered a Russian-speaking group offers bulletproof hosting in Syria, Lebanon ... Countries that represent the new heaven for cybercriminals   IntelCrawler: «Near East – new heaven for bulletproof hosting...

December 11, 2013  By Pierluigi Paganini   Posted In  Cyber Crime  Cyber warfare  Intelligence  Security 

Zero-day vulnerability exploits, too precious commodities

NSS Labs issued the report titled "The Known Unknowns" to explain dynamics behind the market of zero-day exploits. Last week I discussed about the necessity to define a model for "cyber conflict" to qualify the principal issues related to the use of cyber...

December 8, 2013  By Pierluigi Paganini   Posted In  Cyber Crime  Cyber warfare  Malware  Security 

Cyber warfare – Why we need to define a model of conflict?

Cyber warfare or information warfare is still a gray area of the military doctrine, it is necessary to define the "model of conflict" and rules for the actors. Cyber war and cyber information warfare are two terms very inflated used to describe the current...

December 6, 2013  By Pierluigi Paganini   Posted In  Cyber warfare  Intelligence  Laws and regulations  Security 


« First‹ Previous93949596979899100101Next ›Last »
Page 97 of 114



Copyright 2021 Security Affairs by Pierluigi Paganini All Right Reserved.
Back to top
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
Cookie SettingsAccept All
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT