Russia will deploy jamming systems in Syria to protect its air forces and prevent attacks against its aircraft. The Russian army in Syria is planning to launch electronic warfare in the country with the institution of jamming systems. The jamming systems are an essential component of the Russian military strategy that aims to prevent attacks against its troops in the area. On Tuesday, […]
The former British defence secretary Des Browne is warning that the Trident nuclear weapons system could be vulnerable to cyber-attack. According to the Guardian, the former British defence secretary Des Browne called on the British Prime Minister to assess the resilience to cyber attacks of the Trident nuclear weapons system. “The UK Trident programme encompasses the […]
Facebook was the first company to notice the intrusion of Iranian Hackers in the e-mail accounts of US State Department officials focused on Iran. The attacks appear politically motivated and aimed to gather data about US-Iranian dual citizens in Iran. Earlier this month, the computers at the US State Department and other government employees were targeted by hackers. […]
Experts from Check Point firm published a new report on the Rocket Kitten APT that include more insight into the activities of the group. Do you remember the Rocket Kitten ATP? The Rocket Kitten group has been suspected to be active since 2011 and have been increasing their activity since 2014. The main targets are based in the Middle […]
The Der Spiegel magazine reported German Intelligence Agency BND “systematically spied” on its allies and several international organizations. In the last months, the German Intelligence has accused the NSA of spying on Government members, including the Chancellor Angela Merkel. In October, the German authorities have launched a probe into allegations of a new case of US espionage […]
US Army Military experts urge the establishment of an Army Vulnerability Response Program (AVRP), a sort of military bug bounty program. What happen when bug hunters have to work with high sensitive environment? An interesting post published by the Cyber Defense Review raises the discussion about the was way to handle vulnerabilities in the information security infrastructure of the […]
In Israel there is an advanced cyber security industry, based mostly on veterans from two intelligence units, the cyber labor market is a new guild. Cyber technology could be a catalyst to equality in the labor market. Its power is seeded in the ability of everyone to gain skills without social entry barriers. To succeed […]
The German authorities have launched a probe into allegations of a new case of US espionage after they have found a laptop infected by the Regin Spyware. The German authorities have launched a probe into allegations of a new cyber-espionage campaign that is suspected to be linked to the US intelligence. The news was revealed […]
The Pawn Storm APT group set up rogue VPN and SFTP servers to target Dutch Safety Board employees involved in the MH17 crash investigation. July 17, 2014, Flight MH17, traveling from Amsterdam to Kuala Lumpur, was shot down by a missile in mysterious circumstances. Flight MH17 was flying over a conflict zone in eastern Ukraine […]
A new collection of documents disclosed by a new whistleblower and leaked online by The Intercept revealed new inconvenient truth on drone wars. Many USA government documents were leaked in the past years, Chelsea Manning, WikiLeaks, Edward Snowden showed the world that activists were behind. They are responsible for the disclosure of inconvenient truth. Governments […]