Cyber warfare

China admitted the existence of Information warfare units

For the first time China has publicly admitted the existence in its military organization of special information warfare units.  Since…

9 years ago

North Korea Internet outage could be a response to Sony Hack

According to a US Lawmaker North Korea Internet outage occurred in December could be a response for the cyber attack…

9 years ago

South Korea – Hacker requests money for data on nuclear plants

Hacker who posted online information on Nuclear Plants in South Korea demands money for not selling other sensitive information to…

9 years ago

Cyber attacks against Organizations increased once again

71 percent of organizations were victims of successfully cyber attacks in 2014 according to the “2015 Cyberthreat Defense Report” report.…

9 years ago

ICS-CERT MONITOR report states most critical infrastructure attacks involve APTs

DHS ICS-CERT MONITOR report reveals that most critical infrastructure attacks involve APTs, but organizations lack monitoring capabilities. The DHS’s Industrial…

9 years ago

EquationDrug, the hacking platform of the Equation Group APT

Experts at Kaspersky Lab published a detailed analysis of the EquationDrug platform and its modules developed by the Equation Group…

9 years ago

Pentagon plans to hire 3,000 Cyber pros for the US Cyber Command

Federal officials announced that military received the green light to hire 3,000 cyber experts to assign to the US Cyber…

9 years ago

Information Warfare – Iran vs America. Why buy a weapon when I have a keyboard?

A newly disclosed secret report illustrates the tightening of cyber dispute between the United States and Iran , both for…

9 years ago

Cyber Experts in North Korea Target the West and Especially Infrastructure of Critical Importance

North Korea holds an impressive army of cyber warriors, with over 3,000 sophisticated professionals. According to the claims of people…

9 years ago

CyberCriminals and their APT and AVT Techniques

The cyber security expert Ashiq JA analyzed the principal characteristics of APT (Advanced Persistent Threat) and AVT (Advanced Volatile Threat)…

9 years ago

This website uses cookies.