Cyber warfare

Information warfare – The Rise of the Cyber OffenseInformation warfare – The Rise of the Cyber Offense

Information warfare – The Rise of the Cyber Offense

Information warfare - The development of cyber capabilities is strategic for any governments, computer systems and Internet of Things even…

9 years ago
ProjectSauron APT, aka Strider, found targeting firms in Russia, ChinaProjectSauron APT, aka Strider, found targeting firms in Russia, China

ProjectSauron APT, aka Strider, found targeting firms in Russia, China

Experts spotted a previously unknown APT group dubbed Strider or ProjectSauron that carried out surgical cyber-espionage attacks against targets worldwide.…

9 years ago
Cyberwar – The cyberspace is already a dangerous battlefieldCyberwar – The cyberspace is already a dangerous battlefield

Cyberwar – The cyberspace is already a dangerous battlefield

The number of high-profile hacks demonstrates that a silent cyberwar is already ongoing among countries in the cyberspace. The recent…

9 years ago
DCCC website redirected donors to a fake contribution pageDCCC website redirected donors to a fake contribution page

DCCC website redirected donors to a fake contribution page

Another attack hit the Democratic Party organization, this time, the Democratic Party’s congressional fundraising DCCC committee was hit by hackers.…

9 years ago
South accuses North Korea for massive data breach affecting 10 million online shoppersSouth accuses North Korea for massive data breach affecting 10 million online shoppers

South accuses North Korea for massive data breach affecting 10 million online shoppers

Authorities in South Korea are blaming hackers from North Korea for a massive data breach affecting 10 million Interpark online…

9 years ago
Cyber Security: Red Team, Blue Team and Purple TeamCyber Security: Red Team, Blue Team and Purple Team

Cyber Security: Red Team, Blue Team and Purple Team

In military jargon, the term Red Team is traditionally used to identify highly skilled and organized groups acting as fictitious…

9 years ago
Furtim’s advance capabilities and the Energy SectorFurtim’s advance capabilities and the Energy Sector

Furtim’s advance capabilities and the Energy Sector

The Labs team at SentinelOne recently discovered a sophisticated malware dubbed Furtim specifically targeting at least one European energy company.…

9 years ago
US sentences Chinese hacker for stealing aerospace secretsUS sentences Chinese hacker for stealing aerospace secrets

US sentences Chinese hacker for stealing aerospace secrets

US sentences the Chinese hacker involved in the theft of industrial secrets on the F-22 and F-35 fighter jets, C-17…

9 years ago
Experts found a government malware on the Dark WebExperts found a government malware on the Dark Web

Experts found a government malware on the Dark Web

Experts have made a disconcerting discovery on the Dark Web, they have found a sophisticated government malware that could be…

9 years ago
NATO on Cyber Defence : Time Level UpNATO on Cyber Defence : Time Level Up

NATO on Cyber Defence : Time Level Up

NATO on Cyber Defence - The cyberspace has become the new battlefield and an ingreasing number of threats leverages on…

9 years ago