Information warfare – The development of cyber capabilities is strategic for any governments, computer systems and Internet of Things even more at risk. By the mid-1990âs the US intelligence agencies, especially the NSA, were beginning to wake up to a grim reality â the world was quickly becoming connected and the tools to connect that […]
Experts spotted a previously unknown APT group dubbed Strider or ProjectSauron that carried out surgical cyber-espionage attacks against targets worldwide. A previously unknown hacking group variously dubbed ‘Strider’ or ‘ProjectSauron’ has been conducting a surgical cyber espionage campaign against targets in Russia, Belgium, China, Iran, Sweden, and Rwanda. According to experts from Symantec, the Strider crew […]
The number of high-profile hacks demonstrates that a silent cyberwar is already ongoing among countries in the cyberspace. The recent hacks of the Democratic National Committee and presidential candidate Hillary Clintonâs campaign and the alleged infections spotted by the Russian FSB inside government networks demonstrate the intense activity in the cyberspace. It is a virtual […]
Another attack hit the Democratic Party organization, this time, the Democratic Partyâs congressional fundraising DCCC committee was hit by hackers. The Democratic Party organization continues to be under attack, this time, the Democratic Partyâs congressional fundraising committee was hit by hackers. According to the Reuters, the FBI is investigating a security breach of the systems of the […]
Authorities in South Korea are blaming hackers from North Korea for a massive data breach affecting 10 million Interpark online shoppers. North Korea launched a new cyber attack against the South, according to the Government of Seoul a massive data breach exposed data belonging to an Internet shopping mall. This week, authorities in South Korea accused […]
In military jargon, the term Red Team is traditionally used to identify highly skilled and organized groups acting as fictitious rivals and/or enemies to the âregularâ forces, the Blue Team. Whenever we discuss Information Security from a defensive point of view, we are inclined to think about protection, damage control, and reaction. However, adopting an […]
The Labs team at SentinelOne recently discovered a sophisticated malware dubbed Furtim specifically targeting at least one European energy company. In May of this year, security researcher Yotam Gottesam with enSilo, began unraveling a mystery that continues to unravel. First reported by FireF0X, a self-proclaimed âex-malware analystâ located in the Russian Federation, the Furtim malware […]
US sentences the Chinese hacker involved in the theft of industrial secrets on the F-22 and F-35 fighter jets, C-17 transport aircraft and F-35 aircraft. The Chinese national Su Bin (also known as Stephen Su and Stephen Subin), 50, has been sentenced to 46 months jail for intellectual property theft. The Chinese hacker admitted having […]
Experts have made a disconcerting discovery on the Dark Web, they have found a sophisticated government malware that could be used to target Energy Grids. We have discussed several times about the militarization of the cyberspace and the risks that a government malware goes out of control, what about is a powerful hacking tool is […]
NATO on Cyber Defence – The cyberspace has become the new battlefield and an ingreasing number of threats leverages on it to target real world assets. ‘We want eight and we won’t wait!’Â What could this slogan or chant be for? Maybe Quentin Tarantino was only writing about 7 Hateful people and his publisher wanted […]