The news is circulating on internet creating great concern, once again Chinese hackers have hit an infrastructure of a foreign state, once again we are speaking of cyber espionage but this time the victim is excellent because they were able to access the White House Military Office. The Washington Free Beacon announced the cyber attack […]
It’s happened again, cyber criminals have stolen digital certificates related to companies recognized reliable to sign malicious code. This time the victim is Adobe and according its security chief, Brad Arkin, a group of hackers have signed malware using Adobe digital certificate obtained compromising a vulnerable build server that was used to get code validation […]
Last Wednesday the web site of U.S. Bank has been hit by a DDoS attack, that caused its block, launched by a group of Islamic hacktivists who have claimed responsibility for event. The web site remained down for an hour, starting at around 3:30 Pacific, due the impossibility to serve the huge quantity of requests. […]
I’m just returned from the Cyber Threat Summit in Dublin, one of the most interesting European events in cyber security that gave me the opportunity to share opinion notes with expert professionals of international security context. Â The event revealed an alarming scenario on the main cyber threats, no matter if it is cybercrime, hacktivism, cyber […]
In May Iranian Computer Emergency Response Team Coordination CenterLab, Â CrySyS Lab and Kaspersky Lab have published a news regarding a new malware that has been detected and that have hit mainly Windows systems of Middle East area, specifically the Iran. The malware was evidence of a huge ongoing cyber espionage campaign, the level of complexity […]
The defense of cyberspace is becoming one the most concerning question to approach, governments all around the world are massively investing in cyber technology with the resultants that the number of cyber operations is increasing exponentially. William J. Lynn, U.S. Deputy Secretary of Defense, states that: “as a doctrinal matter, the Pentagon has formally recognized cyberspace as a […]
Article Published on The Hacker New Magazine â September Edition âSecurity in a serious wayâ Introduction The Deep Web (or Invisible web) is the set of information resources on the World Wide Web not reported by normal search engines, according a raw estimation of some security experts clear web represents only a small portion of the […]
The malware diffusion is assuming dimension difficult to control, no matter if we are facing with a state-sponsored attack or with a cyber scam, malicious agents are around us, they have infected a huge quantity of machines with dramatic consequences. But what’s happen if we discover the malware inside the controller of ordinary object that […]
We have often discussed the fact that governments and intelligence agencies regularly use tools to spy on communications and navigation data of millions internet users. The market monitoring is a thriving market, where revenue opportunities are high and where demand is far outstripping supply. Malware, backdoors, appliances are just some of the solutions used to […]
In this days I have written several times regarding surveillance systems and the huge business around it. Private companies, government agencies and cyber units are all working to develop new tools to spy on wide audience. This tools are really attractive for those governments that desire to monitor and pursue dissident, in many cases these […]