China

Former TVA manager admits China paid him for nuclear secrets

A Tennessee Valley Authority senior manager, with access to sensitive information about nuclear development and production admits China paid him…

10 years ago

The Four Element Sword, weaponized document builder used in APT Attacks

Experts analyzed a dozen attacks that leveraged on malicious RTF documents created using the same Four Element Sword builder. Security…

10 years ago

The dangerous interaction between Russian and Brazilian cyber criminal underground

Kaspersky has analyzed the interaction between the Russian and Brazilian criminal underground communities revealing a dangerous interaction. In the past weeks,…

10 years ago

Chinese hacker admitted hacking US Defense contractors

A Chinese national pleaded guilty yesterday, March 23, on charges with hacking trade secrets from US defense contractors. A Chinese…

10 years ago

Which are principal cybercriminal ecosystems in the Deep Web?

TrendMicro published an interesting analysis of the principal cyber criminal underground communities in the Deep Web worldwide. A new interesting…

10 years ago

Project Cumulus – Tracking fake phished credentials leaked to Dark Web

Project Cumulus - A group of experts at Bitglass used watermarks to track data through the Dark Web and discover…

10 years ago

Australian NSW Government Department of Resources and Energy under attack. Is it Chinese cyber espionage?

According to the NSW Government Department of Resources and Energy Chinese hackers have launched a malware-based attack on its network…

10 years ago

The rise of the Brazilian Cybercriminal Underground in 2015

Trend Micro has published a new report on the Brazilian Cybercriminal Underground, a criminal ecosystem that is becoming one of…

10 years ago

Hackers in the wild attempt to exploit the Juniper Backdoor

A honeypot set up by researchers at the SANS institute has shown that hackers  have already attempted to exploit the…

10 years ago

Who planted the Juniper ScreenOS Authentication Backdoor?

Who planted the Authentication Backdoor in the Juniper ScreenOS? Security experts are making their speculation, but interesting revelations are coming…

10 years ago

This website uses cookies.