Customers of Cisco and Fortinet security firms need to patch their products to fix the flaws exploited by the Equation Group exploits and hacking tools. While security experts are analyzing the hacking tools leaked in the data dump by the Shadow Brokers, security firms are working to fix the vulnerabilities exploited by the Equation Group toolsets. Both […]
The NSA-linked unit The Equation Group has been hacked and a data dump containing exploits and tools has been leaked online. Is it legitimate? It is the topic of the moment, the group The Shadow Brokers has hacked the NSA-linked unit the Equation Group and leaked online exploits and hacking tools. The hackers had dumped online […]
According to the popular whistleblower Edward Snowden the hack of the NSA Equation Group may be a Russian response to the US. The public auction of stolen NSA exploits and hacking tools may be the response of the Russian Government to the US Government that is blaming it for the DNC hack. This is also […]
A group of hackers claims to have hacked the NSA Equation Group, it is selling hacking tools and exploits in online auction. Security experts discussed several times about potential effects of the militarization of the cyberspace. Government-built malware and cyber weapons may run out of control, cyber weapons and hacking tools developed by nation-state hackers […]
A new documentary titled Zero Days revealed that the Stuxnet cyber weapon was just a small part of a much bigger Information Warfare operation (code named âNITRO ZEUSâ) against the Iranian civilian infrastructure. A new documentary titled Zero Days has revealed more disconcerting news on the Stuxnet worm, the first malware recognized by security industry as a […]
About the Zero knowledge proof and the ability to proof capability to attack or to defence implementing the cyber deterrence. Successful deterrence based on three aspects – Capability, Threatening message and Transmitting the message to the opponent. Therefore, One of the critical issues in cyber deterrence is the ability to proof your capability to attack […]
Iran is improving its cyber capabilities faster than experts ‘would have ever imagined’ and increased cyber-security spending 12-fold since2013. The British Business Insider published an interesting post on the Iranian cyber capabilities, according the experts the Government of Teheran is improving expertise in the cyber domain faster than experts ‘would have ever imagined’. Iran is […]
The last collection of top-secret slides leaked by Snowden and disclosed by media agencies reveal the hacking capabilities and platforms of Canadian CSE. The last collection of top-secret documents leaked by the whistleblower Edward Snowden, and published by The Intercept and the Canadian Broadcasting Corporation, leaked documents reveal the Canadians are a dab hand at cyber-stuff, […]
A newly disclosed secret report illustrates the tightening of cyber dispute between the United States and Iran , both for spying and sabotage. Since Robert Tappan Morris in 1988 created the first worm, cyberspace started to change its virtual state in a critical cyberwar field. Even if the first worm was an error, aimed at […]
Cyber warfare is becoming the most progressive warfare domain after the Second World War. Which global actors benefit the most from this capability. Cyber warfare is becoming the most progressive warfare domain after the Second World War. The progression of this concept brings us to the next milestone, to define which global actors benefit the […]