Cyber warfare

The Infy malware, a long running threat from IranThe Infy malware, a long running threat from Iran

The Infy malware, a long running threat from Iran

Researchers at Palo Alto Networks have come across a new threat used by alleged Iran-linked Hackers in attacks since 2007.…

9 years ago
Air Force Intranet Control, the first Cyberspace Weapon System is operativeAir Force Intranet Control, the first Cyberspace Weapon System is operative

Air Force Intranet Control, the first Cyberspace Weapon System is operative

The Air Force earlier this month announced the launch of its first cyberspace weapon system, the Air Force Intranet Control…

9 years ago
PLATINUM APT targeted organizations in South and Southeast AsiaPLATINUM APT targeted organizations in South and Southeast Asia

PLATINUM APT targeted organizations in South and Southeast Asia

Microsoft issued a detailed report on the activity of the hacking crew dubbed Platinum APT group that leveraged a Windows…

9 years ago
The US Cyber Command started the attacks on the Islamic StateThe US Cyber Command started the attacks on the Islamic State

The US Cyber Command started the attacks on the Islamic State

The US Government has announced to have launched a series of cyber attacks against the Islamic State coordinated by the…

9 years ago
Asian Nation-State hackers use fileless RAT for their hacking campaignAsian Nation-State hackers use fileless RAT for their hacking campaign

Asian Nation-State hackers use fileless RAT for their hacking campaign

State-sponsored actors in Asia have been leveraging fileless RAT for their hacking campaigns in order to avoid the detection. Security…

9 years ago
The Australian government presents its Cyber Security StrategyThe Australian government presents its Cyber Security Strategy

The Australian government presents its Cyber Security Strategy

The Australian government has presented his Cyber Security Strategy and admitted the ability to conduct offensive cyber operations. The Australian…

9 years ago
“Restricted” NATO manual accidentally leaked to boat operators“Restricted” NATO manual accidentally leaked to boat operators

“Restricted” NATO manual accidentally leaked to boat operators

Incredible, secret plans for NATO exercise Joint Warrior 161 were accidentally sent to Scottish fishermen and ferry operators emails. During…

9 years ago
The Four Element Sword, weaponized document builder used in APT AttacksThe Four Element Sword, weaponized document builder used in APT Attacks

The Four Element Sword, weaponized document builder used in APT Attacks

Experts analyzed a dozen attacks that leveraged on malicious RTF documents created using the same Four Element Sword builder. Security…

9 years ago
Is there electronic warfare behind the block of Swedish air traffic control systems?Is there electronic warfare behind the block of Swedish air traffic control systems?

Is there electronic warfare behind the block of Swedish air traffic control systems?

Swedish experts warned of an electronic warfare attack on its air traffic control systems occurred in November. Is it electronic…

9 years ago
APT6 compromised the US government networks for yearsAPT6 compromised the US government networks for years

APT6 compromised the US government networks for years

The federal bureau of investigation issued an alert related the APT6 state-sponsored hacking group that has compromised the US Government…

9 years ago