Intelligence

Pierluigi Paganini February 25, 2016
The new iPhone designed by Apple will be unhackable

Apple has begun developing security features for the new iPhone to make it impossible for the law enforcement agencies to break into a locked iPhone The news related to the request made by the FBI to Apple of unlocking the iPhone of Syed Farook, one of the San Bernardino shooters has raised the debate on the efficiency of […]

Pierluigi Paganini February 25, 2016
Operation Blockbuster revealed the Lazarus Group Activities

The Operation BlockBuster Coalition has disclosed the results of its investigation on the activities of the Lazarus Group that is believed to be behind the Sony Pictures hack. State-sponsored hackers allegedly behind the Sony Pictures hack have been linked to other security breach suffered by a number of companies in South Korea. The FBI blamed the North Korea, the […]

Pierluigi Paganini February 24, 2016
Operation Dust Storm, hackers Target Japanese Critical Infrastructure

Japanese commercial and critical infrastructure organizations have been targeted a long-running campaign dubbed Operation Dust Storm. Security firm Cylance have uncovered a long-running hacking campaign dubbed ‘Operation Dust Storm’ targeting commercial and critical infrastructure organizations in Japan. Threat actors behind the Operation Dust Storm have been active since at least 2010, the hackers targeted several organizations in Japan, […]

Pierluigi Paganini February 23, 2016
Anonymous hacked the France’s Ministry of Defense portal CIMD (Centre d’Identification des Materiels de la Defense)

Anonymous hacked the CIMD portal managed by the France’s Ministry of Defense to protest against French foreign arms trade operations. The Anonymous collective has hacked one of the websites managed by the France’s Ministry of Defense, the CIMD (Centre d’Identification des Materiels de la Defense). The hacktivists accessed the database and leaked it online to […]

Pierluigi Paganini February 21, 2016
Utah systems experiences 300k hacking attacks a day due to the presence of the NSA Data Center

The representatives of the Utah State confirmed that their systems experiences 300,000 hacking attacks a day due to the presence of the NSA Data Center. The Utah state computer systems experience 300,000 hacking attacks a day due to the presence of the NSA data center in the state. The Utah Data Center, also known as the […]

Pierluigi Paganini February 18, 2016
A sophisticated variant of OceanLotus trojan targets OS X systems

In May 2015, the Chinese security firm Qihoo 360 published a report on a Trojan called OceanLotus that was being used since 2012 for APT attacks in the Chinese market. The APT attacks based  on the OceanLotus focused on government organizations, research institutes, maritime agencies, and companies specializing in other activities. At the time were […]

Pierluigi Paganini February 17, 2016
GCHQ helped US in developing Stuxnet, claims a documentary

A new documentary titled Zero Days revealed that the Stuxnet cyber weapon was just a small part of a much bigger Information Warfare operation (code named “NITRO ZEUS”) against the Iranian civilian infrastructure. A new documentary titled Zero Days has revealed more disconcerting news on the Stuxnet worm, the first malware recognized by security industry as a […]

Pierluigi Paganini February 17, 2016
Linux Fysbis Trojan, a new weapon in the Pawn Storm’s arsenal

Malware researchers at PaloAlto discovered the Fysbis Trojan, a simple and an effective Linux threat used by the Russian cyberspy group Pawn Storm. Do you remember the Pawn Storm hacking crew? Security experts have identified this group of Russian hackers with several names, including APT28, Sofacy or Sednit, it has been active since at least 2007. The name Pawn Storm is used by security […]

Pierluigi Paganini February 13, 2016
The IPT ruled that GCHQ spies can legally hack any electronic devices

The British Intelligence Agency GCHQ has a license to hack computers and devices, the UK’s Investigatory Powers Tribunal (IPT) ruled. This means that the UK Government is giving full power to its intelligence agency to spy on Britons as well as people living abroad. The verdict was issued on Friday after Privacy International and seven ISPs […]

Pierluigi Paganini February 13, 2016
BlackEnergy infected also Ukrainian Mining and Railway Systems

Experts at Trend Micro discovered strains of BlackEnergy malware involved in the recent attacks against Ukrainian Mining and Railway Systems. BlackEnergy was in the headlines when the security industry examined the power outage occurred in Ukraine in December 2015. The BlackEnergy malware is a threat improved to target SCADA systems, the latest variant includes the KillDisk component developed to wipe […]