OpNSA analyzed with OSINT techniques based on the correlation of media activities and physical protests. The analysts provided a forecast on next attacks. Web Intelligence analysis alerts on early signs of an Anonymous cyber campaign dubbed OpNSA that as usual will address with DDoS attack principal US Government websites. Security experts don’t exclude the […]
Exploring the Business Intelligence module proposed by the online course of the Hacker Academy – Intro to reconnaissance phase for a penetration testing. One of the most important components of the reconnaissance process in pen testing activity is the business intelligence. Once chosen the target it is important to gather business information on it before […]
Hacker, a figure considered today one of the most precious professional by Government organizations, private businesses and intelligence agencies. It’s a shortage! All the report produced by principal security firms remark a meaningful increase in the number of cyber attacks against organizations, government offices and private companies. The increased number of cyber incidents is animating […]
NSA leaked documents reveals the existence of FOXACID servers that provides an automated hacking platform used to drive operators into hacking targets. Security expert Bruce Schneier revealed in a recent post that the NSA has a wide-ranging arsenal of zero-day exploits to use for cyber operations, mainly used for cyber espionage campaigns. The effort spent by government for the […]
Top-secret presentation Tor Stinks leaked by Snowden shows the techniques implemented by the NSA to overwhelm Tor Anonymity with manual analysis. Tor anonymity has been debated many times, according to majority security experts it was one of the most secure ways to stay online being far from prying eyes avoiding government surveillance. Recently a series of events have completely changed […]
Kaspersky Lab discovered the emerging group of cyber-mercenaries Icefog available for hire to perform surgical hit and run operations against strategic targets. Researchers at Kaspersky Lab sustain to have identifies a group of cyber mercenaries called Icefog that is responsible for a huge cyber espionage campaign, occurred in 2011, against Japanese parliament and dozens of government agencies and […]
Intelligence agencies reveal that Chinese hackers increasingly attracted to the drone technology while Chinese drone industry grows like never before! The fact that Chinese hackers are most persistent collectors for sensitive information is not a mystery, more difficult to demonstrate the direct involvement of the PLA behind the operations of computer experts that systematically seek to unravel […]
A team of researchers developed an hardware trojan undetectable to most detection techniques raising the question on need of proper hardware qualification. A Team of researchers conducted a study on a stealthy Dopant-Level Hardware Trojans, an insidious menace that could have a dramatic impact on production processed of chips in every sector. The team composed […]
Belgacom hack, the telecommunications company found evidence of digital intrusion in the company systems, many experts believe in a state-sponsored attack. Belgacom hack, the largest telecommunications company in Belgium and primarily state-owned, has announced that its IT infrastructure has suffered a cyber attack malware based. The attackers hacked company IT systems and infected with unknown Malware. According first […]
DARPA is conducting a program codenamed CBMEN (Content-Based Mobile Edge Networking) for sharing of reconnaissance and Intelligence data on battlefield through P2P technology DARPA is conducting a program codenamed CBMEM (Content-Based Mobile Edge Networking) for sharing of reconnaissance data over local wireless and radio networks of military troops without having to be tethered to a server. The […]