The Cisco Talos Group has performed in-depth research on the threat actors behind the Angler Exploit Kit, and even had behind-the-scenes access. The Cisco Talos Group has performed in-depth research on the threat actors behind the Angler Exploit Kit, and even had behind-the-scenes access, allowing statistical information as well as Angler’s inner-workings to be examined. Note that […]
The nuclear industry is still unprepared to respond cyberattacks exposing civil nuclear facilities worldwide at risk of cyber attacks. Civil nuclear facilities worldwide are privileged targets for cyber attacks, according to a new report published this week by the Chatham House. The Stuxnet attack that targeted Iranian nuclear facilities demonstrated the risks for cyberattacks, for the first […]
The UNICRI published in September a new study about the security of Italian small and medium enterprises (SMEs), which are a very attractive target for crooks. UNICRI (United Nations Interregional Crime and Justice Research Institute) published in September 2015 a new study about the IT security of Italian small and medium enterprises (SMEs). This research […]
A study conducted by the Intelligence firm RecordedFuture demonstrates the efficiency of the analysis of hacker forums through traffic analysis-like techniques. Hacker forums still exist, hacking communities are with good shape and growing. Hacker Forums are normally hard to find and once you find them you will see them change again. Most prolific Hacker forums […]
A recent survey conducted by Grant Thornton global revealed that one in six businesses have experienced a cyber attack in the past twelve months. It is always interesting to report findings of studies related to the impact of the cybercrime worldwide, today I want to present you the results of the research conducted by the […]
Trend Micro published a report that explains the dynamics triggered by data breaches, following data from the incidents to their offer in the Dark Web. Trend Micro published a report that explains the dynamics triggered by data breaches, following data from the incidents to their offer in the Dark Web. Stolen data is a precious commodity […]
Researchers from Citizen Lab and German security firm Cure53 analyzed the Govt child monitoring app Smart Sheriff discovered that it is full of bugs. It’s curious, thinking to a child monitoring app you imagine a solution that can protect your children, instead the situation could be really different. Researchers with the Canadian watchdog group Citizen Lab have […]
Despite DHS components have strengthened coordination in performing their cyber missions a recent audit made by the OIG has found several security issues. Among the missions assigned to the DHS there is the coordination of activities related to the prevention, mitigation and recovery from cyber incidents, the Department also oversees the IT security of the […]
F-Secure has published an interesting report on the cyber espionage operations conducted by the Dukes APT group, which appears linked to the Kremlin. Security researchers at F-Secure have published an interesting report detailing the cyber espionage operation of a Russian APT group, dubbed the Dukes, the experts speculate the group is backed by the Russian government. […]
According to a report recently published by the Allianz Global the cybercrime costs UK businesses about £2.8 billion annually. According to a report recently published by the Allianz Global the cyber criminal activities costs UK businesses about £2.8 billion annually, accounting for 16 percent of gross domestic product (GDP). Cybercrime impacts on the global economy with £289.6 […]