As expected happened, just yesterday I wrote about a large scale cyber attack against North Korea that blocked internet activities of the country bringing down almost all of all websites, today South Korean authorities are facing with a hacking attack against an Internet provider that brought down the servers of three broadcasters and two major […]
North Korea is the center of attention these days for its questionable political strategies and for the dispute raging with the entire West. The contrasts have an inevitable reflection even in cyber space, North Korea is considered one of the most aggressive and dangerous states of digital world. Military tensions in the area is escalated […]
Recently many security portals, including Security Affairs, have presented analysis on underground markets and the increased demand of malware and exploit tools. In this post I desire to propose to readers the results of investigation made by researchers at Group-IB, a security firm resident of the Moscow-based Skolkovo Foundation. Mobile malware black market is not well […]
A report titled “Resilient Military Systems and the Advanced Cyber Threat” written by Defense Science Board (DSB), a Federal Advisory Committee established to provide independent advice to the Secretary of Defense, presented alarming scenarios on US nation’s military considered unprepared for a full-scale cyber-conflict. The 138-page report alerts Pentagon on the necessity to improve cyber […]
Rivers of words have been written on the popular Stuxnet virus, there have been many hypotheses, sometimes contradictory, about its paternity but the only certainty seemed to be the date of its creation, but suddenly the certainty as happens in the best thriller movies has been called into question. The authors of Stuxnet, the malware […]
The new is very curious and represents the demonstration that cyber threats could not be analyzed separately, security need a global approach, we cannot distinguish between cybercrime and cyber warfare but we must be focused on the cyber menaces, their effects and the risks connected to adoption of not appropriate security measures. The case is […]
During the last days worldwide internet community expressed great concern on the possibility of a reintroduction of The Cyber Intelligence Sharing and Protection act (CISPA) before the US House by House Intelligence Committee Chairman Mike Rogers (R-Mich.) and ranking member Rep. Dutch Ruppersberger (D-Md.). The controversial cyber bill raised an heated debate, supporters believe it […]
Every government conscious of strategic importance of cyber security and of the investments of other countries in cyber warfare capability is improving its effort. Last week I wrote about Russian government and the Putin’s request to reinforce the garrison of the fifth domain, the cyber space, through a series of investment to secure national critical infrastructures […]
In the last months I had the opportunity many times to read about the possible use, in cyber warfare context, of electromagnetic waves to interfere with defense systems of the adversaries. I wrote about a project dubbed CHAMP (Counter-electronics High-powered Microwave Advanced Missile Project) related to the use of microwaves to permanently knock out computers […]
Earlier this month is has been spread the news that South Korea is investing to improve the cyber capabilities of the country recruiting and training hackers to involve in the cyber defense due the increasing number of attacks suffered. A cyber attack hit recently the presidential transition team, in particular the press rooms server, but […]