cyber espionage

Snowden has leaked secret documents with a common web crawler

According an internal investigation Snowden has leaked the secret NSA'documents using a web crawler software designed to search, index and…

12 years ago

Cost of conducting APT campaigns is dramatically dropping

Speaking at Kaspersky Lab's Industry Analyst Summit Costin Raiu, revealed that the cost for APT campaign is dramatically dropping. The…

12 years ago

Disconcerting Report on cybersecurity for US Government entities

A report issued by The Federal Government's Track Record provides a scaring picture on cybersecurity for US Government entities. The…

12 years ago

US Intelligence warns on Counterintelligence and cyber espionage

Intelligence officials now view the threat from counterintelligence, foreign spying and the leaking, as the No. 2 danger facing the…

12 years ago

Fixed a serious flaw in Adobe Flash Player exploited in “the Mask APT”

Adobe has released security updates for Adobe Flash Player to fix a critical vulnerability exploited in a sophisticated cyber espionage…

12 years ago

Lack of auth in 3G/4G USB modems exposes control panels to hackers

Andreas Lindh has discovered serious vulnerabilities in an unknown number of 3G/4G USB modems that can be exploited by attackers…

12 years ago

Israeli Defense computer hacked via spear phishing attack

Aviv Raff, CTO at Seculert, confirmed that the attackers have penetrated into the network of Israeli Defense accessing to 15…

12 years ago

Google Chrome bug allows sites to listen users private conversations

Web developers Tal Ater discovered a Google Chrome Bug that allows websites to listen to user private conversations. Google still…

12 years ago

Who is spying on Tor network exit nodes from Russia?

Researchers Winter and Lindskog identified 25 nodes of Tor network that tampered with web traffic, decrypted the traffic, or censored…

12 years ago

SERT Q4 2013 Threat Intelligence Report on threat landscape evolution

Solutionary security firm published SERT Q4 2013 Threat Intelligence Report to provide an overview of the overall threat landscape. Recently…

12 years ago

This website uses cookies.