The data intelligence firm Flashpoint has published an interesting report that explore the cyber capabilities of the ISIS radical group. In the last days of April, Flashpoint a global leader in Deep and Dark Web data and intelligence published a report that is dedicated to the analysis of cyber capabilities of the ISIS with the […]
Security researchers at the MIT designed an Artificial Intelligence system called AI2 that is able to detect 85 percent of attacks. While the number of cyber attacks continues to increase it is becoming even more difficult to detect and mitigate them in order to avoid serious consequences. A group of researchers at MIT’s Computer Science […]
Two security researchers from Cornell Tech discovered that web URL shorteners operate in predictable way exposing sensitive data. The security researchers Vitaly Shmatikov and Martin Georgiev from Cornell Tech discovered that web URL shorteners operate in predictable way, and this could result in the disclosure of sensitive information. The duo analyzed the most popular URL shorteners, […]
Recently the intelligence firms Intelliagg and Darksum have issued an interesting report on the Dark Web and related mapping. We have discussed several times about Deep Web and Dark Web, discussing the reason why the hidden part of the web is even more dangerous. However the darknets aren’t a prerogative of criminal organizations, a good portion […]
For the first time in a decade, the US National Institute of Standards and Technology (NIST) has updated its secure email guide. The last effort of the NIST Agency in the development of email security guidelines is dated 2007 when it published the  NIST SP 800-45, Version 2 – Guidelines on Electronic Mail Security. The […]
A new study reveals that terrorist organizations are largely uninterested in using resources and services hosted on the dark web. Every day I receive a lot of requests about terrorist activities in the Dark Web, and contrary to what you might think anonymizing networks like Tor and I2PÂ aren’t cyber places preferred by terrorist organizations. My […]
According to a recent report, Germany nuclear plants are vulnerable to terrorists and there needs to be some serious dealing with this problem. According to a recently released report, Germany is not adequately equipped to prevent terrorist attacks in its nuclear plants. According to the Deutsche Presse-Agentur (DPA) news agency, the report was presented by Oda Becker, […]
According to the recent Verizon breach digest for March 2016 hackers breached a water utility and manipulated systems for water treatment and flow control. The story that I’m telling you is very disturbing, according to the Verizon breach digest for March 2016 a group of hackers breached a water utility and manipulated systems for water treatment and flow […]
From August 2015 to February 2016 Buhtrap group managed to conduct 13 successful attacks against Russian banks for a total amount of $25.7 mln. Since August of 2015, the Buhtrap group has conducted 13 successful attacks against financial institutions stealing more than â˝1.86 billion RUB ($27.4M USD). In April 2015, ESET discovered a malware campaign dubbed Operation Buhtrap, […]
Over the weekend Apple customers who were looking for the latest version of Transmission were infected by KeRanger MAC OS X ransomware. Bad news for Apple customers, their systems were targeted for the first time over the weekend by a ransomware campaign. The experts at Palo Alto Networks Unit 42 who discovered the malicious campaign reported that Apple […]