Cyber warfare

Russian Army is largely investing in modern UAVsRussian Army is largely investing in modern UAVs

Russian Army is largely investing in modern UAVs

The Russian Defense Ministry confirmed that the Russian Army received over 1,500 modern UAVs in the last four years. Almost…

9 years ago
iSight Partners says the Sandworm APT is involved Ukrainian power outageiSight Partners says the Sandworm APT is involved Ukrainian power outage

iSight Partners says the Sandworm APT is involved Ukrainian power outage

The Russian Sandworm APT group if the first suspect for the Ukrainian power outage, states experts at eiSight Partners. According to a…

9 years ago
Hackers cause power outage with malware in Ukraine. Is it an Information warfare act?Hackers cause power outage with malware in Ukraine. Is it an Information warfare act?

Hackers cause power outage with malware in Ukraine. Is it an Information warfare act?

Hackers cause power outage with the BlackEnergy malware in Ukraine. Is it an Information warfare act? Cyber security of ICS…

9 years ago
BlackEnergy targets Ukrainian news media and electric industryBlackEnergy targets Ukrainian news media and electric industry

BlackEnergy targets Ukrainian news media and electric industry

Security experts at ESET firm provided details of the new campaign based on the BlackEnergy Trojan that targeted Ukrainian news…

9 years ago
US Eavesdropping on Netanyahu CommunicationsUS Eavesdropping on Netanyahu Communications

US Eavesdropping on Netanyahu Communications

After a report from the WSJ, the US Government is facing an allegation regarding eavesdropping of Israeli Prime Minister Netanyahu…

9 years ago

Are Russian hackers infecting critical infrastructure in Ukraine?

The Ukrainian Government is blaming Russians state-sponsored hackers for a number of electricity cut-offs occurred in Western Ukraine. The Ukrainian…

9 years ago
Zero knowledge proof as an enabler for Cyber weapon information sharingZero knowledge proof as an enabler for Cyber weapon information sharing

Zero knowledge proof as an enabler for Cyber weapon information sharing

About the Zero knowledge proof and the ability to proof capability to attack or to defence implementing the cyber deterrence.…

9 years ago
Turkish systems under attack. Is it information warfare?Turkish systems under attack. Is it information warfare?

Turkish systems under attack. Is it information warfare?

Turkish systems are suffering a major cyber attack which is causing serious problems to organizations in the country. Is is…

9 years ago
Roaming Tiger Hackers targets Russian organizations for espionageRoaming Tiger Hackers targets Russian organizations for espionage

Roaming Tiger Hackers targets Russian organizations for espionage

Security researchers from ESET uncovered the Roaming Tiger hacking campaign, bad actors in the wild are targeting Russian organizations. Roaming…

9 years ago
Iranian hackers penetrated computers of a small dam in NYIranian hackers penetrated computers of a small dam in NY

Iranian hackers penetrated computers of a small dam in NY

Iranian hackers penetrated the industrial control system of a dam near New York City in 2013, raising concerns about the…

9 years ago