The Russian Intelligence agency, the FSB, announced the discovery of a spyware in the computer networks belonging to at least 20 organizations. While security experts and the US law enforcement speculate the involvement of Russian state-sponsored hackers behind the DNC hack, the Federal Security Service, the FSB, announced the discovery of a spyware in state […]
Media outlet continues to publish news regarding the DNC hack, computer servers used by Clinton campaign were compromised as part of DNC hack. The news of the recent Democratic National Convention (DNC) hack is monopolizing the technological debate around the US presidential campaign. Yesterday I reported the news of another hack against the operation of the DNC, according to the Reuters, […]
The notorious hacker Detox Ransome was searching for Heartbleed vulnerable servers when found and stole a Democratic National Committee DB in 2015. According to The Epoch Times, the notorious hacker Detox Ransome stole Democrat Databases in 2015. In September 2015, the hacker breached a service linked to the operations of the Democratic National Committee accessing the internal database. Detox […]
Security experts at Symantec revealed that the Patchwork hacker crew is now expanding espionage activities on companies in a wide range of industries. Security experts from Symantec have spotted a new cyber espionage campaign managed by the Patchwork group targeting organizations in multiple industries. The hacker crew is a well-known group, its activities are focused on diplomatic […]
New evidence collected by investigators suggests that hackers that attacked DNC penetrated deeper than previously thought. In June, the security research firm CrowdStrike reported on a cyber breach of the Democratic National Committee (DNS). CrowdStrikeâs incident response time discovered not one, but two hacking groups that it considers âsome of the best adversaries out of the all […]
The NSA whistleblower Edward Snowden and the popular hacker Andrew âBunnieâ Huang designed Introspection Engine, an interesting anti-surveillance device. While the number of mobile devices is outclassing the number of desktop ones, the concern about the surveillance activities conducted by governments is growing as never before also thanks the Snowden revelations. Mobile devices, often unprotected, […]
The Turkish Government blocked the access to WikiLeaks after release of the Erdogan emails, 300,000 government emails date 2010 to July this year. Cyberspace and the real world are even more interdependent, the observation of the events in both environments is an essential activity for the analysts to predict evolutionary scenarios. The world is attending events […]
The Labs team at SentinelOne recently discovered a sophisticated malware dubbed Furtim specifically targeting at least one European energy company. In May of this year, security researcher Yotam Gottesam with enSilo, began unraveling a mystery that continues to unravel. First reported by FireF0X, a self-proclaimed âex-malware analystâ located in the Russian Federation, the Furtim malware […]
The National Security Agency (NSA) has reportedly turned its focus on Tor and Linux users, having recently shown a keen interest in these usersâ online activities. The NSA has gone as far as calling users of products such as The Amnesic Incognito Live System (Tails) and Tor as extremists. Readers of Linux Journal were also […]
Report on wiretaps in 2015 suggests Americans are using less encryption to hide their activities online, is it really true. Last week, a wiretap report from 2015 surfaced on the United States Courts website that suggests Americans are using less encryption to hide their activities online but the report may not tell the whole story. […]