Intelligence

Pierluigi Paganini May 21, 2015
IRRITANT HORN – NSA plan to Hijack Google Play Store to serve spyware

A new top-secret document leaked by Snowden revealed how the NSA and its allies planned to target Android platforms under the project IRRITANT HORN. New top-secret documents leaked by the whistleblower Edward Snowden revealed that the NSA and its allies of the Five Eyes group (United States, United Kingdom, Canada, New Zealand and Australia) planned to hijack […]

Pierluigi Paganini May 20, 2015
Unknown Hackers hit systems at Bundestag

The Bundestag has become the target of a significant cyber attack, hackers tried to compromise the internal network of the German Parliament. The German parliament Bundestag has officially confirmed media reports about a hacking attack that hit the Institution last week. “There has been an attack on the IT systems of the Bundestag,” spokesman Ernst […]

Pierluigi Paganini May 19, 2015
The Naikon APT, one of the most active APTs in Asia

Experts at Kaspersky Lab published an interesting report on the activities of the Naikon APT revealing details on their infrastructures and TTPs. Naikon  is one of the Asian largest APT gangs which has been active for several years, its operations targeted entities in various industries including governments and the military. The hacking crew targeted diplomats, law enforcement, and aviation […]

Pierluigi Paganini May 17, 2015
ISIS – Cyber Caliphate hackers are threatening Electronic War

Pro-Isis Hackers belonging to Cyber Caliphate hacking team threaten ‘Electronic War’ on US and Europe. Which are ISIS cyber capabilities? Is the Islamic State group able to engage a cyber war against Western countries? According to prominent hackers affiliated with the terrorist, the ISIS hackers have the abilities to hit computer systems in US and Europe. […]

Pierluigi Paganini May 15, 2015
Chinese APT17 exploits Microsoft’s TechNet Portal to Host C&C IPs

The Chinese threat actor known as APT17 and DeputyDog has been using profile pages and forum threads on Microsoft’s TechNet web portal to host IP addresses for command and control (C&C) servers. Security experts at FireEye and the colleagues at Microsoft Threat Intelligence Center have published a report on the activities of the Chinese group […]

Pierluigi Paganini May 14, 2015
APT28 hacking crew plans attacks on financial institutions

According to a report published by the experts at root9B the hacking crew APT28 is planning to attack several financial institutions worldwide. In October 2014, security expert at FireEye published a report on the activities conducted by a group of Russian hackers, dubbed APT28, the hacking crew is behind long-running cyber espionage campaigns that targeted US defense contractors, European security organizations and […]

Pierluigi Paganini May 12, 2015
Google Hangouts doesn’t use end-to-end encryption, law enforcement can access it

Google Hangouts doesn’t implement end-to-end encryption, when users message or talk with someone on Hangoutsis exposing to Government Wiretapping. Edward Snowden has revealed how the US intelligence spy on communication worldwide, despite the market is offering solutions that promise to be “NSA-surveillance proof” the majority of people still use messaging apps like iMessage or Google […]

Pierluigi Paganini May 12, 2015
US Secretary of Homeland Security fears an escalation of terrorism

The United States Secretary of Homeland Security explained that the terrorism has entered a “new phase” and fears an escalation. The terrorism is probably the first concern for the US Government, the Americans fears a possible and imminent attack on the US soil. In an interview with ABC News, Jeh Johnson, the current United States Secretary of […]

Pierluigi Paganini May 11, 2015
Skynet, the US top-secret program to track terrorists

Snowden revealed the existence of Skynet, a system designed by the NSA for online monitoring of terrorists and suspects through metadata analysis. Skynet is a real system designed by the NSA for online monitoring through metadata analysis, this is the last revelation made by the journalist Glenn Greenwald through the website The Intercept. The Intercept revealed the existence of a secret program called Skynet, […]

Pierluigi Paganini May 10, 2015
US SOCOM and The Special Forces to Scrutinize Social media

US SOCOM admitted that Counter-Terrorism Special Forces scrutinize FaceBook and other social media to handle potentially useful information. Exactly two years ago I wrote about the use of social media in the Military. I explained why social media platforms represent a powerful instrument for activities operated by governments and intelligence agencies. Modern social media networks are actively used by […]