Cyber warfare

US army discloses budget for cyber operations

It’s not a mystery, every state despite the spending review on the military budget is continuing to reserve consistent investment in cyber…

12 years ago

Anonymous #OpIsrael, use of botnets & hypothesis on attackers

We all remember the debated attacks of Anonymous collective against Israeli government that targeted various websites of the country last…

12 years ago

The role of hacktivism in cyber warfare scenario between 2 Koreas

It’s not a surprise South Korean security experts suggest that the North Korea military is training an elite force of…

12 years ago

vSkymmer botnet, a financial malware appears in the underground

The principal reports proposed by various security firm demonstrate a sustained growth of cyber criminal activities fueled by increased offer…

12 years ago

Multiplatform Wiper widespread in attacks against South Korea

Recently South Korea has been hit by powerful cyber attack malware based, network provided by LG UPlus Corp was hacked…

12 years ago

NATO works to define rules for cyber warfare

Recent explosion of cyber attacks worldwide demonstrating the difficulty to maintain order and stability in the cyberspace, within individual states…

12 years ago

S. Korea under cyber attack, is it N.Korea counteroffensive?

As expected happened, just yesterday I wrote about a large scale cyber attack against North Korea that blocked internet activities…

12 years ago

N. Korea hit by large-scale cyber attack,repercussions in cyberspace

North Korea is the center of attention these days for its questionable political strategies and for the dispute raging with…

12 years ago

US nation’s military considered unprepared for a cyber-conflict

A report titled “Resilient Military Systems and the Advanced Cyber Threat” written  by Defense Science Board (DSB), a Federal Advisory…

12 years ago

Mandiant report links Anonymous 2011 hacks to APT1 campaign

The new is very curious and represents the demonstration that cyber threats could not be analyzed separately, security need a…

12 years ago

This website uses cookies.