Cyber warfare

Authors of Duqu 2.0 used a stolen digital certificate in attacksAuthors of Duqu 2.0 used a stolen digital certificate in attacks

Authors of Duqu 2.0 used a stolen digital certificate in attacks

Malware authors behind the Duqu 2.0 used a stolen certificate from the Foxconn company to implement a persistence mechanism and…

10 years ago
OPM data offered for sale on the Dark WebOPM data offered for sale on the Dark Web

OPM data offered for sale on the Dark Web

Government records stolen in the recent data breach at the US OPM (Office of Personnel Management) are surfacing from the…

10 years ago
Security Affairs newsletter Round 13– Best of the week from best sourcesSecurity Affairs newsletter Round 13– Best of the week from best sources

Security Affairs newsletter Round 13– Best of the week from best sources

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free…

10 years ago
Bundestag may need to replace 20,000 computers after the hackBundestag may need to replace 20,000 computers after the hack

Bundestag may need to replace 20,000 computers after the hack

German media states that Bundestag may need to replace 20,000 computers after the recent attack, an operation that could cost…

10 years ago
Duqu 2.0 the most sophisticated threat ever seen targeted also KasperskyDuqu 2.0 the most sophisticated threat ever seen targeted also Kaspersky

Duqu 2.0 the most sophisticated threat ever seen targeted also Kaspersky

Threat actors used a Duqu 2.0 worm in a series of attacks worldwide that also breached the systems at Kaspersky…

10 years ago
EINSTEIN defense system is more than a headache for the US governmentEINSTEIN defense system is more than a headache for the US government

EINSTEIN defense system is more than a headache for the US government

After 4M records may have been stolen and Chinese hackers are the prime suspects, the US Govrecognizes the usefulness of…

10 years ago
Security Affairs newsletter Round 12 – Best of the week from best sourcesSecurity Affairs newsletter Round 12 – Best of the week from best sources

Security Affairs newsletter Round 12 – Best of the week from best sources

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free…

10 years ago
Chinese hackers had access to millions records of US workersChinese hackers had access to millions records of US workers

Chinese hackers had access to millions records of US workers

US Government announced that a major data breach likely backed by Chinese hackers caused the exposure of data belonging to…

10 years ago
Are Russian hackers behind the Bundestag cyber attack?Are Russian hackers behind the Bundestag cyber attack?

Are Russian hackers behind the Bundestag cyber attack?

Security experts involved in investigation on the attack against the Bundestag suspect that the hack was part of a large-scale…

10 years ago
Bundestag, the Government confirmed a data breach and data leaksBundestag, the Government confirmed a data breach and data leaks

Bundestag, the Government confirmed a data breach and data leaks

The German Government confirmed that hackers that attacked the Bundestag two weeks ago have had access to data of the…

10 years ago