• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Must Read

  • Millions of travelers of several airlines impacted by SITA data breach
  • GoldMax, GoldFinder, and Sibot, 3 new malware used by SolarWinds attackers
  • Managed Services provider CompuCom by Darkside ransomware
  • Five privilege escalation flaws fixed in Linux Kernel
  • Sunshuttle, the fourth malware allegedly linked to SolarWinds hack
  • VMware addresses Remote Code Execution issue in View Planner
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Home Posts tagged "Vault7"

Vault7

WikiLeaks revealed Project Protego, a secret CIA Missile Control System Project for fighters

WikiLeaks has published a new batch of documents that details the Project...

September 7, 2017  By Pierluigi Paganini

Wikileaks: BothanSpy and Gyrfalcon CIA Implants steal SSH Credentials from Windows and Linux OSs

WikiLeaks leaked documents detailing BothanSpy and Gyrfalcon CIA implants...

July 6, 2017  By Pierluigi Paganini

Wikileaks – CIA developed OutlawCountry Malware to hack Linux systems

WikiLeaks released a new batch of documents that detail the CIA tool OutlawCountry used...

July 1, 2017  By Pierluigi Paganini

Wikileaks – The Elsa malware allows CIA to locate users via WiFi-enabled devices

WikiLeaks published the manual of the ELSA malware, a tool allegedly used...

June 28, 2017  By Pierluigi Paganini

Brutal Kangaroo is the CIA tool suite for hacking Air-Gapped Networks

WikiLeaks has published a new batch of Wikileaks documents that detail...

June 22, 2017  By Pierluigi Paganini

WikiLeaks Reveals the Marble framework, used by the CIA to make hard the attribution

WikiLeaks has published the third batch of documents dubbed Marble that...

April 1, 2017  By Pierluigi Paganini

CHIPSEC, Intel Security releases detection tool also for CIA EFI rootkits

After CIA leak, Intel Security releases CHIPSEC, a detection tool for EFI rootkits...

March 13, 2017  By Pierluigi Paganini

Wikileaks Vault7: CIA Umbrage team, the factory of false flag ops

Wikileaks Vault7 data leak -  the Umbrage team was tasked by the Central...

March 8, 2017  By Pierluigi Paganini

Wikileaks CIA Files – What this means for Internet security and encryption

Earlier today, Wikileaks dumped a large database of secret documents from...

March 8, 2017  By Pierluigi Paganini


Copyright 2021 Security Affairs by Pierluigi Paganini All Right Reserved.
Back to top
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me
This site uses cookies, including for analytics, personalization, and advertising purposes. For more information or to change your cookie settings, click here.

If you continue to browse this site without changing your cookie settings, you agree to this use.
Accept Read More
Privacy and Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled

Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.

Non-necessary

Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.

SAVE & ACCEPT