Solutionary security firm published SERT Q4 2013 Threat Intelligence Report to provide an overview of the overall threat landscape. Recently Solutionary security firm published SERT Q4 2013 Threat Intelligence Report to provide an overview of the overall threat landscape, the document is the result of a research conducted over the last three months correlating events across devices […]
Security experts at Mandiant have discovered that hackers break into Washington Post servers stealing employee users credentials hashes. Security experts at Mandiant intelligence firm have discovered a new intrusion into the network of The Washington Post, it is the third time in the last three years. In time I’m writing it is still not clear […]
Interview with the security experts Andrey Komarov and Dan Clements of IntelCrawler to analyze significant evolutions in the cyber-threat landscape. Today I desire to propose an interview with Andrey Komarov, CEO of IntelCrawler and Dan Clements, President of IntelCrawler. IntelCrawler is a multi-tier intelligence aggregator, which gathers information and cyber prints from a starting big […]
U.S.-China Economic and Security Review Commission reported for the first time that cloud computing ârepresents a potential espionage threat.â U.S.-China Economic and Security Review Commission reported for the first time that cloud computing ârepresents a potential espionage threat.â , Chinese hackers are a persistent collector of sensitive information, their action is incessant and represent a […]
Intelligence agencies reveal that Chinese hackers increasingly attracted to the drone technology while Chinese drone industry grows like never before! The fact that Chinese hackers are most persistent collectors for sensitive information is not a mystery, more difficult to demonstrate the direct involvement of the PLA behind the operations of computer experts that systematically seek to unravel […]
FireEye security experts discovered a new series of cyber attacks conducted by Chinese hackers targeted the US media in 2012, the attackers have improved the malware used in previous campaign against the New York Times. A new series of cyber attacks conducted by Chinese hackers targeted the US media, it seems that the responsible is […]
During 2009 it was revealed that one of the primary defense contractor BAE Systems was hacked causing the exposure of sensible information on F-35 fighter jet. The reserved information were obtained by a group of hackers who accessed to internal server of the contractor, but BAE Systems admitted it only in 2012. The attackers were […]
Every day we read about cyber threats, zero day vulnerabilities and new patch to apply so I decided to speak about a couple of vulnerabilities I believe potential dangerous for internet users. There is no peace for browsers, this category of application is considered a privileged target for hackers due their large diffusion. Once again […]
The news is circulating on internet creating great concern, once again Chinese hackers have hit an infrastructure of a foreign state, once again we are speaking of cyber espionage but this time the victim is excellent because they were able to access the White House Military Office. The Washington Free Beacon announced the cyber attack […]
Since last month a new campaign of cyber attacks have hit the Energy sector, all is started with the incidents to Saudi Aramco and RasGas companies, in both cases a malware infected internal networks without impacting on the production systems. Due the nature of the targets, the mode of attack and the specific malware behavior […]