China

Mandiant report on APT1 & China’s cyber espionage unitsMandiant report on APT1 & China’s cyber espionage units

Mandiant report on APT1 & China’s cyber espionage units

Early this month it was spread the news regarding a sophisticated cyber espionage campaign against principal media agencies in the…

12 years ago
Government networks totally vulnerable to cyber attacksGovernment networks totally vulnerable to cyber attacks

Government networks totally vulnerable to cyber attacks

In this days it is circulating persistently the news that The Cyber Intelligence Sharing and Protection act (CISPA) will be reintroduced…

12 years ago
Is US really thinking to preemptive cyber attacks as deterrent?Is US really thinking to preemptive cyber attacks as deterrent?

Is US really thinking to preemptive cyber attacks as deterrent?

Cyberspace is abuzz with activity. Governments are secretly conducting cyber operations. Everyday, we read about malicous code used to steal…

12 years ago
Operation Beebus, another chinese cyber espionage campaignOperation Beebus, another chinese cyber espionage campaign

Operation Beebus, another chinese cyber espionage campaign

Security Firm FireEye revealed to have discovered an APT campaign targeting companies in the defense and aerospace sector and that…

12 years ago
US Department of Energy hit by a sophisticated cyber attackUS Department of Energy hit by a sophisticated cyber attack

US Department of Energy hit by a sophisticated cyber attack

It seems that suddenly US have discovered to be victim of a serious of cyber espionage campaigns that are targeting…

12 years ago
Confidential documents from Japanese politics stolen by malwareConfidential documents from Japanese politics stolen by malware

Confidential documents from Japanese politics stolen by malware

Last December Japan Aerospace Exploration Agency was hit again by malware  that stolen secret information on newest rockets from an…

12 years ago
US develop exploitation methods for mobile devices while refuse UN treatyUS develop exploitation methods for mobile devices while refuse UN treaty

US develop exploitation methods for mobile devices while refuse UN treaty

Just one week ago a UN treaty was approved to update 24-year-old United Nations telecommunications rules. The agreement states that…

12 years ago
Korean cyber espionage campaign against RussiaKorean cyber espionage campaign against Russia

Korean cyber espionage campaign against Russia

Cyber espionage is worldwide recognized one of the most concerning cyber threats mainly operated by governments to steal sensible information…

12 years ago
Japan Aerospace Exploration Agency hit again by malwareJapan Aerospace Exploration Agency hit again by malware

Japan Aerospace Exploration Agency hit again by malware

The New Your Times has recently published the news the Japan Aerospace Exploration Agency was hit by a virus that…

13 years ago
UK recruits “Xbox generation” youngsters for cyber war gamesUK recruits “Xbox generation” youngsters for cyber war games

UK recruits “Xbox generation” youngsters for cyber war games

The future is now, I've often spoken about the enormous potentiality of gaming platforms and of the capabilities of young…

13 years ago