Intelligence

LinkedIn – How to exploit social media for targeted attacks

  The professional social network LinkedIn is a mine of information for any king of attackers, a Websense post described…

12 years ago

Finland’s Ministry of Foreign Affairs hit by extensive cyber espionage

Finland's foreign minister announced that foreign intelligence agents had carried out large-scale cyber espionage into government communications. The Finnish Ministry…

12 years ago

Anonymous OpNSA Campaign – OSINT to predict DDoS attacks on Nov 5th

  OpNSA analyzed with OSINT techniques based on the correlation of media activities and physical protests. The analysts provided a…

12 years ago

Business Intelligence – Intro to reconnaissance

Exploring the Business Intelligence module proposed by the online course of the Hacker Academy - Intro to reconnaissance phase for…

12 years ago

Profession Hacker, it’s shortage for cyber experts

Hacker, a figure considered today one of the most precious professional by Government organizations, private businesses and intelligence agencies. It's…

12 years ago

NSA FOXACID servers used to drive the hack into target systems

NSA leaked documents reveals the existence of FOXACID servers that provides an automated hacking platform used to drive operators into…

12 years ago

How NSA tries to compromise Tor anonymity. Tor Stinks document

Top-secret presentation Tor Stinks leaked by Snowden shows the techniques implemented by the NSA to overwhelm Tor Anonymity with manual analysis. Tor anonymity…

12 years ago

Icefog – Kaspersky discovered the group of cyber mercenaries

Kaspersky Lab discovered the emerging group of cyber-mercenaries Icefog available for hire to perform surgical hit and run operations against…

12 years ago

Chinese hackers increasingly attracted to the drone technology

Intelligence agencies reveal that Chinese hackers increasingly attracted to the drone technology while Chinese drone industry grows like never before!…

12 years ago

An undetectable Hardware Trojan is reality

A team of researchers developed an hardware trojan undetectable to most detection techniques raising the question on need of proper…

12 years ago

This website uses cookies.