Cyber warfare

ICS-CERT MONITOR report states most critical infrastructure attacks involve APTsICS-CERT MONITOR report states most critical infrastructure attacks involve APTs

ICS-CERT MONITOR report states most critical infrastructure attacks involve APTs

DHS ICS-CERT MONITOR report reveals that most critical infrastructure attacks involve APTs, but organizations lack monitoring capabilities. The DHS’s Industrial…

10 years ago
EquationDrug, the hacking platform of the Equation Group APTEquationDrug, the hacking platform of the Equation Group APT

EquationDrug, the hacking platform of the Equation Group APT

Experts at Kaspersky Lab published a detailed analysis of the EquationDrug platform and its modules developed by the Equation Group…

10 years ago
Pentagon plans to hire 3,000 Cyber pros for the US Cyber CommandPentagon plans to hire 3,000 Cyber pros for the US Cyber Command

Pentagon plans to hire 3,000 Cyber pros for the US Cyber Command

Federal officials announced that military received the green light to hire 3,000 cyber experts to assign to the US Cyber…

10 years ago
Information Warfare – Iran vs America. Why buy a weapon when I have a keyboard?Information Warfare – Iran vs America. Why buy a weapon when I have a keyboard?

Information Warfare – Iran vs America. Why buy a weapon when I have a keyboard?

A newly disclosed secret report illustrates the tightening of cyber dispute between the United States and Iran , both for…

10 years ago
Cyber Experts in North Korea Target the West and Especially Infrastructure of Critical ImportanceCyber Experts in North Korea Target the West and Especially Infrastructure of Critical Importance

Cyber Experts in North Korea Target the West and Especially Infrastructure of Critical Importance

North Korea holds an impressive army of cyber warriors, with over 3,000 sophisticated professionals. According to the claims of people…

10 years ago
CyberCriminals and their APT and AVT TechniquesCyberCriminals and their APT and AVT Techniques

CyberCriminals and their APT and AVT Techniques

The cyber security expert Ashiq JA analyzed the principal characteristics of APT (Advanced Persistent Threat) and AVT (Advanced Volatile Threat)…

10 years ago
US State Department – Hackers still in the Email SystemUS State Department – Hackers still in the Email System

US State Department – Hackers still in the Email System

Three months from the incursion in the network of the U.S. State Department e-mail system, US specialists are still working…

10 years ago
US Government Has Developed a Manhattan Project for Cyber Attacks, Rather than For Defensive PurposesUS Government Has Developed a Manhattan Project for Cyber Attacks, Rather than For Defensive Purposes

US Government Has Developed a Manhattan Project for Cyber Attacks, Rather than For Defensive Purposes

A cyber Manhattan Project seems to have been on the move for over a decade, providing the US with a…

10 years ago
The Equation Group shows most complex and sophisticated hacking techniques ever seenThe Equation Group shows most complex and sophisticated hacking techniques ever seen

The Equation Group shows most complex and sophisticated hacking techniques ever seen

Experts at Kaspersky Lab revealed that the capabilities of the Equation Group Surpass anything known in terms of sophistication of…

10 years ago
British army creates the 77th battalion to fight through social networksBritish army creates the 77th battalion to fight through social networks

British army creates the 77th battalion to fight through social networks

The British Government has announced the creation of the 77th battalion, a cyber unit composed of soldiers familiar with social…

10 years ago