China

Pierluigi Paganini April 23, 2014
An overview on the Bad Bot Landscape by Distil Networks

Distil Networks security firm has published an interesting report on the Bad Bot Landscape, it is full of data on the evolution of malicious architecture. Surfing on the Internet I have found The Bad Bot Landscape Report Q1 2014 and interesting study issued by the Distil Networks security firm which provides an interesting analysis of botnet evolution detected by the […]

Pierluigi Paganini April 15, 2014
APWG report 2H2013- Analysis of phishing phenomena on global scale

The APWG report 2H2013 seeks to understand trends and their significance by quantifying the scope of the global phishing problem. Last Anti-Phishing Working Group APWG report titled “Global Phishing Survey: Trends and Domain Name Use in 2H2013” confirms that threat of phishing has never been so high, the number of domains registered to conduct this kind of […]

Pierluigi Paganini March 28, 2014
Google Transparency Report at first glance

Google has published its new Google Transparency Report related to the second semester of 2013, the number of requests for user information is still increasing. While the Internet users continue to claim their right to online privacy condemning the numerous surveillance program and the censorship conducted by governments all around the world, it seems that the […]

Pierluigi Paganini March 27, 2014
FireEye uncovered APTs exploiting interest on Malaysian Flight MH370

Security experts at FireEye uncovered a cyber espionage campaign based on multiple MH370 themed spear phishing emails. Security researchers at FireEye have revealed a link between a recent spear phishing campaign on Malaysian Airlines flight MH370 and the attacks conducted by some advanced persistent threat (APT) attackers. The mysterious skyjacking of the Boeing 777-200 aircraft of Malaysian Airlines, flight MH370, is considered one of the events […]

Pierluigi Paganini March 23, 2014
NSA hacked Huawei network for cyber espionage

NSA leaked documents, analyzed by Der Spiegel and The Times, report that NSA has hacked Huawei network to demonstrate the link with Chinese PLA. In the past years, many times US authorities and private industry have accused Chinese electronics manufacturer Huawei of cyber espionage, let’s remind also that Symantec has broken its joint-venture with the […]

Pierluigi Paganini March 11, 2014
$5 Billion in Military Cyber Spending fivefold increase over last year

The Military Cyber Spending reserved by the Pentagon for cyber operations next year is $5 Billion, part of the comprehensive $496 billion fiscal 2015 budget $5 Billion in Military Cyber Spending, this is the budget reserved by the Pentagon for cyber operations next year, an impressive amount of money that demonstrates the high priority assigned […]

Pierluigi Paganini March 08, 2014
SNAKE – The last cyber espionage campaign on a large scale

BAE Systems Applied Intelligence has disclosed a Russian cyber espionage campaign codenamed as SNAKE that targeted Governments and Military Networks. The British cyber specialist BAE Systems Applied Intelligence has disclosed a Russian cyber espionage campaign codenamed as SNAKE that remained undetected for a log time, at least for eight years. The malware can infiltrate Windows XP, Vista, 7 […]

Pierluigi Paganini March 06, 2014
FireEye 2013 Advanced Threat Report on APTs campaigns

FireEye issued the 2013 Advanced Threat Report, the study provides a high-level overview of the computer network attacks by APTs discovered by the company.   Today I desire to analyze with you the data proposed by FireEye in the 2013 Advanced Threat Report (ATR), the study provides a high-level overview of the computer network attacks discovered […]

Pierluigi Paganini March 03, 2014
Uroburos rootkit, is it part of Russian Cyber weapon programme?

Researchers at German G Data published an interesting analysis for Uroborun rootkit alleged to be a component of Russian cyber weapons programme. Uroburos is considered an advanced rootkit that is active since as far back as 2011, it is used to infect networks belonging to high-level targets, stealing data after setting up rogue P2P networks, it targets […]

Pierluigi Paganini March 02, 2014
Government-built malware and cyber weapons will run out of control

F-Secure’s Chief Mikko Hyppönen at the TrustyCon explained the risk that Government-built malware and cyber weapons will run out of control. F-Secure’s Chief Research Officer Company Mikko Hyppönen at the TrustyCon conference in San Francisco explained that almost every government is spending a great effort to improve its cyber capabilities building a cyber weapon. “Governments writing […]