DHS ICS-CERT MONITOR report reveals that most critical infrastructure attacks involve APTs, but organizations lack monitoring capabilities. The DHSâs Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) has issued its new ICS-CERT MONITOR report related to the period September 2014 â February 2015. The ICS-CERT MONITOR report According to the report, the Industrial Control Systems […]
Experts at Kaspersky Lab published a detailed analysis of the EquationDrug platform and its modules developed by the Equation Group APT. Recently experts at Kaspersky Lab have uncovered the Equation Group hacking crew, the most sophisticated ever APT. Security researchers at Kaspersky Lab revealed that the capabilities of the Equation Group surpass anything known in […]
Federal officials announced that military received the green light to hire 3,000 cyber experts to assign to the US Cyber Command. Information warfare is strategic for almost every government, North Korea, Russia, China, Danmark are among the countries that are more investing to improve their cyber capabilities, and of course, the Five Eyes. The US Department of […]
A newly disclosed secret report illustrates the tightening of cyber dispute between the United States and Iran , both for spying and sabotage. Since Robert Tappan Morris in 1988 created the first worm, cyberspace started to change its virtual state in a critical cyberwar field. Even if the first worm was an error, aimed at […]
North Korea holds an impressive army of cyber warriors, with over 3,000 sophisticated professionals. According to the claims of people who have escaped to South Korea, their main target is none other than Western infrastructure of critical value. Over 3,000 cyber experts have been recruited by North Korea, in the countryâs attempt to harm the […]
The cyber security expert Ashiq JA analyzed the principal characteristics of APT (Advanced Persistent Threat) and AVT (Advanced Volatile Threat) . Cybercriminals and their techniques in the APT and AVT attacks âAPT is an attack in the persistent memory that resides in the victims machine without getting noticed and the attacker exfiltrates sensitive information from […]
Three months from the incursion in the network of the U.S. State Department e-mail system, US specialists are still working to secure the networks. In November 2014 the State Department has taken the unprecedented step of shutting down its entire unclassified email system in response to a suspected cyber attack. ‘Activity of concern’ was detected in the […]
A cyber Manhattan Project seems to have been on the move for over a decade, providing the US with a great advantage related to online surveillance. Despite belief, no defensive purposes have triggered its setting up. Everybody recalls the notorious Manhattan Project at the end of World War II, which has resulted in the development […]
Experts at Kaspersky Lab revealed that the capabilities of the Equation Group Surpass anything known in terms of sophistication of hacking techniques. Security experts at Kaspersky revealed the existence of a hacking group operating since 2001 that targeted practically every industry with sophisticated zero-day malware. According to a new report from Kaspersky Lab, this group, dubbed […]
The British Government has announced the creation of the 77th battalion, a cyber unit composed of soldiers familiar with social media. The documents leaked by Edward Snowden demonstrate that the NSA and its allies are now preparing for future dominance in cyberspace. The cyberspace is a strategic domain for modern warfare, for this reason, the […]