Researchers at German G Data published an interesting analysis for Uroborun rootkit alleged to be a component of Russian cyber weapons programme. Uroburos is considered an advanced rootkit that is active since as far back as 2011, it is used to infect networks belonging to high-level targets, stealing data after setting up rogue P2P networks, it targets […]
F-Secure’s Chief Mikko Hyppönen at the TrustyCon explained the risk that Government-built malware and cyber weapons will run out of control. F-Secure’s Chief Research Officer Company Mikko Hyppönen at the TrustyCon conference in San Francisco explained that almost every government is spending a great effort to improve its cyber capabilities building a cyber weapon. “Governments writing […]
The South Korea government is working to the development of a cyber weapon to hit North Korean nuclear facilities. It’s Information warfare. The tension between North Korea and South Korea is always high, both governments are spending a great effort to improve their cyber capabilities and to try to silently attack the neighbors. North Korea […]
Italy – The Presidency of Council of Ministers has published the âNational Strategic Framework for cyberspace securityâ document. The Italian Government has published his cyber strategy, the Presidency of Council of Ministers has issued the âNational Strategic Framework for cyberspace securityâ, it is an important document that for the first time reveals the cyber strategy […]
US Government has published cybersecurity framework for critical infrastructure,  a “living document” to improve internal security. The US Government has issued a cybersecurity framework for critical infrastructure, the goal is to improve IT and SCADA networks deployed in sensitive industries such as energy, water and financial services. The NIST announced the Framework for Improving Critical Infrastructure Security, a document that proposed […]
At S4x14 Conference in Miami, a researcher at of ReVuln disclosed a buffer overflow zero-day flaw in HMI software produced by Malaysian company Ecava. During the S4x14 Conference in Miami, Luigi Auriemma of ReVuln disclosed a serious vulnerability in HMI software. The team of researchers at ReVuln discovered a buffer overflow vulnerability in the companyâs […]
Interview with the security experts Andrey Komarov and Dan Clements of IntelCrawler to analyze significant evolutions in the cyber-threat landscape. Today I desire to propose an interview with Andrey Komarov, CEO of IntelCrawler and Dan Clements, President of IntelCrawler. IntelCrawler is a multi-tier intelligence aggregator, which gathers information and cyber prints from a starting big […]
NSS Labs issued the report titled “The Known Unknowns” to explain dynamics behind the market of zero-day exploits. Last week I discussed about the necessity to define a model for “cyber conflict” to qualify the principal issues related to the use of cyber tools and cyber weapons in an Information Warfare context, today I decided […]
Cybersecurity experts revealed that a major artery in Israel’s national road network located in the northern the city of Haifa suffered a cyber attack. Israel is considered one of the most advanced country in cyber security, but at the same time is a privileged target for hostile governments intent in sabotage and cyber espionage on […]
NIST released the draft of cybersecurity framework, which outlines how private companies can protect themselves against cyberattacks, and security breaches. The National Institute of Standards and Technology has released a draft of the cybersecurity framework for private companies and infrastructure networks as part of  President Obama’s executive order. The order has the primary goal to improve the […]