Reports

Criminal crew Hellsing strikes back after attack by a rival APT group

The elite cyber crime group Hellsing strikes back after attack by the rival APT crew known as Naikon. This is the first documented…

10 years ago

Dell report revealed attacks on SCADA system are doubled

A recent report published by Dell revealed a 100 percent increase in the number of attacks on industrial control (SCADA)…

10 years ago

Bank and vendors – Which are the threats to cyber security?

The NYDFS released a new report on the Cyber Security in the Banking Sector that highlights problems faced by almost…

10 years ago

APT30 behind a long-running cyber espionage campaign

Researchers at FireEye uncovered a new threat actor dubbed APT30 that run a decade-long cyber espionage campaign backed by the…

10 years ago

How far do stolen data get in the deep web after a breach?

A group of experts at Bitglass used watermarks to track data through the Deep Web and discover how far does…

10 years ago

Malware infections on Android devices have been halved in 2014

Android presented its Security State of the Union 2014 and confirmed that the number of infections have been halved in…

10 years ago

Iran increased cyber-security spending 12-fold since 2013

Iran is improving its cyber capabilities faster than experts 'would have ever imagined' and increased cyber-security spending 12-fold since2013. The…

10 years ago

Reading the Secunia Vulnerability Review 2015

Secunia firm issued its annual report on vulnerabilities exploited in 2014 in most popular software, a document which includes key…

10 years ago

IBM X-Force reported a billion data records leaked in 2014

Within the year of 2014, a lot of data was leaked and this leads to grave concerns as to the…

10 years ago

IoT security is still a pipe dream

A research conducted by experts at Symantec highlights disturbing security failures in the IoT devices present in today connected home.…

10 years ago

This website uses cookies.