cyber attack

European Union simulated a cyber attack on a fictitious Finnish power company

The European Union simulated a cyber attack on a fictitious Finnish power company to test its cyber-defense capabilities. Cyber drills…

2 years ago

American food processing giant JBS Foods halts production after cyberattack

The American food processing company and meat producer JBS Foods was forced to shut down production at multiple sites worldwide following…

3 years ago

A US minor is behind the cyber attack that hit Brussels airport after bombings

Prosecutors confirmed that the failed cyber attack on Brussels airport a few hours after 2016 bombings was launched by a…

7 years ago

A malware was found in Iran petrochemical complexes, but it’s not linked to recent incidents

The head of Iran’s civilian defense confirmed that a malware was found in petrochemical complexes, but it hasn't caused the…

8 years ago

Iran investigates possible cyber attacks behind a string Oil Industry incidents

Iran ’s cyberspace security authorities are investigating a string of fires in the country oil and gas facilities. Incidents or…

8 years ago

Cyber attack on German steel factory caused severe damage

The annual IT security report issued by the German BSI reported that a sophisticated cyber attack on a steel factory…

9 years ago

Israeli students can cause fake traffic jams on popular Waze map app

Two Israeli students at Technion-Israel Institute of Technology were able to cause traffic jams hacking the popular navigation app Waze…

10 years ago

Cybercriminal threatens to sell 3.7M Customers data Israeli Banks

A group of hackers has threatened Israeli banks to disclose stolen data belonging 3.7 million customers unless the organizations pay…

10 years ago

JPMorgan data breach – 465,000 card users data stolen

JPMorgan Chase & Co has recently announced to have suffered a cyber attack in July that exposed 465,000 card users…

10 years ago

Malware can infect system using Inaudible Audio signals

German researchers demonstrated how a malware can infect system in air gapped networks and transfer stolen data using Inaudible Audio…

10 years ago

This website uses cookies.