cyber espionage

Syrian Electronic Army hacked White House employees personal emails

At least three White House employees personal Gmail accounts hacked by the popular group of hackers knows as Syrian Electronic…

13 years ago

Trend Micro – targeted attack against Europe-Asia government agencies

Trend Micro uncovered targeted attack against European and Asian government agencies to steal login credentials from IE and Microsoft Outlook…

13 years ago

Critical Facebook flaw exposed email address for any account

A critical Facebook flaw exposed email address for any account, the discovery was made by Stephen Sclafani, security researcher and…

13 years ago

Hackers hit South Korea also spread spyware to steal military secrets

Mc Afee Lab experts revealed that hackers behind large scale cyberattacks against South Korea also designed malware to steal military…

13 years ago

ICS-CERT Surge In attacks against Energy Industry

The ICS-CERT issued a new Monitor report that revealed a surge of brute force attacks against control systems mainly belonging…

13 years ago

Anonymous and state-sponsored hackers threaten energy sector

The energy sector is threaten with increasing frequency by hacktivists, state-sponsored hackers and cybercriminals... The number of cyber attacks against energy…

13 years ago

Raspberry Pi as physical backdoor to office networks

Network security engineer “Richee” explained how to use a Raspberry Pi to realize a physical backdoor to gain remote access to…

13 years ago

Palantir, private industries … Who helped NSA to build Prism?

Palantir Technologies is considered the principal company behind the design of software used for PRISM program, think of it as…

13 years ago

NetTraveler, new global cyber espionage campaign from Kaspersky

NetTraveler cyber espionage campaign, revealed by Kaspersky's team, targeted over 350 high profile victims from 40 countries. NetTraveler, this is…

13 years ago

Watering hole attacks and exploit kits – Indian gov site case

Number of Watering hole attacks is increasing, most of them based on well known exploit kits. The case of compromised…

13 years ago

This website uses cookies.