Cyber warfare

ISIS cell calls on supporters to kill 100 US military personnelISIS cell calls on supporters to kill 100 US military personnel

ISIS cell calls on supporters to kill 100 US military personnel

A cell of the ISIS has called on its members and backers in the US to kill 100 service members…

10 years ago
Operation Woolen Goldfish, a hacking campaign in the wildOperation Woolen Goldfish, a hacking campaign in the wild

Operation Woolen Goldfish, a hacking campaign in the wild

Security experts at Trend micro uncovered a new hacking campaign dubbed Operation Woolen Goldfish likely run by a threat actor…

10 years ago
China and its cyber capabilities, are you really surprised?China and its cyber capabilities, are you really surprised?

China and its cyber capabilities, are you really surprised?

China has admitted the existence in its military organization of special information warfare units, I contacted one of the greatest…

10 years ago
China admitted the existence of Information warfare unitsChina admitted the existence of Information warfare units

China admitted the existence of Information warfare units

For the first time China has publicly admitted the existence in its military organization of special information warfare units.  Since…

10 years ago
North Korea Internet outage could be a response to Sony HackNorth Korea Internet outage could be a response to Sony Hack

North Korea Internet outage could be a response to Sony Hack

According to a US Lawmaker North Korea Internet outage occurred in December could be a response for the cyber attack…

10 years ago
South Korea – Hacker requests money for data on nuclear plantsSouth Korea – Hacker requests money for data on nuclear plants

South Korea – Hacker requests money for data on nuclear plants

Hacker who posted online information on Nuclear Plants in South Korea demands money for not selling other sensitive information to…

10 years ago
Cyber attacks against Organizations increased once againCyber attacks against Organizations increased once again

Cyber attacks against Organizations increased once again

71 percent of organizations were victims of successfully cyber attacks in 2014 according to the “2015 Cyberthreat Defense Report” report.…

10 years ago
ICS-CERT MONITOR report states most critical infrastructure attacks involve APTsICS-CERT MONITOR report states most critical infrastructure attacks involve APTs

ICS-CERT MONITOR report states most critical infrastructure attacks involve APTs

DHS ICS-CERT MONITOR report reveals that most critical infrastructure attacks involve APTs, but organizations lack monitoring capabilities. The DHS’s Industrial…

10 years ago
EquationDrug, the hacking platform of the Equation Group APTEquationDrug, the hacking platform of the Equation Group APT

EquationDrug, the hacking platform of the Equation Group APT

Experts at Kaspersky Lab published a detailed analysis of the EquationDrug platform and its modules developed by the Equation Group…

10 years ago
Pentagon plans to hire 3,000 Cyber pros for the US Cyber CommandPentagon plans to hire 3,000 Cyber pros for the US Cyber Command

Pentagon plans to hire 3,000 Cyber pros for the US Cyber Command

Federal officials announced that military received the green light to hire 3,000 cyber experts to assign to the US Cyber…

10 years ago