Intelligence

Pierluigi Paganini February 06, 2016
US and UK mutual agreement on wiretap orders and search warrants

The US and UK authorities are working on a secret agreement that would allow a mutual access to data of their private companies. The imperative is “monitor everything,” for espionage, business, and homeland security. Now the British Government is  negotiating with the US Government the possibility to allow the British intelligence to tap into servers the US companies. The Washington […]

Pierluigi Paganini February 05, 2016
Australian NSW Government Department of Resources and Energy under attack. Is it Chinese cyber espionage?

According to the NSW Government Department of Resources and Energy Chinese hackers have launched a malware-based attack on its network in December. The Australian NSW Government Department of Resources and Energy revealed that in December 2015 unknown hackers targeted its systems. In the same period, the organization was launching a number of important projects, including […]

Pierluigi Paganini February 04, 2016
ISIS’s Afaaq Electronic Foundation (AEF) spreads awareness on anti-surveillance tools

Afaaq Electronic Foundation (AEF) is conducting a training campaign to spread awareness on anti-surveillance software among ISIS members. The members of the Islamic state have a strong propensity for the technology is a reality, and this is confirmed by the news that I am going to share with you. The ISIS always instructs its militants […]

Pierluigi Paganini February 01, 2016
Audit shows Department of Homeland Security 6 billion U.S. Dollar firewall not so effective against hackers

A multi-billion U.S. Dollar firewall run by the Department of Homeland Security meant to detect and prevent nation-state hacks against the government functions ineffectively, according to a sanitized version of a secret federal audit. The National Cybersecurity Protection System (NCPS), also known as EINSTEIN, is a firewall run by the Department of Homeland Security. It’s goal: […]

Pierluigi Paganini February 01, 2016
New docs confirm CIA planned to kidnap Snowden

Documents obtained by Denfri.dk media confirm rendition flight used Copenhagen Airport for mission to kidnap Edward Snowden. According to documents obtained by the Danish media outlet Denfri.dk, the US CIA agency is planning to kidnap Edward Snowden. The documents were obtained by Denfri through a Freedom of Information Act suit in August 2015. Docs confirm #Scotland and […]

Pierluigi Paganini January 29, 2016
Anarchist operation, US and UK spied on Israeli UAVs and fighter jets

Anarchist operation – US and UK intelligence secretly tapped into live video feeds from Israeli UAVs and fighter jets, monitoring military operations. According to a new lot of documents leaked by the popular whistleblower Edward Snowden, the US and British intelligence agencies have hacked for years into Israeli Air Surveillance under an operation codenamed Anarchist. Snowden, who served as an […]

Pierluigi Paganini January 28, 2016
ISIS offers hackers up to $10,000 to hack govt websites

The ISIS radical group is trying to infiltrate the Indian hacking community by offering money to hack government websites. 30,000 people on social media have been already contacted by the group. Members of the ISIS are willing to pay Indian hackers to hack into government websites and gain access to sensitive documents. The radical organization […]

Pierluigi Paganini January 27, 2016
Government Agencies probed over use of backdoored Juniper equipment

The U.S. House Oversight and Government Reform Committee is probing US Government Agencies over use of backdoored Juniper equipment. A number of US Government Agencies are concerned about the use of Juniper firewalls affected by the recently uncovered backdoor. The U.S. House Oversight and Government Reform Committee has sent letters to dozens of government agencies and departments asking […]

Pierluigi Paganini January 23, 2016
New RAT Trochilus, a sophisticated weapon used by cyber spies

Researchers spotted a new espionage campaign relying on a number of RATs including the powerful Trochilus threat. Security experts have uncovered a new remote access Trojan (RAT) named Trochilus that is able to evade sandbox analysis. The Trochilus malware was used to targeted attacks in multi-pronged cyber espionage operations. Experts at Arbor Networks uncovered a cyber […]

Pierluigi Paganini January 22, 2016
Potentially backdoored AMX equipment being used by US President Obama and US Military

Experts from the security firm SEC Consult discovered a backdoor in the AMX equipment being used by US President Obama and the US Military. AMX is a company that supplies communications systems and building control equipment to the US military, the White House and many other security organizations in the States. The particularity of these systems is the […]