Cyber warfare

NATO Warsaw summit 2016, what about cyber security?NATO Warsaw summit 2016, what about cyber security?

NATO Warsaw summit 2016, what about cyber security?

What about cyber security issues discussed during the NATO members during the Warsaw summit held in Poland on 8 and…

9 years ago
Facebook malware infected more than 10,000 users in two daysFacebook malware infected more than 10,000 users in two days

Facebook malware infected more than 10,000 users in two days

Security experts from Kaspersky monitored a phishing campaign launched to spread a Facebook malware that infected more than 10,000 users…

9 years ago
Pawn Storm APT group targets thousands Google AccountsPawn Storm APT group targets thousands Google Accounts

Pawn Storm APT group targets thousands Google Accounts

Russian cyber spies belonging to the Pawn Storm APT group have targeted a significant number of Google accounts belonging to…

9 years ago
What’s really behind China’s drop in attacks against the US?What’s really behind China’s drop in attacks against the US?

What’s really behind China’s drop in attacks against the US?

According to the experts from FireEye attacks from China against the US started declining in mid-2014 and has continued to…

9 years ago
NATO officially recognizes cyberspace a warfare domainNATO officially recognizes cyberspace a warfare domain

NATO officially recognizes cyberspace a warfare domain

The NATO has officially declared cyberspace a warfare domain and confirmed that a cyberattack on any of its allies will…

9 years ago
Guccifer 2.0 – Lone Wolf or a Fancy Bear?Guccifer 2.0 – Lone Wolf or a Fancy Bear?

Guccifer 2.0 – Lone Wolf or a Fancy Bear?

A hacker using the pseudonymous Guccifer 2.0, claimed responsibility for the cyber-attack on the Democratic National Committee (DNC). Yesterday, we…

9 years ago
Hack the Pentagon, hackers already found more than 100 flawsHack the Pentagon, hackers already found more than 100 flaws

Hack the Pentagon, hackers already found more than 100 flaws

Hackers contracted by the DoD under the Hack the Pentagon initiative have found more than 100 vulnerabilities exceeding Government's expectations.…

9 years ago
North Korean Hackers stole defense documents and photos from SouthNorth Korean Hackers stole defense documents and photos from South

North Korean Hackers stole defense documents and photos from South

The Government of Seoul reported that North Korean Hackers stole defense-related documents and photos from two South Korean companies. The…

9 years ago
New evidence links the NK Lazarus Group to SWIFT banking attacksNew evidence links the NK Lazarus Group to SWIFT banking attacks

New evidence links the NK Lazarus Group to SWIFT banking attacks

The Analysis of SWIFT attacks revealed five additional pieces of malware containing portions of code shared by Lazarus Group. While…

9 years ago
Cyberespionage against RUAG, from Red October to Turla, who is the culprit?Cyberespionage against RUAG, from Red October to Turla, who is the culprit?

Cyberespionage against RUAG, from Red October to Turla, who is the culprit?

Security experts from Melani published a detailed technical report about the strain of Turla used in the cyberespionage attack against…

9 years ago