Intelligence

Operation North Star – North-Korea hackers targeted US defense and aerospace companies

North Korea-linked hackers continue to be very active in this period, researchers reported a campaign aimed at the US defense…

6 years ago

FBI warns US companies on the use of Chinese Tax Software

The FBI has issued an alert to warn US organizations of the risk associated with the use of Chinese tax…

6 years ago

US DoJ charges Chinese hackers for targeting COVID-19 research

US Justice Department accused two Chinese hackers of stealing trade secrets from companies worldwide and targeting firms developing a COVID-19…

6 years ago

UK NCSC blames Russia-linked APT29 for attacks on COVID-19 vaccine research

The UK National Cyber Security Centre says that Russia-linked APT29 group is attempting to steal research data related to potential…

6 years ago

CIA covert operations likely behind attacks against APT34 and FSB

CIA orchestrated dozens of hacking operations against targets worldwide, including APT34 and FSB hacks, states an exclusive report from Yahoo…

6 years ago

US applauds British ban on China’s Huawei for 5G networks

The United States applauded the UK's decision to ban equipment from China's Huawei telecoms giant from its 5G network. Last…

6 years ago

Huawei faces 5G ban from British’s 5G network within months

UK Prime Minister Boris Johnson is going to ban the use of equipment from the Chinese tech giant Huawei in…

6 years ago

Alleged cyber attacks caused fire and explosions at nuclear and military facilities in Iran

The root cause of a series of explosions at important facilities in Iran may be cyberattacks allegedly launched by Israel.…

6 years ago

The U.S. FCC considers Huawei and ZTE as national security threats

The U.S. Federal Communications Commission (FCC) announced that Chinese telecommunications giants Huawei and ZTE are considered as national security threats. Last…

6 years ago

Australian ACSC ‘s report confirms the use of Chinese malware in recent attacks

Australian ACSC published a detailed report on the techniques, tactics, and procedures associated with the threat actor that targeted organizations…

6 years ago

This website uses cookies.