China

APT30 behind a long-running cyber espionage campaign

Researchers at FireEye uncovered a new threat actor dubbed APT30 that run a decade-long cyber espionage campaign backed by the…

11 years ago

How far do stolen data get in the deep web after a breach?

A group of experts at Bitglass used watermarks to track data through the Deep Web and discover how far does…

11 years ago

Great Cannon, the powerful Chinese hacking platform

Researchers uncovered the Great Cannon, a powerful hacking tool, used by the Chinese Government to run MITM attacks, that was…

11 years ago

China and its cyber capabilities, are you really surprised?

China has admitted the existence in its military organization of special information warfare units, I contacted one of the greatest…

11 years ago

China admitted the existence of Information warfare units

For the first time China has publicly admitted the existence in its military organization of special information warfare units.  Since…

11 years ago

Pentagon plans to hire 3,000 Cyber pros for the US Cyber Command

Federal officials announced that military received the green light to hire 3,000 cyber experts to assign to the US Cyber…

11 years ago

Cyber warfare – Cyber Space and the status quo balance of power; dichotomy or symphony? How Technology backfires

Cyber warfare is becoming the most progressive warfare domain after the Second World War. Which global actors benefit the most…

11 years ago

Chinese Government runs a MITM attack against Microsoft Outlook

GreatFire revealed that the popular Microsoft Outlook emailing service was subjected to a man-in-the-middle (MITM) attack in China. This time…

11 years ago

Snowden reveals that China stole plans for a new F-35 aircraft fighter

Snowden's documents reveal China stole designs for the US-built F-35 Fighter jet, and provides details also a counter-intelligence operation run…

11 years ago

Foreign hackers target UK Power Grid every minute

The British Parliament reveals that UK Power Grid is under cyber attack from foreign hackers every minute, but the emergency…

11 years ago

This website uses cookies.