US SOCOM admitted that Counter-Terrorism Special Forces scrutinize FaceBook and other social media to handle potentially useful information. Exactly two years ago I wrote about the use of social media in the Military. I explained why social media platforms represent a powerful instrument for activities operated by governments and intelligence agencies. Modern social media networks are actively used by […]
A new collection of documents leaked by Snowden revealed how the US intelligence converts spoken conversation in indexable text with RHINEHART and VoiceRT tools. Following the disclosure of Top-secret documents provided by Edward Snowden everyone is aware of the risks of using any sort of communications methods, what was once private now it isn’t anymore, […]
Experts at Trustwave observed a group of cyber criminals helping spread pro-Russia propaganda by inflating video views with a malvertising campaign. Security experts at Trustwave have discovered a botnet, originally designed for malvertising purpose, used redirect unaware users to view some pro-Russian videos on the website DailyMotion. The event is very interesting due to the political motivation […]
Foreign hackers are targeting background investigation databases to blackmail US government personnel or to try to bribe them. It is not a mystery that Chinese hackers continuously target US companies and government offices, the attackers usually backed by the Government of Bejing mainly run cyber espionage campaigns to steal intellectual property and any kind of information related to person […]
The Time revealed that Russian hackers have accessed President Barack Obama emails in the attack on the White House’s unclassified computer system. Earlier this month, US officials admitted there was a cyber “event” late last year, but refused to confirm reports Russia was behind the attack. New revelations on the attack against the unclassified network […]
The Dark Web email service SIGAINT suffered a major attack that involved 70 exit nodes, a circumstance that suggests Government operation. Law enforcement and Intelligence agencies are always involved in the infiltration of Darknets and related services with the primary intent to monitor bad actors and de-anonymize users. The Tor-Based Dark Web Email Service SIGAINT is one […]
According new revelations published by the Der Spiegel the German intelligence agency BND helped NSA in monitoring European politicians. We discussed several times of the aggressive cyber espionage campaigns run by the US intelligence and its allies of Five Eyes (Canada, UK, New Zeland, Australia and, of course, the US). The Intelligence targeted private companies and entities worldwide in order to establish a dominance in the cyberspace. […]
Security experts at Fox-IT have developed a method for detecting NSA Quantum Insert attacks and have published an interesting post on the hacking practice. Security researchers at Fox-IT have developed a method for detecting NSA hacking activity operated through the Quantum Insert-style hacks. The team of experts has published free open-source tools to detect duplicate […]
Operation Pawn Storm allegedly run by hackers backed by the Russian Government still advancing their infrastructure a great deal, the group is believed to using advanced tactics to hit the targets. Trend Micro revealed that the group have introduced all new infrastructure and is “Zeroing in” onto the targets that include NATO (North Atlantic Treaty […]
FireEye recently detected a new highly targeted attack run by APT28 exploiting two zero-day flaws to compromise an “international government entity”. Security experts at FireEye have recently detected a new cyber espionage campaign, dubbed “Operation RussianDoll,” operated by the Russian APT28 group. This time the hackers run highly targeted attack by exploiting two zero-day vulnerabilities to target an “international […]