• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Must Read

  • VMware addresses ESXi issue disclosed at the Tianfu Cup hacking competition
  • CVE-2019-14899 flaw allows hijacking VPN connections on Linux, Unix systems
  • OpenBSD addresses authentication bypass, privilege escalation issues
  • China used the Great Cannon DDoS Tool against forum used by Hong Kong protestors
  • CyrusOne, one of the major US data center provider, hit by ransomware attack
  • The evolutions of APT28 attacks
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Home Posts tagged "state-sponsored attacks"

state-sponsored attacks

The ISIL is trying to hack American electrical power companies

US authorities confirmed that hackers belonging to the Islamic State (ISIL)...

October 17, 2015  By Pierluigi Paganini

The US energy industry is constantly under cyber attacks

Data related to the number of incidents occurred to national infrastructure...

November 19, 2014  By Pierluigi Paganini

Possible evolution of the dispute between Russia and Ukraine

Intelligence Analysts analyzing signals from the cyberspace have tried...

May 4, 2014  By Pierluigi Paganini

Windows XP deadline and security concerns

The end of support for Windows XP OS is at hand, the consequences could...

April 7, 2014  By Pierluigi Paganini

Disconcerting Report on cybersecurity for US Government entities

A report issued by The Federal Government's Track Record provides a scaring...

February 7, 2014  By Pierluigi Paganini

US Intelligence warns on Counterintelligence and cyber espionage

Intelligence officials now view the threat from counterintelligence, foreign...

February 5, 2014  By Pierluigi Paganini

FireEye has identified a new IE zero-day exploit

FireEye Labs has identified a new IE zero-day exploit used for a watering...

November 11, 2013  By Pierluigi Paganini

LinkedIn – How to exploit social media for targeted attacks

  The professional social network LinkedIn is a mine of information...

November 5, 2013  By Pierluigi Paganini

Syrian Electronic Army attacked most major Qatar websites

Syrian Electronic Army attacked most major Qatar websites to protest...

October 20, 2013  By Pierluigi Paganini

Reading IBM X-Force 2013 Mid-Year Trend and Risk Report

IBM issued the X-Force 2013 Mid-Year Trend and Risk Report, a detailed...

October 5, 2013  By Pierluigi Paganini


123
Page 1 of 3



Copyright 2015 Security Affairs by Pierluigi Paganini All Right Reserved.
Back to top
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me
This site uses cookies, including for analytics, personalization, and advertising purposes. For more information or to change your cookie settings, click here.

If you continue to browse this site without changing your cookie settings, you agree to this use.
Accept Read More
Privacy and Cookies Policy

Necessary Always Enabled