A wave of cyber attacks against the Baltic energy networks raised concerns that foreign states could disable them in the region. A wave of “exploratory” cyber attacks targeted energy networks of the Baltic states, the NATO alliance is following with apprehension the events. Baltic attacks raised concerns that foreign states could disable the energy networks in the […]
WikiLeaks Reveals two distinct malware platforms codenamed AfterMidnight and Assassin used by the CIA operators to target Windows systems. While critical infrastructure worldwide and private organizations were ridiculed by the WannaCry attack, WikiLeaks released a new batch of CIA documents from the Vault 7 leaks. The new dump included the documentation related to two CIA frameworks used to create […]
Linux on Windows – Microsoft is, even more, Linux friendly, the IT giant announced that three free Linux distro will be included in its official app store. Last year the tech giant announced the support for the Bash shell and Ubuntu Linux binaries into Windows 10, news of the day is that Microsoft has announced […]
The metaphor of a football match to explain the daily confrontation of a blue team against Black Hats. Who is the winner? I invite you to imagine a different soccer match. At one side, the Blue Team, in charge of your companyâs cyber security protection. In the other, the Black Hats, eager to bypass your […]
Adobe has issued security updates to address critical and important security vulnerabilities in Flash Player and Experience Manager. The last Flash Player release 25.0.0.171 addresses seven vulnerabilities that can be exploited to take over vulnerable systems. According to the security advisory published by Adobe, the vulnerabilities include a use-after-free and other memory corruption flaws that can be […]
Locked Shields is the worldâs largest and most advanced international technical live-fire cyber defence exercise organized by the NATO since 2010. Locked Shields is the worldâs largest and most sophisticated international cyber defence exercise. It is an annual event since 2010, Locked Shields is organized by the NATO Cooperative Cyber Defence Centre of Excellence and […]
The monitoring group Turkey Blocks confirmed that Turkey banned Wikipedia because its content web content that represents a threat to national security. According to the telecommunications watchdog, Turkey has blocked the access to the online encyclopedia Wikipedia on Saturday, the Government has taken this decision citing a law that allows it to ban access to […]
Cryptology is the mathematical foundation of penetration testing and can be adopted as a resource for securing assets and communications. An overview of the science of the occult, that brings forth a new level of security in the age of digital privacy. Cryptology is the mathematical foundation of penetration testing and can be adopted as […]
The Israeli Government announces it thwarted a major cyberattack against 120 targets just days after harsh criticism of new cyber defense bill. According to haaretz.com, Israeli Government revealed it repelled a major cyberattack aimed at 120 targets. The unusual announcement was made by the Prime Minister’s Office (PMO) in a very unusual announcement on Wednesday. Israel […]
The United States Air Force has launched the ‘Hack the Air Force’ bug bounty program to test the security of its the networks and computer systems. I have discussed many times the importance and the numerous advantages of a bug bounty program. Bug bounties are very popular initiatives among the communities of white hats, principal companies, […]