Malware

The good and the bad of the Deep Web

  Article Published on The Hacker New Magazine – September Edition “Security in a serious way” Introduction The Deep Web (or…

13 years ago

Microsoft distrupts Nitol botnet, malware hidden in supply chain

The malware diffusion is assuming dimension difficult to control, no matter if we are facing with a state-sponsored attack or…

13 years ago

Cybercrime evolution in North America and Western Europe

Despite cyber space is known as a domain without border an interesting study of the Kaspersky Security firm demonstrates that…

13 years ago

Dangerous waves of malware are transforming cyberspace in a jungle

The cyberspace is becoming a jungle of malware, a place where the danger is just around the corner. Governments, cyber…

13 years ago

FireEye Advanced Threat Report…the inadequacy of the defense

The security firm FireEye has released  an interesting report  named “Advanced Threat Report” related first half of 2012 that provides…

13 years ago

Wiper, assumptions and difficulties analyzing a malware

During last April many press agencies and security firms published a story related to the detection of a new malware,…

13 years ago

RasGas, new cyber attack against an energy company

A new strange attack has hit Qatar's natural gas pumper RasGas, like happened to Saudi Aramco company a virus has…

13 years ago

Iran suspected for the attack on the Saudi Aramco

Last week it was announced by Saudi Arabia's oil company, Saudi Aramco that its systems and its internal network were…

14 years ago

Malware, a cyber threat increasingly difficult to contain

Article published on Hakin9 IT Security Magazine - August 2012 When we speak about malware we introduce one of the…

14 years ago

Crisis malware threatens the virtualized environments

This is an hot summer under the malware perspective, we have spoken of new malware for cyber espionage and of…

14 years ago

This website uses cookies.