Cyber warfare

Analyze VirusTotal Metadata to profile hackersAnalyze VirusTotal Metadata to profile hackers

Analyze VirusTotal Metadata to profile hackers

An independent researcher has analyzed for years the metadata on submissions to VirusTotal service identifying patterns related to many bad…

11 years ago
Operation Arachnophobia, targeted attacks from PakistanOperation Arachnophobia, targeted attacks from Pakistan

Operation Arachnophobia, targeted attacks from Pakistan

Operation Arachnophobia is a cyber espionage campaign originated in Pakistan descovered by experts from FireEye and ThreatConnect. Researchers from FireEye…

11 years ago
Nuclear Regulatory Commission hit by foreign hackersNuclear Regulatory Commission hit by foreign hackers

Nuclear Regulatory Commission hit by foreign hackers

Nuclear Regulatory Commission systems were hacked three times in the last three years. According to investigators the bad actors are…

11 years ago
Kaspersky revealed that Stuxnet Exploits is still used worldwideKaspersky revealed that Stuxnet Exploits is still used worldwide

Kaspersky revealed that Stuxnet Exploits is still used worldwide

Experts at Kaspersky discovered that Stuxnet exploits targeting a Windows Shell Vulnerability is still largely used in cyber attacks. Stuxnet…

11 years ago
A new Citadel trojan variant includes different remote management tools to maintain persistence on victims PCA new Citadel trojan variant includes different remote management tools to maintain persistence on victims PC

A new Citadel trojan variant includes different remote management tools to maintain persistence on victims PC

Experts at IBM discovered a new variant of Citadel banking malware which includes different remote management tools to maintain persistence…

11 years ago
Kaspersky report on Energetic Bear – Crouching Yeti APT campaignKaspersky report on Energetic Bear – Crouching Yeti APT campaign

Kaspersky report on Energetic Bear – Crouching Yeti APT campaign

The Kaspersky Lab Team has issued a report which includes details of the investigation related to the Energetic Bear –…

11 years ago
Gyges, the mixing of commercial malware with cyber weapon codeGyges, the mixing of commercial malware with cyber weapon code

Gyges, the mixing of commercial malware with cyber weapon code

Sentinel Labs firm discovered a sophisticated malware dubbed Gyges that is the mixing of commercial malicious code with code of…

11 years ago
Chinese hackers violated systems at the Office of Personnel ManagementChinese hackers violated systems at the Office of Personnel Management

Chinese hackers violated systems at the Office of Personnel Management

The New York Times revealed that in March Chinese hackers hacked systems at Office of Personnel Management stealing files of…

11 years ago
Pentagon confirms that missile defenses are vulnerable to cyber attackPentagon confirms that missile defenses are vulnerable to cyber attack

Pentagon confirms that missile defenses are vulnerable to cyber attack

The Director of the Pentagon’s Missile Defense Agency reported to the Congress that missile defenses of the US military are…

11 years ago
North Korea doubles units of its cyber armyNorth Korea doubles units of its cyber army

North Korea doubles units of its cyber army

North Korea has doubled the number of its elite cyber warriors over the past two years and established overseas bases…

11 years ago