Mc Afee Lab experts revealed that hackers behind large scale cyberattacks against South Korea also designed malware to steal military secrets. The hackers behind the recent attacks against South Korean infrastructure are professionals that designed also malicious code to steal military secrets to the South Korea and US military. Security experts at McAfee Labs revealed […]
Number of Watering hole attacks is increasing, most of them based on well known exploit kits. The case of compromised Indian gov Web site leads to BlackHole Watering Hole attacks increase in a meaningful way in the last years following a scaring trend, the technique is based on infection of websiteâs visitors, typically attackers use to […]
New cyber attacks from Iran hit US enterprises focusing on energy sector, the offensive has been revealed by American officials and private security experts. A new series of cyber attacks from Iran hit US enterprises, the offensive has been revealed by American officials and private security experts. The attacks are classified as âpotentially destructiveâ and targeted IT […]
Governments, and in particular US one, are principal buyers of zero-day vulnerabilities according a report published by Reuters. Zero-days exploits are considered a primary ingredient for success of a cyber attack, the knowledge of zero-day flaw gives to the attacker guarantee of success, state-sponsored hackers and cyber criminals consider zero-day exploits a precious resources around […]
China and US governments continue to exchange accusations about the continuing incursions into the respective national networks. China and US governments continue to exchange accusations about the continuing incursions into the respective national networks, the cyber attacks are mainly motivated by sabotage and cyber espionage purposes and are increasing exponentially. US government and intelligence agencies […]
Verizon has issued the â2013 Data Breach Investigations Reportâ that investigates on a series of documented data breaches. Verizonâs RISK Team, in collaboration with other 18 partners, has issued the â2013 Data Breach Investigations Reportâ that investigates on a series of documented data breaches. Since 2008 the company yearly publishes data related to principal incidents occurred during […]
Itâs not a mystery, every state despite the spending review on the military budget is continuing to reserve consistent investment in cyber security, in particular majority of states is pushing research and development activities on both defense and offense cyber capabilities. US is one of the most advanced country in cyber warfare, the US Government was one […]
We all remember the debated attacks of Anonymous collective against Israeli government that targeted various websites of the country last April 7th. The data on the cyber attacks reported by Israel government are really different from the one provided by the group of hacktivists in the damage report for #OpIsrael that account for a Total […]
Itâs not a surprise South Korean security experts suggest that the North Korea military is training an elite force of âcyber warriorsâ to involve in cyber attacks against South institutions and companies. The South intelligence revelations follow continuous menaces of North Korea against U.S. Forces located in the Far East, the dictator Kim Jong-UN enhances […]
The principal reports proposed by various security firm demonstrate a sustained growth of cyber criminal activities fueled by increased offer of underground. In the underground it is practically possible to acquire/sell any kind of product and services to realize illegal activities. The offer is complete and include programming and hacking services, bulletproof-hosting services, cyber attacks on […]